Preface |
|
xxiii | |
Acknowledgments |
|
xxiv | |
About the author |
|
xxvi | |
|
I An elementary introduction to coding |
|
|
1 | (132) |
|
|
3 | (20) |
|
1.1 Bitstrings and binary operations |
|
|
3 | (4) |
|
|
7 | (2) |
|
|
9 | (3) |
|
1.4 Error-correcting codes in general |
|
|
12 | (2) |
|
1.5 The binary symmetric channel |
|
|
14 | (5) |
|
1.6 The sphere-packing bound |
|
|
19 | (4) |
|
|
23 | (18) |
|
2.1 The concept of binary linear codes |
|
|
23 | (4) |
|
|
27 | (2) |
|
|
29 | (1) |
|
|
30 | (3) |
|
2.5 Binary Hamming and Simplex codes |
|
|
33 | (4) |
|
|
37 | (4) |
|
|
41 | (30) |
|
|
41 | (2) |
|
|
43 | (4) |
|
3.3 Linear codes over finite fields |
|
|
47 | (3) |
|
3.4 Duality and orthogonal arrays |
|
|
50 | (8) |
|
|
58 | (5) |
|
|
63 | (3) |
|
|
66 | (5) |
|
4 Singleton bound and Reed-Solomon codes |
|
|
71 | (10) |
|
5 Recursive constructions I |
|
|
81 | (12) |
|
5.1 Shortening and puncturing |
|
|
81 | (6) |
|
|
87 | (6) |
|
|
93 | (4) |
|
7 Designs and the binary Golay code |
|
|
97 | (4) |
|
|
101 | (12) |
|
|
113 | (12) |
|
10 Three-dimensional codes, projective planes |
|
|
125 | (6) |
|
|
131 | (2) |
|
II Theory and applications of codes |
|
|
133 | (262) |
|
12 Subfield codes and trace codes |
|
|
135 | (16) |
|
|
135 | (5) |
|
12.2 Trace codes and subfield codes |
|
|
140 | (3) |
|
|
143 | (3) |
|
|
146 | (5) |
|
|
151 | (38) |
|
13.1 Some primitive cyclic codes of length 15 |
|
|
151 | (3) |
|
13.2 Theory of cyclic codes |
|
|
154 | (16) |
|
|
170 | (12) |
|
|
182 | (4) |
|
|
186 | (3) |
|
14 Recursive constructions, covering radius |
|
|
189 | (16) |
|
|
189 | (9) |
|
|
198 | (7) |
|
15 The linear programming method |
|
|
205 | (34) |
|
15.1 Introduction to linear programming |
|
|
205 | (16) |
|
15.2 The Fourier transform |
|
|
221 | (9) |
|
15.3 Some explicit LP bounds |
|
|
230 | (2) |
|
|
232 | (7) |
|
16 OA in statistics and computer science |
|
|
239 | (46) |
|
16.1 OA and independent random variables |
|
|
239 | (3) |
|
16.2 Linear shift register sequences |
|
|
242 | (8) |
|
16.3 Cryptography and S boxes |
|
|
250 | (4) |
|
16.4 Two-point-based sampling |
|
|
254 | (2) |
|
|
256 | (9) |
|
16.6 Derandomization of algorithms |
|
|
265 | (5) |
|
16.7 Authentication and universal hashing |
|
|
270 | (15) |
|
17 The geometric description of linear codes |
|
|
285 | (64) |
|
17.1 Linear codes as sets of points |
|
|
285 | (27) |
|
17.2 Quadratic forms, bilinear forms and caps |
|
|
312 | (20) |
|
17.3 Caps: Constructions and bounds |
|
|
332 | (17) |
|
18 Additive codes and network codes |
|
|
349 | (46) |
|
18.1 Basic constructions and applications |
|
|
349 | (11) |
|
18.2 The cyclic theory of additive codes |
|
|
360 | (13) |
|
18.2.1 Code equivalence and cyclicity |
|
|
360 | (10) |
|
18.2.2 The linear case m = 1 |
|
|
370 | (3) |
|
18.3 Additive quaternary codes: The geometric approach |
|
|
373 | (7) |
|
|
380 | (9) |
|
18.5 Network codes and subspace codes |
|
|
389 | (6) |
|
III Codes and algebraic curves |
|
|
395 | (92) |
|
|
397 | (8) |
|
19.1 Polynomial equations and function fields |
|
|
397 | (4) |
|
19.2 Places of the rational function field |
|
|
401 | (4) |
|
20 Function fields, their places and valuations |
|
|
405 | (16) |
|
|
405 | (4) |
|
20.2 Divisors and the genus |
|
|
409 | (5) |
|
20.3 The Riemann-Roch theorem |
|
|
414 | (3) |
|
20.4 Some hyperelliptic equations |
|
|
417 | (4) |
|
|
421 | (10) |
|
21.1 Algebraic extensions of function fields |
|
|
421 | (2) |
|
21.2 The hyperelliptic case |
|
|
423 | (1) |
|
21.3 The Kloosterman codes and curves |
|
|
424 | (2) |
|
21.4 Subrings and integrality |
|
|
426 | (1) |
|
21.5 The Riemann-Hurwitz formula |
|
|
427 | (4) |
|
22 AG codes, Weierstra B points and universal hashing |
|
|
431 | (16) |
|
22.1 The basic construction |
|
|
431 | (1) |
|
|
432 | (1) |
|
22.3 Examples of function fields and projective equations |
|
|
433 | (7) |
|
22.4 The automorphism group |
|
|
440 | (3) |
|
22.5 AG codes and universal hashing |
|
|
443 | (1) |
|
22.6 The Hasse-Weil bound |
|
|
444 | (3) |
|
|
447 | (40) |
|
|
447 | (3) |
|
|
450 | (2) |
|
|
452 | (4) |
|
|
456 | (10) |
|
|
466 | (2) |
|
|
468 | (2) |
|
|
470 | (9) |
|
23.8 Some highly symmetric codes |
|
|
479 | (3) |
|
|
482 | (1) |
|
|
483 | (4) |
References |
|
487 | (16) |
Index |
|
503 | |