1995
DOI: 10.1007/bf01884295
|View full text |Cite
|
Sign up to set email alerts
|

A tower of Artin-Schreier extensions of function fields attaining the Drinfeld-Vladut bound

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
288
0
5

Year Published

1996
1996
2005
2005

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 296 publications
(295 citation statements)
references
References 8 publications
0
288
0
5
Order By: Relevance
“…There are a few AG codes in existence today (see [26,18,16]). We choose for sake of clarity (as did [20]) to focus on the family of codes given by the explicit and fairly simply Garcia-Stichtenoth function fields [16]. More details are given in Section 6.…”
Section: Definition 4 (Ag Code)mentioning
confidence: 99%
See 2 more Smart Citations
“…There are a few AG codes in existence today (see [26,18,16]). We choose for sake of clarity (as did [20]) to focus on the family of codes given by the explicit and fairly simply Garcia-Stichtenoth function fields [16]. More details are given in Section 6.…”
Section: Definition 4 (Ag Code)mentioning
confidence: 99%
“…Garcia and Stichtenoth [16] give an explicit construction of function fields F n extending F q 2 . The main theorem of the paper is that F n has at least s(n) + 1 def = q n−1 (q 2 − 1) + 1 places of degree one and genus at most g(n) def = q n−1 (q + 1).…”
Section: Construction Based On Ag Codesmentioning
confidence: 99%
See 1 more Smart Citation
“…Since the error probability of our algorithm does not increase with n, it is possible to consider long codes over the alphabet F q . In particular, using codes from asymptotically optimal curves over F q 2 [7,4], and assuming that m is large enough, our codes will be able to reliably decode over a Q-ary symmetric channel with error probability p, and maintain a rate close to…”
Section: Introductionmentioning
confidence: 99%
“…So the computation of the integral closure will be done here by invoking the q-th power algorithm introduced by Leonard [10], using the above monomial ordering to define normal forms, and using a variant of the trace-dual basis of the standard basis to define the initial set ∆ * 0 in the algorithm. This algorithm is used to compute missing functions (see Pellikaan [13] and an example in Leonard [11]) for the AG codes from the towers of function fields introduced by Garcia and Stichtenoth [5] and [6]; that is (slightly more generally) if U c is the set of points at which at least one element of R is not regular, then the algorithm computes the set of functions regular on U . But it can be viewed as an algorithm for producing the integral closure of a given ring or the normalization or non-singular model of a curve, particularly one in special position.…”
Section: Introductionmentioning
confidence: 99%