2018
DOI: 10.1007/s10623-018-0556-4
|View full text |Cite
|
Sign up to set email alerts
|

Linear codes from weakly regular plateaued functions and their secret sharing schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 64 publications
(34 citation statements)
references
References 19 publications
0
32
0
Order By: Relevance
“…In [12], Bonini and Borello investigated the geometric generalization of the construction in [8], highlighting a first link between minimal codes and cutting blocking sets. Moreover, different types of recent constructions of minimal codes based on weakly regular bent and plateaued functions have been also presented in [31,32,33].…”
Section: Introductionmentioning
confidence: 99%
“…In [12], Bonini and Borello investigated the geometric generalization of the construction in [8], highlighting a first link between minimal codes and cutting blocking sets. Moreover, different types of recent constructions of minimal codes based on weakly regular bent and plateaued functions have been also presented in [31,32,33].…”
Section: Introductionmentioning
confidence: 99%
“…M. Borello is with LAGA, UMR 7539, CNRS, Université Paris 13 -Sorbonne Paris Cité, Université Paris 8, F-93526, Saint-Denis, France. 1 where w min and w max respectively denote the minimum and maximum nonzero weights in C. This sufficient condition (which we will call AB condition) provides an easy criterion to construct minimal linear codes, especially in the case of codes with few nonzero weights (see for example [8,16]).…”
Section: Introductionmentioning
confidence: 99%
“…McEliece and Sarwate noted the relationship between Shamir-Blakley's secret-sharing scheme and Reed-Solomon codes in [13]. Since then, several secretsharing schemes have been constructed in terms of linear error-correcting codes [14][15][16]. To construct a secret-sharing scheme from linear codes, Massey pointed out the relationship between the access structure and the minimal codewords of the dual code of the underlying code [17,18].…”
Section: Secret-sharing Scheme From Linear Codesmentioning
confidence: 99%