Robert McEliece developed an asymmetric encryption algorithm based on the use of binary Goppa codes in 1978 and no effective key attacks has been described yet. Variants of this cryptosystem are known due to the use of different codes types, but most of them were proven to be less secure. Code cryptosystems are considered an alternate to number-theoretical ones in connection with the development of quantum computing. So, the new classes of error-correcting codes are required for building new resistant code cryptosystems. Non-commutative codes, which simply are ideals of finite non-commutative group algebras, are an option. The Artin–Wedderburn theorem implies that a group algebra is isomorphic to a finite direct sum of matrix algebras, when...
Abstract. A (left) group code of length n is a linear code which is the image of a (left) ideal of a...
A length n group code over a group G is a subgroup of G<sup> n</sup> under component-wise group oper...
In this paper, binary linear codes are used to construct the access structures of a secret sharing s...
The study of group codes as an ideal in a group algebra has been developed long time ago. If char(F)...
In this thesis we give new constructions of a number of extremal type II codes. Algebraic proofs are...
Many of the asymmetric cryptography protocols are based on operations performed on commutative algeb...
This research is about the group coverings of subsets of finite non-abelian groups and its applicati...
This work is focused on linear error-correcting codes in group rings. The basic introduc- tion to gr...
Lenstra and Guruswami described number field analogues of the algebraic geometry codes of Goppa. Rec...
Recently there has been a great deal of work on noncommutative algebraic cryptography. This involves...
Cryptography lies at the heart of most technologies deployed today for secure communications. At the...
Codes are used to store and send information. In this thesis we discuss binary codes, which can be s...
Modern communication relies on cryptography to ensure the security, integrity, and authenticity of o...
A length n group code over a group G is a subgroup of Gn under component-wise group operation. Group...
This book is about relations between three different areas of mathematics and theoretical computer s...
Abstract. A (left) group code of length n is a linear code which is the image of a (left) ideal of a...
A length n group code over a group G is a subgroup of G<sup> n</sup> under component-wise group oper...
In this paper, binary linear codes are used to construct the access structures of a secret sharing s...
The study of group codes as an ideal in a group algebra has been developed long time ago. If char(F)...
In this thesis we give new constructions of a number of extremal type II codes. Algebraic proofs are...
Many of the asymmetric cryptography protocols are based on operations performed on commutative algeb...
This research is about the group coverings of subsets of finite non-abelian groups and its applicati...
This work is focused on linear error-correcting codes in group rings. The basic introduc- tion to gr...
Lenstra and Guruswami described number field analogues of the algebraic geometry codes of Goppa. Rec...
Recently there has been a great deal of work on noncommutative algebraic cryptography. This involves...
Cryptography lies at the heart of most technologies deployed today for secure communications. At the...
Codes are used to store and send information. In this thesis we discuss binary codes, which can be s...
Modern communication relies on cryptography to ensure the security, integrity, and authenticity of o...
A length n group code over a group G is a subgroup of Gn under component-wise group operation. Group...
This book is about relations between three different areas of mathematics and theoretical computer s...
Abstract. A (left) group code of length n is a linear code which is the image of a (left) ideal of a...
A length n group code over a group G is a subgroup of G<sup> n</sup> under component-wise group oper...
In this paper, binary linear codes are used to construct the access structures of a secret sharing s...