On almost perfect nonlinear permutations
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Finite fields
Planar Functions and Planes of Lenz-Barlotti Class II
Designs, Codes and Cryptography
Secret-sharing with a class of ternary codes
Theoretical Computer Science
On sharing secrets and Reed-Solomon codes
Communications of the ACM
Communications of the ACM
Variations on Minimal Codewords in Linear Codes
AAECC-11 Proceedings of the 11th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Journal of Complexity - Special issue on coding and cryptography
A family of skew Hadamard difference sets
Journal of Combinatorial Theory Series A
Properties and applications of preimage distributions of perfect nonlinear functions
IEEE Transactions on Information Theory
Minimal vectors in linear codes
IEEE Transactions on Information Theory
Linear codes from perfect nonlinear mappings and their secret sharing schemes
IEEE Transactions on Information Theory
Secret sharing schemes from three classes of linear codes
IEEE Transactions on Information Theory
The weight distribution of a class of linear codes from perfect nonlinear functions
IEEE Transactions on Information Theory
On the correlation distribution of the Coulter-Matthews decimation
IEEE Transactions on Information Theory
Value Distributions of Exponential Sums From Perfect Nonlinear Functions and Their Applications
IEEE Transactions on Information Theory
Switching construction of planar functions on finite fields
WAIFI'10 Proceedings of the Third international conference on Arithmetic of finite fields
Hi-index | 754.84 |
In this paper, the weight distributions of two classes of linear codes based on all known explicit perfect nonlinear functions from Fqm to itself are determined using a unified approach. All the minimal codewords of these codes are characterized according to their weights, which suggests that their covering structures are determined. Finally, all the minimal access sets of the secret sharing schemes based on their dual codes are obtained.