Abstract:
A special form of Cauchy matrix is used to obtain a tighter bound for the validity region of the maximum distance separable (MDS) conjecture and a new compact characteriz...Show MoreMetadata
Abstract:
A special form of Cauchy matrix is used to obtain a tighter bound for the validity region of the maximum distance separable (MDS) conjecture and a new compact characterization of generalized Reed-Solomon codes. The latter is further used to obtain constructions and some existence results for long (2k, k) double-circulant MDS codes.<>
Published in: IEEE Transactions on Information Theory ( Volume: 35, Issue: 6, November 1989)
DOI: 10.1109/18.45291
Citations are not available for this document.
Cites in Papers - |
Cites in Papers - IEEE (23)
Select All
1.
Yansheng Wu, Cunsheng Ding, Tingfang Chen, "When Does the Extended Code of an MDS Code Remain MDS?", IEEE Transactions on Information Theory, vol.71, no.1, pp.263-272, 2025.
2.
Saransh Chopra, Francisco Maturana, K. V. Rashmi, "On Low Field Size Constructions of Access-Optimal Convertible Codes", 2024 IEEE International Symposium on Information Theory (ISIT), pp.1456-1461, 2024.
3.
Peter Beelen, Sven Puchinger, Johan Rosenkilde, "Twisted Reed–Solomon Codes", IEEE Transactions on Information Theory, vol.68, no.5, pp.3047-3061, 2022.
4.
Elad Domanovitz, Silas L. Fong, Ashish Khisti, "An Explicit Rate-Optimal Streaming Code for Channels With Burst and Arbitrary Erasures", IEEE Transactions on Information Theory, vol.68, no.1, pp.47-65, 2022.
5.
Yifei Xiao, Shijie Zhou, Linpeng Zhong, "Erasure Coding-Oriented Data Update for Cloud Storage: A Survey", IEEE Access, vol.8, pp.227982-227998, 2020.
6.
Peter Beelen, Martin Bossert, Sven Puchinger, Johan Rosenkilde, "Structural Properties of Twisted Reed-Solomon Codes with Applications to Cryptography", 2018 IEEE International Symposium on Information Theory (ISIT), pp.946-950, 2018.
7.
Jonas Hansen, Jan Ostergaard, Johnny Kudahl, John H. Madsen, "On Superregular Matrices and Convolutional Codes with Finite Decoder Memory", 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), pp.1-5, 2018.
8.
Peter Beelen, Sven Puchinger, Johan Rosenkilde né Nielsen, "Twisted reed-solomon codes", 2017 IEEE International Symposium on Information Theory (ISIT), pp.336-340, 2017.
9.
Jonas Hansen, Jan Østergaard, Johnny Kudahl, John H. Madsen, "Superregular Lower Triangular Toeplitz Matrices for Low Delay Wireless Streaming", IEEE Transactions on Communications, vol.65, no.9, pp.4027-4038, 2017.
10.
Jonas Hansen, Jan Østergaard, Johnny Kudahl, John H. Madsen, "On the construction of jointly superregular lower triangular Toeplitz matrices", 2016 IEEE International Symposium on Information Theory (ISIT), pp.1954-1958, 2016.
11.
Joan-Josep Climent, Diego Napp, Carmen Perea, Raquel Pinto, "Maximum Distance Separable 2D Convolutional Codes", IEEE Transactions on Information Theory, vol.62, no.2, pp.669-680, 2016.
12.
Jincheng Zhuang, Qi Cheng, Jiyou Li, "On Determining Deep Holes of Generalized Reed–Solomon Codes", IEEE Transactions on Information Theory, vol.62, no.1, pp.199-207, 2016.
13.
Hongmei Xie, Zhiyuan Yan, "MDS codes with low repair complexity for distributed storage networks", 2013 22nd Wireless and Optical Communication Conference, pp.384-387, 2013.
14.
Jiang Haibo, Xiao Yilong, Fang Jiajia, Wang Yiding, Wang Yuantu, "A new storage scheme for streaming media server cluster", 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC), pp.1691-1694, 2011.
15.
Mingqiang Li, Jiwu Shu, "On cyclic lowest density MDS array codes constructed using starters", 2010 IEEE International Symposium on Information Theory, pp.1315-1319, 2010.
16.
Mingqiang Li, Jiwu Shu, "On the equivalence between the B-Code constructions and perfect one-factorizations", 2010 IEEE International Symposium on Information Theory, pp.993-996, 2010.
17.
Mingqiang Li, Jiwu Shu, "Preventing Silent Data Corruptions from Propagating During Data Reconstruction", IEEE Transactions on Computers, vol.59, no.12, pp.1611-1624, 2010.
18.
Mingqiang Li, Jiwu Shu, "DACO: A High-Performance Disk Architecture Designed Specially for Large-Scale Erasure-Coded Storage Systems", IEEE Transactions on Computers, vol.59, no.10, pp.1350-1362, 2010.
19.
Chingwo Ma, "On cauchy matrices for remainder decoding of reed-solomon codes", IEEE Communications Letters, vol.13, no.9, pp.688-690, 2009.
20.
H. Gluesing-Luerssen, J. Rosenthal, R. Smarandache, "Strongly-MDS convolutional codes", IEEE Transactions on Information Theory, vol.52, no.2, pp.584-598, 2006.
21.
J. Justesen, T. Hoholdt, "Bounds on list decoding of MDS codes", IEEE Transactions on Information Theory, vol.47, no.4, pp.1604-1609, 2001.
22.
Hao Chen, S.S.-T. Yau, "Contribution to Munuera's problem on the main conjecture of geometric hyperelliptic MDS codes", IEEE Transactions on Information Theory, vol.43, no.4, pp.1349-1354, 1997.
23.
J.P. Pedersen, C. Dahl, "Classification of pseudo-cyclic MDS codes", IEEE Transactions on Information Theory, vol.37, no.2, pp.365-370, 1991.
Cites in Papers - Other Publishers (39)
1.
Susanta Samanta, "On the counting of involutory MDS matrices", Cryptography and Communications, 2024.
2.
Stanislav S. Malakhov, "On the circulant matrix MDS testing and the search for circulant MDS matrices", Cryptography and Communications, 2024.
3.
Yogesh Kumar, Prasanna Raghaw Mishra, Susanta Samanta, Kishan Chand Gupta, Atul Gaur, "Construction of all MDS and involutory MDS matrices", Advances in Mathematics of Communications, vol.0, no.0, pp.0, 2024.
4.
Zhonghua Sun, Cunsheng Ding, Tingfang Chen, "The extended codes of projective two-weight codes", Discrete Mathematics, vol.347, no.9, pp.114080, 2024.
5.
Balázs Pozsgay, Ian M. Wanless, "Tensor network decompositions for absolutely maximally entangled states", Quantum, vol.8, pp.1339, 2024.
6.
Jens Groth, Victor Shoup, "Fast Batched Asynchronous Distributed Key Generation", Advances in Cryptology – EUROCRYPT 2024, vol.14655, pp.370, 2024.
7.
Zhonghua Sun, Cunsheng Ding, Tingfang Chen, "The extended codes of some linear codes", Finite Fields and Their Applications, vol.96, pp.102401, 2024.
8.
Monika Yadav, Anuradha Sharma, "Some new classes of additive MDS and almost MDS codes over finite fields", Finite Fields and Their Applications, vol.95, pp.102394, 2024.
9.
Victoria Herranz, Diego Napp, Carmen Perea, "Weight-2 input sequences of $ 1/n $ convolutional codes from linear systems point of view", AIMS Mathematics, vol.8, no.1, pp.713, 2023.
10.
Lu Chen, Xin Zhang, Zhixin Sun, "Blockchain Data Sharing Query Scheme based on Threshold Secret Sharing", Security and Communication Networks, vol.2022, pp.1, 2022.
11.
Xingjun Zhang, Ningjing Liang, Yunfei Liu, Changjiang Zhang, Yang Li, "SA-RSR: a read-optimal data recovery strategy for XOR-coded distributed storage systems", Frontiers of Information Technology & Electronic Engineering, vol.23, no.6, pp.858, 2022.
12.
Nathan Keller, Asaf Rosemarin, Advances in Cryptology – EUROCRYPT 2021, vol.12697, pp.35, 2021.
13.
Mohsen Mousavi, Ali Zaghian, Morteza Esmaeili, "Involutory-Multiple-Lightweight MDS Matrices based on Cauchy-type Matrices", Advances in Mathematics of Communications, vol.15, no.4, pp.589, 2021.
14.
Julia LİEB, Raquel PİNTO, "Constructions of MDS convolutional codes using superregular matrices", Journal of Algebra Combinatorics Discrete Structures and Applications, vol.7, no.1, pp.73, 2020.
15.
Kenza Guenda, T. Aaron Gulliver, Somphong Jitman, Satanan Thipworawimon, "Linear $$\ell $$-intersection pairs of codes and their applications", Designs, Codes and Cryptography, vol.88, no.1, pp.133, 2020.
16.
Alessandro Neri, "Systematic encoders for generalized Gabidulin codes and the q-analogue of Cauchy matrices", Linear Algebra and its Applications, vol.593, pp.116, 2020.
17.
Wei Yuan, Ying Yu, Yan Gao, Dan Tang, "Research on Multi-fault-tolerant MDS Array Erasure code", Journal of Physics: Conference Series, vol.1237, pp.022015, 2019.
18.
Victor Cauchois, Pierre Loidreau, "On circulant involutory MDS matrices", Designs, Codes and Cryptography, 2018.
19.
Chong Wang, Ke Zhou, Ronglei Wei, "QS-Code: A Quasi-Systematic Erasure Code with Partial Security for Cloud Storage", Cloud Computing and Security, vol.11065, pp.206, 2018.
20.
Pengguo Teng, Xiaojing Wang, Liang Chen, Dezhai Yuan, "Binary random systematic erasure code for RAID system", vol.1808, pp.090007, 2017.
21.
Paulo Almeida, Diego Napp, Raquel Pinto, "MDS 2D convolutional codes with optimal 1D horizontal projections", Designs, Codes and Cryptography, 2017.
22.
P. Almeida, D. Napp, R. Pinto, Applied and Computational Matrix Analysis, vol.192, pp.67, 2017.
23.
Diego Napp, Roxana Smarandache, "Constructing strongly-MDS convolutional codes with maximum distance profile", Advances in Mathematics of Communications, vol.10, no.2, pp.275, 2016.
24.
P.J. Almeida, D. Napp, R. Pinto, "Superregular matrices and applications to convolutional codes", Linear Algebra and its Applications, vol.499, pp.1, 2016.
25.
Shuai Mu, Maomeng Su, Pin Gao, Yongwei Wu, Keqin Li, Albert Y. Zomaya, "Cloud Storage over Multiple Data Centers", Handbook on Data Centers, pp.691, 2015.
26.
Sara D. Cardell, Joan-Josep Climent, "Recovering erasures by using MDS codes over extension alphabets", SeMA Journal, 2015.
27.
Hong Xu, Yonghui Zheng, Xuejia Lai, "Construction of perfect diffusion layers from linear feedback shift registers", IET Information Security, vol.9, no.2, pp.127-135, 2015.
28.
Hong Xu, Lin Tan, Xuejia Lai, Information Security Practice and Experience, vol.8434, pp.552, 2014.
29.
Qi Cheng, Jiyou Li, Jincheng Zhuang, Algorithms and Computation, vol.8283, pp.100, 2013.
30.
Xing Gao, Min Li, Juan Juan Huang, Bing Chang Liu, "A Distributed Storage Algorithm Based on Cauchy RS Code", Applied Mechanics and Materials, vol.336-338, pp.2188, 2013.