Skip to main content

Showing 1–40 of 40 results for author: Couvreur, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.16539  [pdf, ps, other

    cs.CR

    MinRank Gabidulin encryption scheme on matrix codes

    Authors: Nicolas Aragon, Alain Couvreur, Victor Dyseryn, Philippe Gaborit, Adrien Vinçotte

    Abstract: The McEliece scheme is a generic frame which allows to use any error correcting code of which there exists an efficient decoding algorithm to design an encryption scheme by hiding the generator matrix code. Similarly, the Niederreiter frame is the dual version of the McEliece scheme, and achieves smaller ciphertexts. We propose a generalization of the McEliece frame and the Niederreiter frame to m… ▽ More

    Submitted 26 May, 2024; originally announced May 2024.

  2. arXiv:2306.10294  [pdf, other

    cs.CR

    A new approach based on quadratic forms to attack the McEliece cryptosystem

    Authors: Alain Couvreur, Rocco Mora, Jean-Pierre Tillich

    Abstract: We bring in here a novel algebraic approach for attacking the McEliece cryptosystem. It consists in introducing a subspace of matrices representing quadratic forms. Those are associated with quadratic relationships for the component-wise product in the dual of the code used in the cryptosystem. Depending on the characteristic of the code field, this space of matrices consists only of symmetric mat… ▽ More

    Submitted 24 August, 2023; v1 submitted 17 June, 2023; originally announced June 2023.

    Comments: 68 pages

    MSC Class: 68 ACM Class: E.3; E.4

  3. arXiv:2306.03488  [pdf, ps, other

    cs.CR cs.IT

    Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding

    Authors: Maxime Bombar, Geoffroy Couteau, Alain Couvreur, Clément Ducros

    Abstract: Secure computation often benefits from the use of correlated randomness to achieve fast, non-cryptographic online protocols. A recent paradigm put forth by Boyle $\textit{et al.}$ (CCS 2018, Crypto 2019) showed how pseudorandom correlation generators (PCG) can be used to generate large amounts of useful forms of correlated (pseudo)randomness, using minimal interactions followed solely by local com… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

    Comments: This is a long version of a paper accepted at CRYPTO'23

  4. arXiv:2305.01287  [pdf, ps, other

    cs.CR cs.IT math.RA

    An extension of Overbeck's attack with an application to cryptanalysis of Twisted Gabidulin-based schemes

    Authors: Alain Couvreur, Ilaria Zappatore

    Abstract: In this article, we discuss the decoding of Gabidulin and related codes from a cryptographic point of view, and we observe that these codes can be decoded solely from the knowledge of a generator matrix. We then extend and revisit Gibson and Overbeck attacks on the generalized GPT encryption scheme (instantiated with the Gabidulin code) for different ranks of the distortion matrix. We apply our at… ▽ More

    Submitted 26 June, 2023; v1 submitted 2 May, 2023; originally announced May 2023.

  5. arXiv:2301.03569  [pdf, other

    math.NT cs.IT math.AG

    Codes and modular curves

    Authors: Alain Couvreur

    Abstract: These lecture notes have been written for a course at the Algebraic Coding Theory (ACT) summer school 2022 that took place in the university of Zurich. The objective of the course propose an in-depth presentation of the proof of one of the most striking results of coding theory: Tsfasman Vlăduţ Zink Theorem, which asserts that for some prime power $q$, there exist sequences of codes over… ▽ More

    Submitted 9 January, 2023; originally announced January 2023.

    Comments: Lecture notes for a course given at the Algebraic Coding Theory (ACT) summer school 2022

  6. arXiv:2212.08713  [pdf, ps, other

    cs.IT

    Improved decoding of symmetric rank metric errors

    Authors: Alain Couvreur

    Abstract: We consider the decoding of rank metric codes assuming the error matrix is symmetric. We prove two results. First, for rates $<1/2$ there exists a broad family of rank metric codes for which any symmetric error pattern, even of maximal rank can be corrected. Moreover, the corresponding family of decodable codes includes Gabidulin codes of rate $<1/2$. Second, for rates $>1/2$, we propose a decoder… ▽ More

    Submitted 22 March, 2023; v1 submitted 16 December, 2022; originally announced December 2022.

  7. arXiv:2208.12725  [pdf

    math.AG cs.SC

    A proof of the Brill-Noether method from scratch

    Authors: Elena Berardini, Alain Couvreur, Grégoire Lecerf

    Abstract: In 1874 Brill and Noether designed a seminal geometric method for computing bases of Riemann-Roch spaces. From then, their method has led to several algorithms, some of them being implemented in computer algebra systems. The usual proofs often rely on abstract concepts of algebraic geometry and commutative algebra. In this paper we present a short self-contained and elementary proof that mostly ne… ▽ More

    Submitted 26 August, 2022; originally announced August 2022.

  8. arXiv:2202.13990  [pdf, ps, other

    cs.CR math.NT

    On Codes and Learning With Errors over Function Fields

    Authors: Maxime Bombar, Alain Couvreur, Thomas Debris-Alazard

    Abstract: It is a long standing open problem to find search to decision reductions for structured versions of the decoding problem of linear codes. Such results in the lattice-based setting have been carried out using number fields: Polynomial-LWE, Ring-LWE, Module-LWE and so on. We propose a function field version of the LWE problem. This new framework leads to another point of view on structured codes, e.… ▽ More

    Submitted 28 February, 2022; originally announced February 2022.

  9. arXiv:2112.07322  [pdf, ps, other

    cs.IT cs.CR

    Right-hand side decoding of Gabidulin code and applications

    Authors: Maxime Bombar, Alain Couvreur

    Abstract: We discuss the decoding of Gabidulin and interleaved Gabidulin codes. We give the full presentation of a decoding algorithm for Gabidulin codes, which as Loidreau's seminal algorithm consists in localizing errors in the spirit of Berlekamp-Welch algorithm for Reed-Solomon codes. On the other hand, this algorithm consists in acting on codewords on the right while Loidreau's algorithm considers an a… ▽ More

    Submitted 4 March, 2022; v1 submitted 14 December, 2021; originally announced December 2021.

    Comments: 10 pages, Accepted at the conference WCC 2022

  10. arXiv:2110.11282  [pdf, ps, other

    math.AG cs.IT math.NT

    How arithmetic and geometry make error correcting codes better

    Authors: Alain Couvreur

    Abstract: This note completes a talk given at the conference Curves over Finite Fields: past, present and future celebrating the publication the book {\em Rational Points on Curves over Finite Fields by J.-P. Serre and organised at Centro de ciencias de Benasque in june 2021. It discusses a part of the history of algebraic geometry codes together with some of their recent applications. A particular focus is… ▽ More

    Submitted 1 April, 2022; v1 submitted 21 October, 2021; originally announced October 2021.

  11. arXiv:2103.02700  [pdf, ps, other

    cs.CR cs.IT

    Decoding supercodes of Gabidulin codes and applications to cryptanalysis

    Authors: Maxime Bombar, Alain Couvreur

    Abstract: This article discusses the decoding of Gabidulin codes and shows how to extend the usual decoder to any supercode of a Gabidulin code at the cost of a significant decrease of the decoding radius. Using this decoder, we provide polynomial time attacks on the rank-metric encryption schemes RAMESSES and LIGA.

    Submitted 19 November, 2021; v1 submitted 3 March, 2021; originally announced March 2021.

    Comments: PQCrypto 2021. The Sage code is available on Github: https://github.com/mbombar/Attack_on_LIGA

  12. arXiv:2103.00078  [pdf, ps, other

    cs.CR cs.DM cs.IT

    Recovering or Testing Extended-Affine Equivalence

    Authors: Anne Canteaut, Alain Couvreur, Léo Perrin

    Abstract: Extended Affine (EA) equivalence is the equivalence relation between two vectorial Boolean functions $F$ and $G$ such that there exist two affine permutations $A$, $B$, and an affine function $C$ satisfying $G = A \circ F \circ B + C$. While the problem has a simple formulation, it is very difficult in practice to test whether two functions are EA-equivalent. This problem has two variants: {\em EA… ▽ More

    Submitted 16 May, 2022; v1 submitted 26 February, 2021; originally announced March 2021.

  13. arXiv:2011.04611  [pdf, ps, other

    cs.IT cs.CG math.RA

    On the hardness of code equivalence problems in rank metric

    Authors: Alain Couvreur, Thomas Debris-Alazard, Philippe Gaborit

    Abstract: In the recent years, the notion of rank metric in the context of coding theory has known many interesting developments in terms of applications such as space time coding, network coding or public key cryptography. These applications raised the interest of the community for theoretical properties of this type of codes, such as the hardness of decoding in rank metric. Among classical problems associ… ▽ More

    Submitted 10 June, 2021; v1 submitted 9 November, 2020; originally announced November 2020.

  14. arXiv:2009.05826  [pdf, ps, other

    cs.CR cs.IT

    On the security of subspace subcodes of Reed-Solomon codes for public key encryption

    Authors: Alain Couvreur, Matthieu Lequesne

    Abstract: This article discusses the security of McEliece-like encryption schemes using subspace subcodes of Reed-Solomon codes, i.e. subcodes of Reed-Solomon codes over $\mathbb{F}_{q^m}$ whose entries lie in a fixed collection of $\mathbb{F}_q$-subspaces of $\mathbb{F}_{q^m}$. These codes appear to be a natural generalisation of Goppa and alternant codes and provide a broader flexibility in designing code… ▽ More

    Submitted 8 October, 2021; v1 submitted 12 September, 2020; originally announced September 2020.

  15. arXiv:2009.01281  [pdf, other

    cs.IT cs.CR math.AG math.NT

    Algebraic geometry codes and some applications

    Authors: Alain Couvreur, Hugues Randriambololona

    Abstract: This article surveys the development of the theory of algebraic geometry codes since their discovery in the late 70's. We summarize the major results on various problems such as: asymptotic parameters, improved estimates on the minimum distance, and decoding algorithms. In addition, we present various modern applications of these codes such as public-key cryptography, algebraic complexity theory,… ▽ More

    Submitted 2 September, 2020; originally announced September 2020.

    Comments: Survey chapter to appear in "A Concise Encyclopedia of Coding Theory", W.C. Huffman, J.-L. Kim, and P. Sole' Eds., CRC Press

  16. arXiv:2006.14489  [pdf, ps, other

    cs.IT math.NT math.RA

    Rank-metric codes over arbitrary Galois extensions and rank analogues of Reed-Muller codes

    Authors: Daniel Augot, Alain Couvreur, Julien Lavauzelle, Alessandro Neri

    Abstract: This paper extends the study of rank-metric codes in extension fields $\mathbb{L}$ equipped with an arbitrary Galois group $G = \mathrm{Gal}(\mathbb{L}/\mathbb{K})$. We propose a framework for studying these codes as subspaces of the group algebra $\mathbb{L}[G]$, and we relate this point of view with usual notions of rank-metric codes in $\mathbb{L}^N$ or in $\mathbb{K}^{N\times N}$, where… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

    Comments: 26 pages, 1 figure

  17. arXiv:2002.02220  [pdf, other

    math.AG cs.IT math.NT

    Toward good families of codes from towers of surfaces

    Authors: Alain Couvreur, Philippe Lebacque, Marc Perret

    Abstract: We introduce in this article a new method to estimate the minimum distance of codes from algebraic surfaces. This lower bound is generic, i.e. can be applied to any surface, and turns out to be ``liftable'' under finite morphisms, paving the way toward the construction of good codes from towers of surfaces. In the same direction, we establish a criterion for a surface with a fixed finite set of cl… ▽ More

    Submitted 8 June, 2020; v1 submitted 6 February, 2020; originally announced February 2020.

    Comments: In memory of Gilles Lachaud. This article has been submitted with an appendix by Alexander Schmidt previously posted on ArXiv with reference arXiv:1702.03701

  18. arXiv:1907.11658  [pdf, ps, other

    cs.IT math.AG math.NT

    Power Error Locating Pairs

    Authors: Alain Couvreur, Isabella Panaccione

    Abstract: We present a new decoding algorithm based on error locating pairs and correcting an amount of errors exceeding half the minimum distance. When applied to Reed--Solomon or algebraic geometry codes, the algorithm is a reformulation of the so--called {\em power decoding} algorithm. Asymptotically, it corrects errors up to Sudan's radius. In addition, this new framework applies to any code benefiting… ▽ More

    Submitted 9 July, 2020; v1 submitted 26 July, 2019; originally announced July 2019.

    MSC Class: 94B35; 94B27; 11T71; 14G50

  19. Practical Algebraic Attack on DAGS

    Authors: Magali Bardet, Manon Bertin, Alain Couvreur, Ayoub Otmani

    Abstract: DAGS scheme is a key encapsulation mechanism (KEM) based on quasi-dyadic alternant codes that was submitted to NIST standardization process for a quantum resistant public key algorithm. Recently an algebraic attack was devised by Barelli and Couvreur (Asiacrypt 2018) that efficiently recovers the private key. It shows that DAGS can be totally cryptanalysed by solving a system of bilinear polynomia… ▽ More

    Submitted 9 May, 2019; originally announced May 2019.

    Comments: 16 pages, accepted for publication in the 7th Code-Based Cryptography Workshop 2019

  20. arXiv:1903.09397  [pdf, ps, other

    math.AG cs.IT

    Anticanonical codes from del Pezzo surfaces with Picard rank one

    Authors: Régis Blache, Alain Couvreur, Emmanuel Hallouin, David Madore, Jade Nardi, Matthieu Rambaud, Hugues Randriam

    Abstract: We construct algebraic geometric codes from del Pezzo surfaces and focus on the ones having Picard rank one and the codes associated to the anticanonical class. We give explicit constructions of del Pezzo surfaces of degree 4, 5 and 6, compute the parameters of the associated anticanonical codes and study their isomorphisms arising from the automorphisms of the surface. We obtain codes with excell… ▽ More

    Submitted 22 March, 2019; originally announced March 2019.

  21. arXiv:1903.02933  [pdf, ps, other

    cs.IT cs.CR

    On the security of a Loidreau's rank metric code based encryption scheme

    Authors: Daniel Coggia, Alain Couvreur

    Abstract: We present a polynomial time attack of a rank metric code based encryption scheme due to Loidreau for some parameters.

    Submitted 9 July, 2020; v1 submitted 7 March, 2019; originally announced March 2019.

    Comments: Long version of an article accepted at the conference WCC 2019

  22. arXiv:1805.11489  [pdf, other

    cs.CR cs.IT

    Recovering short secret keys of RLCE in polynomial time

    Authors: Alain Couvreur, Matthieu Lequesne, Jean-Pierre Tillich

    Abstract: We present a key recovery attack against Y. Wang's Random Linear Code Encryption (RLCE) scheme recently submitted to the NIST call for post-quantum cryptography. This attack recovers the secret key for all the short key parameters proposed by the author.

    Submitted 29 May, 2018; originally announced May 2018.

  23. arXiv:1805.05429  [pdf, ps, other

    cs.CR cs.IT

    An efficient structural attack on NIST submission DAGS

    Authors: Elise Barelli, Alain Couvreur

    Abstract: We present an efficient key recovery attack on code based encryption schemes using some quasi-dyadic alternant codes with extension degree 2. This attack permits to break the proposal DAGS recently submitted to NIST.

    Submitted 20 September, 2018; v1 submitted 14 May, 2018; originally announced May 2018.

  24. arXiv:1512.07081  [pdf, other

    cs.IT math.CO quant-ph

    On tensor products of CSS Codes

    Authors: Benjamin Audoux, Alain Couvreur

    Abstract: CSS codes are in one-to-one correspondance with length 3 chain complexes. The latter are naturally endowed with a tensor product $\otimes$ which induces a similar operation on the former. We investigate this operation, and in particular its behavior with regard to minimum distances. Given a CSS code $\mathcal{C}$, we give a criterion which provides a lower bound on the minimum distance of… ▽ More

    Submitted 25 September, 2018; v1 submitted 22 December, 2015; originally announced December 2015.

    Comments: 26 pages, v2: improved introduction and remarks added, v3: many typos corrected, to appear in Ann. Inst. Henri Poincaré D, Comb. Phys. Interact

    MSC Class: 81P70 (secondary: 55U15; 94B99)

  25. arXiv:1501.03736  [pdf, other

    cs.CR cs.IT

    A Polynomial-Time Attack on the BBCRS Scheme

    Authors: Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich, Valérie Gauthier-Umana

    Abstract: The BBCRS scheme is a variant of the McEliece public-key encryption scheme where the hiding phase is performed by taking the inverse of a matrix which is of the form $\mathbf{T} +\mathbf{R}$ where $\mathbf{T}$ is a sparse matrix with average row/column weight equal to a very small quantity $m$, usually $m < 2$, and $\mathbf{R}$ is a matrix of small rank $z\geqslant 1$. The rationale of this new tr… ▽ More

    Submitted 15 January, 2015; originally announced January 2015.

    Comments: Accepted to the conference Public Key Cryptography (PKC) 2015

  26. arXiv:1409.8220  [pdf, ps, other

    cs.IT cs.CR math.AG

    Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes

    Authors: Alain Couvreur, Irene Márquez-Corbella, Ruud Pellikaan

    Abstract: We give a polynomial time attack on the McEliece public key cryptosystem based on subcodes of algebraic geometry (AG) codes. The proposed attack reposes on the distinguishability of such codes from random codes using the Schur product. Wieschebrink treated the genus zero case a few years ago but his approach cannot be extent straightforwardly to other genera. We address this problem by introducing… ▽ More

    Submitted 29 September, 2014; originally announced September 2014.

    Journal ref: CIM-MS Series by Springer-Verlag (2014)

  27. arXiv:1402.3264  [pdf, ps, other

    cs.CR cs.IT math.NT

    Polynomial Time Attack on Wild McEliece Over Quadratic Extensions

    Authors: Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich

    Abstract: We present a polynomial time structural attack against the McEliece system based on Wild Goppa codes from a quadratic finite field extension. This attack uses the fact that such codes can be distinguished from random codes to compute some filtration, that is to say a family of nested subcodes which will reveal their secret algebraic description.

    Submitted 24 July, 2015; v1 submitted 13 February, 2014; originally announced February 2014.

    Comments: The material of this article was presented at the conference EUROCRYPT 2014 (Copenhagen, Denmark) and published in its proceedings. Due to space constraints, most of the proofs were omitted in the proceedings version. The present article is a long revisited version including all the missing proofs

  28. arXiv:1401.6025  [pdf, ps, other

    cs.IT math.AG

    Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and their subcodes

    Authors: Alain Couvreur, Irene Márquez-Corbella, Ruud Pellikaan

    Abstract: We give polynomial time attacks on the McEliece public key cryptosystem based either on algebraic geometry (AG) codes or on small codimensional subcodes of AG codes. These attacks consist in the blind reconstruction either of an Error Correcting Pair (ECP), or an Error Correcting Array (ECA) from the single data of an arbitrary generator matrix of a code. An ECP provides a decoding algorithm that… ▽ More

    Submitted 3 June, 2017; v1 submitted 23 January, 2014; originally announced January 2014.

    Comments: A part of the material of this article has been published at the conferences ISIT 2014 with title "A polynomial time attack against AG code based PKC" and 4ICMCTA with title "Crypt. of PKC that use subcodes of AG codes". This long version includes detailed proofs and new results: the proceedings articles only considered the reconstruction of ECP while we discuss here the reconstruction of ECA

  29. arXiv:1310.3202  [pdf, ps, other

    cs.IT math.NT

    New Identities Relating Wild Goppa Codes

    Authors: Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich

    Abstract: For a given support $L \in \mathbb{F}_{q^m}^n$ and a polynomial $g\in \mathbb{F}_{q^m}[x]$ with no roots in $\mathbb{F}_{q^m}$, we prove equality between the $q$-ary Goppa codes $Γ_q(L,N(g)) = Γ_q(L,N(g)/g)$ where $N(g)$ denotes the norm of $g$, that is $g^{q^{m-1}+\cdots +q+1}.$ In particular, for $m=2$, that is, for a quadratic extension, we get $Γ_q(L,g^q) = Γ_q(L,g^{q+1})$. If $g$ has roots in… ▽ More

    Submitted 7 November, 2013; v1 submitted 11 October, 2013; originally announced October 2013.

    Comments: 14 pages

    Journal ref: Finite Fields Appl, 29, 178-197, 2014

  30. arXiv:1307.6458  [pdf, ps, other

    cs.CR cs.IT

    Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon Codes

    Authors: Alain Couvreur, Philippe Gaborit, Valérie Gauthier-Umaña, Ayoub Otmani, Jean-Pierre Tillich

    Abstract: Because of their interesting algebraic properties, several authors promote the use of generalized Reed-Solomon codes in cryptography. Niederreiter was the first to suggest an instantiation of his cryptosystem with them but Sidelnikov and Shestakov showed that this choice is insecure. Wieschebrink proposed a variant of the McEliece cryptosystem which consists in concatenating a few random columns t… ▽ More

    Submitted 28 March, 2014; v1 submitted 24 July, 2013; originally announced July 2013.

    Comments: A short version appeared in the proceedings of the workshop on Coding and Cryptography 2013 (WCC' 2013). This paper supersedes arXiv:1203.6686 [cs.CR] and arXiv:1204.6459 [cs.CR]

    MSC Class: 11T71; 94B40

  31. arXiv:1206.4728  [pdf, ps, other

    math.NT cs.IT math.AG

    Codes and the Cartier Operator

    Authors: Alain Couvreur

    Abstract: In this article, we present a new construction of codes from algebraic curves. Given a curve over a non-prime finite field, the obtained codes are defined over a subfield. We call them Cartier Codes since their construction involves the Cartier operator. This new class of codes can be regarded as a natural geometric generalisation of classical Goppa codes. In particular, we prove that a well-known… ▽ More

    Submitted 10 September, 2012; v1 submitted 20 June, 2012; originally announced June 2012.

    MSC Class: 11G20; 14G50; 94B27

    Journal ref: Proc. Amer. Math. Soc. 142(6), 1983-1996, 2014

  32. arXiv:1206.2656  [pdf, ps, other

    cs.IT math.CO

    A Construction of Quantum LDPC Codes from Cayley Graphs

    Authors: Alain Couvreur, Nicolas Delfosse, Gilles Zémor

    Abstract: We study a construction of Quantum LDPC codes proposed by MacKay, Mitchison and Shokrollahi. It is based on the Cayley graph of Fn together with a set of generators regarded as the columns of the parity-check matrix of a classical code. We give a general lower bound on the minimum distance of the Quantum code in $\mathcal{O}(dn^2)$ where d is the minimum distance of the classical code. When the cl… ▽ More

    Submitted 17 December, 2013; v1 submitted 12 June, 2012; originally announced June 2012.

    Comments: The material in this paper was presented in part at ISIT 2011. This article is published in IEEE Transactions on Information Theory. We point out that the second step of the proof of Proposition VI.2 in the published version (Proposition 25 in the present version and Proposition 18 in the ISIT extended abstract) is not strictly correct. This issue is addressed in the present version

    MSC Class: 94C15; 05C99; 94B99

    Journal ref: IEEE Trans. Inform. Theory. 59(9). 6087-6098. 2013

  33. arXiv:1101.4603  [pdf, ps, other

    cs.IT math.AG math.NT

    Evaluation Codes from smooth Quadric Surfaces and Twisted Segre Varieties

    Authors: Alain Couvreur, Iwan Duursma

    Abstract: We give the parameters of any evaluation code on a smooth quadric surface. For hyperbolic quadrics the approach uses elementary results on product codes and the parameters of codes on elliptic quadrics are obtained by detecting a BCH structure of these codes and using the BCH bound. The elliptic quadric is a twist of the surface P^1 x P^1 and we detect a similar BCH structure on twists of the Segr… ▽ More

    Submitted 12 June, 2012; v1 submitted 24 January, 2011; originally announced January 2011.

    Comments: 10 pages. Presented at the conference Workshop on Coding theory and Cryptography 2011

    MSC Class: 94B27; 14J20; 94B15

    Journal ref: Des. Codes Cryptogr. 66(1), 291-303. 2013

  34. arXiv:1012.3439  [pdf, ps, other

    cs.IT

    List-decoding of binary Goppa codes up to the binary Johnson bound

    Authors: Daniel Augot, Morgan Barbier, Alain Couvreur

    Abstract: We study the list-decoding problem of alternant codes, with the notable case of classical Goppa codes. The major consideration here is to take into account the size of the alphabet, which shows great influence on the list-decoding radius. This amounts to compare the \emph{generic} Johnson bound to the \emph{$q$-ary} Johnson bound. This difference is important when $q$ is very small. Essentially, t… ▽ More

    Submitted 15 December, 2010; originally announced December 2010.

    Report number: RR-7490

  35. arXiv:1008.2368  [pdf, ps, other

    math.AG cs.IT math.NT

    Construction of Rational Surfaces Yielding Good Codes

    Authors: Alain Couvreur

    Abstract: In the present article, we consider Algebraic Geometry codes on some rational surfaces. The estimate of the minimum distance is translated into a point counting problem on plane curves. This problem is solved by applying the upper bound "à la Weil" of Aubry and Perret together with the bound of Homma and Kim for plane curves. The parameters of several codes from rational surfaces are computed. Amo… ▽ More

    Submitted 16 December, 2010; v1 submitted 13 August, 2010; originally announced August 2010.

    Comments: 20 pages, 7 figures

    MSC Class: 94B27; 14J26; 11G25; 14C20

    Journal ref: Finite Fields and their Applications, Volume 17(5), 2011, Pages 424-441

  36. arXiv:1004.3774  [pdf, other

    cs.IT math.AG math.CO

    Incidence structures from the blown-up plane and LDPC codes

    Authors: Alain Couvreur

    Abstract: In this article, new regular incidence structures are presented. They arise from sets of conics in the affine plane blown-up at its rational points. The LDPC codes given by these incidence matrices are studied. These sparse incidence matrices turn out to be redundant, which means that their number of rows exceeds their rank. Such a feature is absent from random LDPC codes and is in general interes… ▽ More

    Submitted 24 January, 2011; v1 submitted 21 April, 2010; originally announced April 2010.

    Comments: 31 pages, 10 figures

    MSC Class: 51E99; 05B20; 94B27; 14H50

    Journal ref: IEEE, Trans. Inform. Theory, volume 57(7), Pages 4401 - 4416, 2011

  37. The dual minimum distance of arbitrary dimensional algebraic--geometric codes

    Authors: A. Couvreur

    Abstract: In this article, the minimum distance of the dual $C^{\bot}$ of a functional code $C$ on an arbitrary dimensional variety $X$ over a finite field $\F_q$ is studied. The approach consists in finding minimal configurations of points on $X$ which are not in "general position". If $X$ is a curve, the result improves in some situations the well-known Goppa designed distance.

    Submitted 10 November, 2011; v1 submitted 14 May, 2009; originally announced May 2009.

    Comments: 24 pages

    MSC Class: 14J20; 94B27; 14C20

    Journal ref: J. Algebra. 350(1), 84-107. 2012

  38. arXiv:0905.2341  [pdf, ps, other

    math.AG cs.IT math.NT

    Differential approach for the study of duals of algebraic-geometric codes on surfaces

    Authors: A. Couvreur

    Abstract: The purpose of the present article is the study of duals of functional codes on algebraic surfaces. We give a direct geometrical description of them, using differentials. Even if this geometrical description is less trivial, it can be regarded as a natural extension to surfaces of the result asserting that the dual of a functional code on a curve is a differential code. We study the parameters of… ▽ More

    Submitted 1 December, 2010; v1 submitted 14 May, 2009; originally announced May 2009.

    Comments: 21 pages

    MSC Class: 14J20; 94B27; 11G25

    Journal ref: Journal de Theorie des Nombres de Bordeaux, Volume 23(2), p95-120, 2011

  39. arXiv:0905.2311  [pdf, ps, other

    math.AG cs.IT

    Residus de 2-formes differentielles sur les surfaces algebriques et applications aux codes correcteurs d'erreurs

    Authors: A. Couvreur

    Abstract: The theory of algebraic-geometric codes has been developed in the beginning of the 80's after a paper of V.D. Goppa. Given a smooth projective algebraic curve X over a finite field, there are two different constructions of error-correcting codes. The first one, called "functional", uses some rational functions on X and the second one, called "differential", involves some rational 1-forms on this… ▽ More

    Submitted 14 May, 2009; originally announced May 2009.

    Comments: 168 pages

    MSC Class: 14J20; 94B27

    Journal ref: PhD Thesis - Université de Toulouse - 2008

  40. arXiv:0810.4112  [pdf, ps, other

    math.AG cs.IT

    Sums of residues on algebraic surfaces and application to coding theory

    Authors: Alain Couvreur

    Abstract: In this paper, we study residues of differential 2-forms on a smooth algebraic surface over an arbitrary field and give several statements about sums of residues. Afterwards, using these results we construct algebraic-geometric codes which are an extension to surfaces of the well-known differential codes on curves. We also study some properties of these codes and extend to them some known proper… ▽ More

    Submitted 22 October, 2008; originally announced October 2008.

    Comments: 31 pages

    MSC Class: 14J99; 14J20; 14G50; 94B27

    Journal ref: Journal of Pure and Applied Algebra, vol 213 number 12, pages 2201-2223, 2009