Ruud Pellikaan

Learn More
We present a variant of the Diffie-Hellman scheme in which the number of bits exchanged is one third of what is used in the classical Diffie-Hellman scheme, while the offered security against attacks known today is the same. We also give applications for this variant and conjecture a extension of this variant further reducing the size of sent information.
The q-ary Reed-Muller (RM) codes RM/sub q/(u,m) of length n=q/sup m/ are a generalization of Reed-Solomon (RS) codes, which use polynomials in m variables to encode messages through functional encoding. Using an idea of reducing the multivariate case to the univariate case, randomized list-decoding algorithms for RM codes were given in and . The algorithm(More)
The concept of an error-correcting array gives a new bound on the minimum distance of linear codes and a decoding algorithm which decodes up to half this bound. This gives a unified point of view which explains several improvements on the minimum distance of algebraic-geometric codes. Moreover it is explained in terms of linear algebra and the theory of(More)
Decoding geometric Goppa codes can be reduced to solving the key congruence of a received word in an affine ring. If the code length is smaller than the number of rational points on the curve, then this method can correct up to 12(d ∗ − 1)− s errors, where d∗ is the designed minimum distance of the code and s is the Clifford defect. The affine ring with(More)
This paper investigates the generalized rank weights, with a definition implied by the study of the generalized rank weight enumerator. We study rank metric codes over L, where L is a finite extension of a field K. This is a generalization of the case where K = Fq and L = Fqm of Gabidulin codes to arbitrary characteristic. We show equivalence to previous(More)
An infinite series of curves is constructed in order to show that all linear codes can be obtained from curves using Goppa’s construction. If one imposes conditions on the degree of the divisor used, then we derive criteria for linear codes to be algebraic-geometric. In particular, we investigate the family of q-ary Hamming codes, and prove that only those(More)
We propose a simple and efficient deterministic extractor for the (hyper)elliptic curve C, defined over Fq2 , where q is some power of an odd prime. Our extractor, for a given point P on C, outputs the first Fq-coefficient of the abscissa of the point P . We show that if a point P is chosen uniformly at random in C, the element extracted from the point P is(More)
This curve has the points (1 : 0 : 0) and (0 : 1 : 0) at infinity over any field. The affine equation is XY +Y +X = 0. The origin is a point of this curve. If (x, y) ∈ F8 is a point of this curve with nonzero coordinates, then x = 1. So 0 = xy + y + x = xy + xy + x = x[(xy) + (xy) + 1]. Let t = xy. Then t + t+ 1 = 0. So the Klein quartic has 3.7 = 21(More)