期刊: IEEE TRANSACTIONS ON INFORMATION THEORY, 2021; 67 (6)
In this paper, we first study in detail the relationship between minimal linear codes and cutting blocking sets, recently introduced by Bonini and Bor......
期刊: IEEE TRANSACTIONS ON INFORMATION THEORY, 2021; 67 (7)
The quantum capacity of a noisy quantum channel determines the maximal rate at which we can code reliably over asymptotically many uses of the channel......
期刊: IEEE TRANSACTIONS ON INFORMATION THEORY, 2021; 67 (8)
Permutation polynomials and their compositional inverses have wide applications in cryptography, coding theory, and combinatorial designs. Motivated b......
期刊: IEEE TRANSACTIONS ON INFORMATION THEORY, 2021; 67 (9)
In this paper, we consider the list decoding property of codes under insertion and deletion errors (insdel for short). Firstly, we analyse the list de......
期刊: IEEE TRANSACTIONS ON INFORMATION THEORY, 2021; 67 (6)
Symbol-pair codes were introduced by Cassuto and Blaum in 2010 to protect pair errors in symbol-pair read channels. Recently Yaakobi, Bruck and Siegel......
期刊: IEEE TRANSACTIONS ON INFORMATION THEORY, 2021; 67 (6)
In this paper, we propose a systematic low density generator matrix (LDGM) code ensemble, which is defined by the Bernoulli process. We prove that, un......
期刊: IEEE TRANSACTIONS ON INFORMATION THEORY, 2021; 67 (8)
The parameters of a q-ary MDS Euclidean self-dual codes are completely determined by its length and the construction of MDS Euclidean self-dual codes ......
期刊: IEEE TRANSACTIONS ON INFORMATION THEORY, 2021; 67 (6)
2-to-1 mappings over finite fields play an important role in symmetric cryptography, particularly in the constructions of APN functions, bent function......
期刊: IEEE TRANSACTIONS ON INFORMATION THEORY, 2021; 67 (6)
A pair of sequences is called a Z-complementary pair (ZCP) if it has zero aperiodic autocorrelation sums at each of the non-zero time-shifts within a ......
期刊: IEEE TRANSACTIONS ON INFORMATION THEORY, 2021; 67 (7)
It is natural in a quantum network system that multiple users intend to send their quantum message to their respective receivers, which is called a mu......
期刊: IEEE TRANSACTIONS ON INFORMATION THEORY, 2021; 67 (8)
The puncturing and shortening techniques are two important approaches to constructing new linear codes from old ones. In the past 70 years, a lot of p......
期刊: IEEE TRANSACTIONS ON INFORMATION THEORY, 2021; 67 (8)
This paper studies an information-theoretic one-shot variable-length secret key agreement problem with public discussion. Let X and Y be jointly distr......
期刊: IEEE TRANSACTIONS ON INFORMATION THEORY, 2021; 67 (5)
We introduce a fundamental lemma called the Poisson matching lemma, and apply it to prove one-shot achievability results for various settings, namely ......
期刊: IEEE TRANSACTIONS ON INFORMATION THEORY, 2021; 67 (6)
We give the first systematic study on the second order asymptotics of the operational task of coherence distillation with and without assistance. In t......
期刊: IEEE TRANSACTIONS ON INFORMATION THEORY, 2021; 67 (7)
Extending previous results, we study a class of general quadrinomials over the field of size 2(2m) with odd m and characterize conditions under which ......