Generalized $(L,G)$-codes in weighted Haming metric for information security
Prikladnaya Diskretnaya Matematika. Supplement, no. 17 (2024), pp. 140-143.

Voir la notice de l'article provenant de la source Math-Net.Ru

Possibilities of using generalized $(L,G)$-codes for solving various problems of information security are considered. In particular, the variant of using such codes for syndrome based information embedding, code based compression, threshold key distribution schemes is considered.
Keywords: weighted Hamming distance metric, generalized $(L,G)$-codes, information security.
@article{PDMA_2024_17_a35,
     author = {S. V. Bezzateev},
     title = {Generalized $(L,G)$-codes in weighted {Haming} metric for information security},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {140--143},
     publisher = {mathdoc},
     number = {17},
     year = {2024},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2024_17_a35/}
}
TY  - JOUR
AU  - S. V. Bezzateev
TI  - Generalized $(L,G)$-codes in weighted Haming metric for information security
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2024
SP  - 140
EP  - 143
IS  - 17
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2024_17_a35/
LA  - ru
ID  - PDMA_2024_17_a35
ER  - 
%0 Journal Article
%A S. V. Bezzateev
%T Generalized $(L,G)$-codes in weighted Haming metric for information security
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2024
%P 140-143
%N 17
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2024_17_a35/
%G ru
%F PDMA_2024_17_a35
S. V. Bezzateev. Generalized $(L,G)$-codes in weighted Haming metric for information security. Prikladnaya Diskretnaya Matematika. Supplement, no. 17 (2024), pp. 140-143. http://geodesic.mathdoc.fr/item/PDMA_2024_17_a35/

[1] Bezzateev S. and Shekhunova N., “One generalization of Goppa codes”, Des. Codes Cryptogr., 66:1–3 (2013), 391–399 | DOI | MR | Zbl

[2] Deza E. I., Deza M. M., Entsiklopedicheskii slovar rasstoyanii, Nauka, M., 2008

[3] Bezzateev S. and Shekhunova N., “Class of generalized Goppa codes perfect in weighted Hamming metric”, Proc. ISIT-97 (Ulm, Germany), 1997, 299

[4] Bezzateev S., Voloshina N., and Zhidanov K., “Steganographic method on weighted container”, Proc. XIII Int. Symp. Problems of Redundancy in Information and Control Systems (Saint-Petersburg, Russia), 2012, 10–12

[5] Bezzateev S. and Voloshina N., “Image encryption in code based compression algorithms based on multilevel image structure model”, 9th Intern. Congress ICUMT (Munich, Germany), 2017, 85–90

[6] Bezzateev S. and Noskov I., “Using generalized $(L, G)$-codes for implementation the classic McEliece cryptosystem”, 15th Intern. Congress ICUMT (Ghent, Belgium), 2023, 231–234

[7] Massey J. L., “Some applications of coding theory in cryptography”, Codes and Cyphers: Cryptography and Coding IV, ed. P. G. Farrell, Formara Ltd., Essex, England, 1995, 33–47