Skip to main content
Log in

Further results on the covering radii of the Reed-Muller codes

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

LetR(r, m) by therth order Reed-Muller code of length2 m, and let ρ(r, m) be its covering radius. We obtain the following new results on the covering radius ofR(r, m): 1. ρ(r+1,m+2)≥ 2ρ(r, m)+2 if 0≤rm−2. This improves the successive use of the known inequalities ρ(r+1,m+2)≥2ρ(r+1,m+1) and ρ(r+1,m+1)≥ρ (r, m).2.ρ(2, 7)≤44. Previously best known upper bound for ρ(2, 7) was 46. 3. The covering radius ofR(1,m) inR(m−1,m) is the same as the covering radius ofR(1,m) inR(m−2,m) form≥4.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Berlekamp, E. and Welch, L.R. 1972. Weight distributions of the cosets of the (32, 6) Reed-Muller code.IEEE Trans. Inform. Theory IT-18:203–207.

    Google Scholar 

  2. Cohen, G.D., Karpovsky, M.G., Mattson, H.F. Jr. and Schatz, J.R. 1985. Covering radius—survey and recent results.IEEE Trans. Inform. Theory, IT-31:328–343.

    Google Scholar 

  3. Helleseth, T., Kløve, T. and Mykkeltveit, J. 1978. On the covering radius of binary codes.IEEE Trans. Inform. Theory, IT-24:627–628.

    Google Scholar 

  4. Hou, X. 1992. Some inequalities about the covering radius of Reed-Muller codes.Des. Codes Cryptogr., 2:215–224.

    Google Scholar 

  5. Hou, X. Classification of cosets of the Reed-Muller codeR(m−1,m).Discrete Math., to appear.

  6. Hou, X. 1993. Some results on the covering radii of Reed-Muller codes.IEEE Trans. Inform. Theory, to appear.

  7. Langevin, P. 1991. The covering radius ofRM(1, 9) intoRM(3, 9).Eurocode 90, pp. 51–59,Lecture Notes in Comput. Sci., 514, Berlin: Springer.

    Google Scholar 

  8. Langevin, P. On the orphans and covering radius of the Reed-Muller codes. Preprint.

  9. McLoughlin, A. 1979. The covering radius of the (m−3)rd order Reed-Muller codes and a lower bound on the (m−4)th order Reed-Muller codes.SIAM J. Appl. Math., 37:419–422.

    Google Scholar 

  10. Mykkeltveit, J. 1980. The covering radius of the (128, 8) Reed-Muller code is 56.IEEE Trans. Inform. Theory, IT-26:359–362.

    Google Scholar 

  11. Patterson, N.J. and Wiedemann, D.H. 1983. The covering radius of the (215, 16) Reed-Muller code is at least 16276.IEEE Trans. Inform. Theory, IT-29: 354–356.

    Google Scholar 

  12. Patterson, N.J. and Wiedemann, D.H. 1990. Correction to [11],IEEE Trans. Inform. Theory, IT-36: 443.

    Google Scholar 

  13. Rothaus, O. 1976. On ‘bent’ functions.J. Combin. Theory, 20(A): 300–305.

    Google Scholar 

  14. Schatz, J.R. 1981. The second order Reed-Muller code of length 64 has covering radius 18.IEEE Trans. Inform. Theory, IT-27: 529–530.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

Communicated by R. Mullin

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hou, XD. Further results on the covering radii of the Reed-Muller codes. Des Codes Crypt 3, 167–177 (1993). https://doi.org/10.1007/BF01388415

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF01388415

Keywords

Navigation