Skip to main content

Efficient generation of binary words of given weight

  • Conference paper
  • First Online:
Cryptography and Coding (Cryptography and Coding 1995)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1025))

Included in the following conference series:

Abstract

We thus provide here a linear time encoder/decoder of binary sequences into words of given weight and length. Furthermore, our algorithm is easy to implement and requires a limited amount of memory. Any exact solution, that a bijection between W n,t and {1,2,..., (n/t)} will require, as far as we know, an algorithm of complexity at least O(n 2), and computations over large integers.

It must be noted however that the statistical properties of the words generated are not very good. The major drawback being that the average length of the last sequence of consecutive “0”s is much larger than the other. For instance with n=1024, t=50 and K=80 the length of this last sequence is 124 instead of 20.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. G. Gallager. Information Theory and Reliable Communication. John Wiley & Sons, 1968.

    Google Scholar 

  2. H. Niederreiter. Knapsack-type cryptosystems and algebraic coding theory. Prob. Contr. Inform. Theory, 15(2):157–166, 1986.

    Google Scholar 

  3. V.M. Sidelnikov. A public-key cryptosystem based on Reed-Muller codes. Discrete Mathematics and Applications, 4(3):191–207, 1994.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Colin Boyd

Rights and permissions

Reprints and permissions

Copyright information

© 1995 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sendrier, N. (1995). Efficient generation of binary words of given weight. In: Boyd, C. (eds) Cryptography and Coding. Cryptography and Coding 1995. Lecture Notes in Computer Science, vol 1025. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-60693-9_20

Download citation

  • DOI: https://doi.org/10.1007/3-540-60693-9_20

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60693-2

  • Online ISBN: 978-3-540-49280-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics