Determining the weight spectrum of the Reed–Muller codes $$RM(m-6,m)$$

  • Abstract
  • References
  • Similar Papers
Abstract
Translate article icon Translate Article Star icon
Take notes icon Take Notes

Determining the weight spectrum of the Reed–Muller codes $$RM(m-6,m)$$

Note: looks like a niche area of research and we don't have enough papers to generate a graph.
More from: Designs, Codes and Cryptography
  • Research Article
  • 10.1007/s10623-025-01734-5
Correction: Linearity of $$\mathbb {Z}_{2^L}$$-linear codes via Schur product
  • Oct 4, 2025
  • Designs, Codes and Cryptography
  • Gustavo T Bastos + 3 more

  • Research Article
  • 10.1007/s10623-025-01728-3
Ryser’s theorem for simple multi-Latin rectangles
  • Oct 2, 2025
  • Designs, Codes and Cryptography
  • Amin Bahmanian

  • Research Article
  • 10.1007/s10623-025-01730-9
Correction: On flag-transitive symmetric (v, k, 4) designs
  • Sep 28, 2025
  • Designs, Codes and Cryptography
  • Seyed Hassan Alavi

  • Research Article
  • 10.1007/s10623-025-01668-y
New constructions of cyclic constant-dimension subspace codes based on Sidon spaces and subspace polynomials
  • Sep 19, 2025
  • Designs, Codes and Cryptography
  • Gang Wang + 2 more

  • Research Article
  • 10.1007/s10623-025-01713-w
Linearity of $$\mathbb {Z}_{2^L}$$-linear codes via Schur product
  • Aug 31, 2025
  • Designs, Codes and Cryptography
  • Gustavo T Bastos + 3 more

  • Research Article
  • 10.1007/s10623-025-01712-x
More on the sum-freedom of the multiplicative inverse function
  • Aug 14, 2025
  • Designs, Codes and Cryptography
  • Claude Carlet + 1 more

  • Research Article
  • 10.1007/s10623-025-01711-y
Generalizing the Bierbrauer–Friedman bound for orthogonal arrays
  • Aug 13, 2025
  • Designs, Codes and Cryptography
  • Denis S Krotov + 2 more

  • Research Article
  • 10.1007/s10623-025-01708-7
Determining the weight spectrum of the Reed–Muller codes $$RM(m-6,m)$$
  • Aug 8, 2025
  • Designs, Codes and Cryptography
  • Yueying Lou + 1 more

  • Research Article
  • 10.1007/s10623-025-01703-y
Exploiting output bits and the $$\chi $$ operation in MitM preimage attacks on Keccak
  • Aug 7, 2025
  • Designs, Codes and Cryptography
  • Tianling Weng + 5 more

  • Research Article
  • 10.1007/s10623-025-01707-8
Galois LCD subspace codes
  • Aug 7, 2025
  • Designs, Codes and Cryptography
  • Jie Liu + 2 more

Save Icon
Up Arrow
Open/Close
  • Ask R Discovery Star icon
  • Chat PDF Star icon

AI summaries and top papers from 250M+ research sources.

Search IconWhat is the difference between bacteria and viruses?
Open In New Tab Icon
Search IconWhat is the function of the immune system?
Open In New Tab Icon
Search IconCan diabetes be passed down from one generation to the next?
Open In New Tab Icon