Abstract
Perfect 1-error correcting codes C in Z 2 n, where n=2m−1, are considered. Let \( \left\langle C \right\rangle \); denote the linear span of the words of C and let the rank of C be the dimension of the vector space\( \left\langle C \right\rangle \). It is shown that if the rank of C is n−m+2 then C is equivalent to a code given by a construction of Phelps. These codes are, in case of rank n−m+2, described by a Hamming code H and a set of MDS-codes D h , h \( \in \) H, over an alphabet with four symbols. The case of rank n−m+1 is much simpler: Any such code is a Vasil'ev code.
Similar content being viewed by others
References
G. Cohen, I. Honkala, A. Lobstein and S. Litsyn, Covering Codes, Elsevier (1998).
T. J. Doyen, I. X. Hubaut and P. M. Vandensavel, Ranks and incidence matrices of Steiner triple systems, Mathem. Zeitschr., Vol. 163 (1978) pp. 251–259.
T. Etzion and A. Vardy, On perfect codes and tilings: Problems and solutions, SIAM J. Discrete Math., Vol. 11, No. 2 (1998) pp. 205–223.
B. W. Hamming, Error detecting and error correcting codes, Bell System Tech. J., Vol. 29 (1950) pp. 147–160.
F. Hergert, Algebraische methoden für nichtlineare codes, Thesis, Darmstadt (1985).
K. T. Phelps, A general product construction for error correcting codes, SIAM J. Algebraic and Discrete Methods, Vol. 5 (1984) pp. 224–228.
K. T. Phelps and M. Villanueva, On perfect codes: Rank and kernel, Designs, Codes and Cryptography, Vol. 27 (2002) 183–194.
G. S. Shapiro and D. S. Slotnik, On the mathematical theory of error correcting codes, IBM Journal of Research Development, Vol. 3 (1959) pp. 68–72.
F. I. Solov'eva, Perfect binary codes: Bounds and properties, Discrete Mathematics, Vol. 213 (2000) pp. 283–290.
Yu. L. Vasil'ev, On nongroup close-packed codes, Problems of Cybernetics, Vol. 8 (1962) pp. 375–378 (in Russian).
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Avgustinovich, S.V., Heden, O. & Solov'eva, F.I. The Classification of Some Perfect Codes. Designs, Codes and Cryptography 31, 313–318 (2004). https://doi.org/10.1023/B:DESI.0000015891.01562.c1
Issue Date:
DOI: https://doi.org/10.1023/B:DESI.0000015891.01562.c1