Next Article in Journal
Multi-Strategy-Improved Growth Optimizer and Its Applications
Previous Article in Journal
Generalized Bounded Turning Functions Connected with Gregory Coefficients
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Skew Cyclic and Skew Constacyclic Codes over a Mixed Alphabet

1
Department of Mathematics, Presidency University, Bengaluru 560064, Karnataka, India
2
Department of Mathematics, Bishop Heber College, Bharathidasan University, Tiruchirapalli 620017, Tamil Nadu, India
3
Department of Mathematics, Bharathidasan University, Tiruchirapalli 620024, Tamil Nadu, India
4
Department of Mathematics, Faculty of Arts and Science, Kocaeli University, Kocaeli 41001, Turkey
5
I2M, Aix Marseille University, CNRS, 13009 Marseille, France
*
Author to whom correspondence should be addressed.
Axioms 2024, 13(6), 360; https://doi.org/10.3390/axioms13060360
Submission received: 3 March 2024 / Revised: 20 April 2024 / Accepted: 22 May 2024 / Published: 28 May 2024

Abstract

:
In this note, we study skew cyclic and skew constacyclic codes over the mixed alphabet R = F q R 1 R 2 , where q = p m , p is an odd prime with m odd and R 1 = F q + u F q with u 2 = u , and R 2 = F q + u F q + v F q with u 2 = u , v 2 = v , u v = v u = 0 . Such codes consist of the juxtaposition of three codes of the same size over F q , R 1 , and R 2 , respectively. We investigate the generator polynomial for skew cyclic codes over R . Furthermore, we discuss the structural properties of the skew cyclic and skew constacyclic codes over R . We also study their q-ary images under suitable Gray maps.
MSC:
94B05; 94B15; 94B35; 94B60

1. Introduction

The most widely used family of linear codes consists of cyclic codes. Inspired by codes for the Lee metric [1], Berlekamp adapted them to constacyclic codes. Since then, as the following paragraphs demonstrate, they have happened in a number of circumstances.
Skew cyclic codes were first introduced as ideals in the skew polynomial ring F [ x ; θ ] in 2007 by Boucher et al. [2], where θ represents an automorphism of the finite field F . The tables of the most well-known codes were enhanced by the numerous numerical samples that this technique created. The fact that the factorization of the polynomial x n 1 is not unique gives skew polynomial rings an advantage over commutative polynomial rings. For a given length, these numerous factorizations produce a large number of additional codes. Boucher et al. further extended this technique to skew constacyclic codes in [3]. Siap et al. [4] investigated skew cyclic codes of any length in 2011 and produced maps using both classical and quasi-cyclic codes.
In 2012, Jitman et al. [5] studied skew constacyclic codes over finite chain rings and described the algebraic structure of Euclidean and Hermitian dual codes. Abualrub et al. [6] studied θ -cyclic codes over the semilocal ring F 2 + u F 2 , v 2 = v with respect to Euclidean and Hermitian inner products.
These codes over semilocal rings were further studied in many contexts. The rings F 3 + v F 3 in [7], F q + v F q , v 2 = v in [8], and F q + u F q + v F q , u 2 = u , v 2 = v , u v = v u = 0 in [9] were utilized as alphabets for skew cyclic codes, for example. Dertli and Cengellenmis [10] and Yao et al. [11] also examined these codes over F q + u F q + v F q + u v F q , u 2 = u , v 2 = v , u v = v u . Skewed ( 1 + 2 v ) -constacyclic codes were developed in 2017 by Gao et al. [12] after deriving the structure of skew constacyclic codes over the semilocal ring F q + v F q , v 2 = v . In [13] and [14], respectively, Islam and Prakash established the algebraic structure of skew constacyclic codes over F q + u F q + v F q + u v F q , u 2 = u , v 2 = v ,   u v = v u .
Using two non-trivial automorphisms, Bhardwaj and Raka [15] investigated the skew constacyclic codes over the ring F q [ u , v ] f ( u ) , g ( v ) , u v v u in 2019. Alternatively, Z 2 Z 4 -linear codes, or codes over the mixed alphabet Z 2 Z 4 , where a subset of coordinates is binary and the complement is quaternary, were introduced by Borges et al. [16]. They have calculated their generator matrices and described their dual codes. Fernandez-Cordoba et al. [17] obtained the rank and kernel of Z 2 Z 4 -linear codes in a follow-up experiment. Steganography is one field in which these codes have found industrial use [18].
In [19], additive codes over the mixed alphabet Z 2 Z 2 s were examined. Next, Refs. [20,21,22,23] examined the mixed alphabet Z p Z p s and, more broadly, Z p r Z p s . Conversely, Abualrub et al. [24] defined Z 2 Z 4 in 2014, in line with the advancement of cyclic codes on mixed alphabets. The code for -additive cyclics is Z 4 [ x ] .-submodule of Z 2 [ x ] / x r 1 × Z 4 [ x ] / x s 1 , from which the smallest spanning set and unique set of generators for these codes, where s is an odd integer, were obtained.
Furthermore, generator polynomials and duals for Z 2 Z 4 -additive cyclic codes were discovered by Borges et al. [25]. In [26], Aydogdu et al. [27] introduced the novel mixed alphabets Z 2 Z 2 [ u ] -additive codes, where u 2 = 0 . They also studied constacyclic codes over mixed alphabets by defining them as Z 2 [ u ] [ x ] . × Z 2 [ u ] [ x ] / x β ( 1 + u ) , -submodules of Z 2 [ x ] / x α 1 .
As the Gray images of Z 2 Z 2 [ u ] -cyclic codes, they were able to derive several optimum binary linear codes. In the meanwhile, Z 2 Z 2 [ u ] -additive cyclic and constacyclic codes with the unit 1 + u , respectively, were explored algebraically by [28]. Consequently, the predicted generalization in the continuation of these research should be Z 2 r Z 2 s [ u ] .-additive cyclic codes, u 2 = 0 , and constacyclic codes.
In this article, we examine a mixed alphabet R = F q R 1 R 2 , where R 1 = F q + u F q with u 2 = u and R 2 = F q + u F q + v F q with u 2 = u , v 2 = v , u v = v u = 0 . Moreover, we examine the cyclic codes θ t and ( θ t , α ) over R . The algebraic structure of these codes is fully determined. We examine their q-ary representations under Gray maps and provide a few brief numerical instances.
The contents are arranged as follows. The next section gathers some background information. Gray maps are examined in Section 3. Skewed cyclic codes are covered in Section 4, and skew constacyclic codes are covered in Section 5. The essay is concluded at Section 6.

2. Preliminaries

Let p be an odd prime, and let q = p m with m being odd. Denote by F q the finite field of size q . The set F q n of all ordered n-tuples over F q is equipped with the structure of an F q vector space by the usual addition and scalar multiplication of vectors.
A code of length n over F q is just any non-empty subset C of F q n . It is said to be linear if C is an F q subspace of F q n . From now on, we write R 1 = F q + u F q , with u 2 = u and R 2 = F q + u F q + v F q , with u 2 = u , v 2 = v , u v = v u = 0 .
Note that R 1 and R 2 are finite non-chain rings. Let a + u b + v c be an element of R 2 . Then, we define two maps η and δ as follows:
η : R 2 F q , δ : R 2 R 1 , η ( a + u b + v c ) = a , δ ( a + u b + v c ) = a + u b ,
It is clear that η and δ are ring homomorphisms. We consider the ring R :
R = F q R 1 R 2 = { ( x , y , z ) x F q , y R 1 and z R 2 }
We define a R 2 -multiplication in this ring as follows:
: R 2 × R R r ( x , y , z ) = ( η ( r ) x , δ ( r ) y , r z )
This is a well defined multiplication and it can be extended componentwise to R = F q n 1 × R 1 n 2 × R 2 n 3 by:
: R 2 × R R r ( x 1 , , x n 1 , y 1 , , y n 2 , z 1 , , z n 3 ) = ( η ( r ) x 1 , , η ( r ) x n 1 , δ ( r ) y 1 , , δ ( r ) y n 2 , r z 1 , , r z n 3 )
where ( x 1 , , x n 1 , y 1 , , y n 2 , z 1 , , z n 3 ) R γ . Equipped with this multiplication, R becomes an R 2 module . A non-empty subset C of R is said to be a R -linear code of length ( n 1 , n 2 , n 3 ) if C is an R 2 - submodule of R . Now we define the inner product by the formula:
c , c = 1 n 1 x i x i + 1 n 2 y j y j + 1 n 3 z k z k ,
where c = ( x 1 , , x n 1 , y 1 , , y n 2 , z 1 , , z n 3 ) , c = ( x 1 , , x n 1 , y 1 , , y n 2 , z 1 , , z n 3 ) are in R γ . Let C be an R -linear code of length ( n 1 , n 2 , n 3 ) . Then, the dual code of C is defined as:
C = { c R γ c , c = 0 c C }

3. Decomposition and Properties of Gray Maps

Recall that, R 1 = F q + u F q , with u 2 = u . Consider the idempotent orthogonal elements e 1 = u and e 2 = 1 u . Then, we have the decomposition:
R 1 = e 1 R 1 e 2 R 1 e 1 F q e 2 F q ,
where e 1 e 2 = 0 , e 1 2 = e 1 , e 1 + e 2 = 1 . Hence, R 1 = { a e 1 + b e 2 a , b in F q } . We now define the Gray map:
φ 1 : R 1 F q 2 φ 1 ( a e 1 + b e 2 ) = ( a , b )
It can be extended to the length n by:
φ 1 : R 1 n F q 2 n φ 1 ( ( a 1 , , a n ) e 1 + ( b 1 , , b n ) e 2 ) = ( a 1 , , a n , b 1 , , b n )
Note that it is a linear map. We define the Gray weight of a codeword in R 1 as:
w t G ( a e 1 + b e 2 ) = w t H ( a , b )
where w t H denotes the Hamming weight. If x , y lie in R 1 n , then their mutual distance is given by:
d G ( x , y ) = 1 n w t G ( x i y i ) = 1 2 n w t H ( φ 1 ( x ) φ 1 ( y ) ) = d H ( φ 1 ( x ) , φ 1 ( y ) ) .
Hence, φ 1 is a weight preserving map. A non-empty subset C of R i n is said to be a linear code of length n if C is R i - submodule of R i n .
For i { 1 , 2 } , A i R 1 :
A 1 A 2 = { a 1 + a 2 a i A i } and A 1 A 2 = { ( a 1 , a 2 ) a i A i } .
Let C e be a linear code of length n over R 1 . Then, we define:
C e 1 = { y 1 F q n e 1 y 1 + e 2 y 2 C e , for some y 2 F q n }
C e 2 = { y 2 F q n e 1 y 1 + e 2 y 2 C e , for some y 1 F q n }
Therefore, any linear code C e over R 1 can be represented as C e = e 1 C e 1 e 2 C e 2 and φ 1 ( C e ) = C e 1 C e 2 . Hence, C e 1 and C e 2 are F q -linear codes. Also note that φ 1 ( C e ) = φ 1 ( C e ) .
Recall that R 2 = F q + u F q + v F q , with u 2 = u , v 2 = v , u v = v u = 0 . Let o 1 = ( 1 u v ) , o 2 = u , o 3 = v be idempotent orthogonal elements in R 2 , then:
R 2 = o 1 R 2 o 2 R 2 o 3 R 2 o 1 F q o 2 F q o 2 F q ,
where o i o j = 0 ( i j ) , o i 2 = o i , o 1 + o 2 + o 3 = 1 . Hence, any element in R 2 can be written as a o 1 + b o 2 + o 3 c 3 . We now define a weight preserving linear Gray map φ 2 , :
φ 2 : R 2 F q 3 φ 2 ( a o 1 + b o 2 + c o 3 ) = ( a , b , c )
It can be extended to length n by the formula:
φ 2 ( ( a 1 , , a n ) o 1 + ( b 1 , , b n ) o 2 + ( c 1 , , c n ) o 2 ) = ( a 1 , , a n , b 1 , , b n , c 1 , , c n ) .
We define the Gray weight of a codeword in R 2 as:
w t G ( a o 1 + b o 2 + c o 3 ) = w t H ( a , b , c )
where w t H denotes the Hamming weight. If x , y are in R 2 n , then their Gray distance is given by:
d G ( x , y ) = 1 n w t G ( x i y i ) = 1 3 n w t H ( φ 2 ( x ) φ 2 ( y ) ) = d H ( φ 2 ( x ) , φ 2 ( y ) ) .
For i { 1 , 2 , 3 } , A i R 2 :
A 1 A 2 A 3 = { a 1 + a 2 + a 3 a i A i } and A 1 A 2 A 3 = { ( a 1 , a 2 , a 3 ) a i A i } .
Let C o be a linear code of length n over R 2 . We define the three codes:
C o 1 = { z 1 F q n o 1 z 1 + o 2 z 2 + o 3 z 3 C o , for some z 2 , z 3 F q n } , C o 2 = { z 2 F q n o 1 z 1 + o 2 z 2 + o 3 z 3 C o , for some z 1 , z 3 F q n } , C o 3 = { z 3 F q n o 1 z 1 + o 2 z 2 + o 3 z 3 C o , for some z 1 , z 2 F q n } .
Then, any linear code C o over R 2 can be represented as C o = o 1 C o 1 o 2 C o 2 o 3 C o 3 and φ 2 ( C o ) = C o 1 C o 2 C o 3 , where C o 1 , C o 2 , and C o 3 are F q -linear codes. Also note that φ 2 ( C o ) = φ 2 ( C o ) .
Henceforth, we define the Gray map φ on R using the maps defined previously:
φ : R F q 6 φ ( x , y , z ) = ( x , φ 1 ( y ) , φ 2 ( z ) )
now we can extend this map to R γ :
φ ( x 1 , , x n 1 , y 1 , , y n 2 , z 1 , , z n 3 ) = ( x 1 , , x n 1 , φ 1 ( y 1 ) , , φ 1 ( y n 2 ) , φ 2 ( z 1 ) , , φ 2 ( z n 3 ) )
then, the Gray weight of an element in R γ can be denoted by w t G ( α ) = w t H ( φ ( α ) ) . Any linear code C of R γ can be represented by C = C 1 C e C o , where C 1 , C e , and C o are linear code over F q , R 1 , and R 2 . Let G F q be the generator matrix for linear code over F q . The generator matrix G R 1 for a linear code over R 1 is denoted by:
G R 1 = e 1 G e 1 e 2 G e 2
where G e i is the generator matrix for the linear code C e i , for i = { 1 , 2 } . The generator matrix G R 2 for the linear code over R 2 is:
G R 2 = o 1 G o 1 o 2 G o 2 o 3 G o 3
where G o i is the generator matrix for the linear code C o i , for i = { 1 , 2 , 3 } . Using the generator matrices above, we can say that the generator matrix G for the linear code over R is:
G = G F q 0 0 0 G R 1 0 0 0 G R 2 .
Note that the minimum distance of C is min { d H ( C 1 ) , d H ( φ 1 ( C e ) ) , d H ( φ 2 ( C o ) ) } . The following theorem provides the weight preserving nature of the Gray map.
Theorem 1.
The Gray map φ defined above is linear and weight preserving.
Proof. 
Let x = ( x 1 , x 2 , x 3 ) , x = ( x 1 , x 2 , x 3 ) be in R γ where x 1 , x 1 F q n 1 , x 2 , x 2 R 1 n 2 , x 3 , x 3 R 2 n 3 . We have:
φ ( x + x ) = φ ( x 1 + x 1 , x 2 + x 2 , x 3 + x 3 ) = ( x 1 + x 1 , φ 1 ( x 2 + x 2 ) , φ 2 ( x 3 + x 3 ) ) = ( x 1 , φ 1 ( x 2 ) , φ 2 ( x 3 ) ) + ( x 1 , φ 1 ( x 2 ) , φ 2 ( x 3 ) ) ( φ 1 and φ 2 are linear ) = φ ( x ) + φ ( x )
Using the linear map φ ,
d G ( x , x ) = w t G ( x x ) = w t H ( φ ( x ) φ ( x ) ) = d H ( φ ( x ) , φ ( x ) )
Hence, φ is a weight preserving linear map. □
The following theorem gives the parameters of the Gray image of a linear code.
Theorem 2.
If C R γ is an ( n 1 + n 2 + n 3 , d G ) linear code then φ ( C ) is an ( n 1 + 2 ( n 2 ) + 3 ( n 3 ) , d H ) linear code over F q , where d G = d H .
Proof. 
The proof can extended from the proof of Theorem 1. □
The following Theorem characterizes φ ( C ) :
Theorem 3.
If C R γ is linear, then φ ( C ) = C 1 i = 1 i = 2 C e i j = 1 j = 3 C o j , C = C 1 i = 1 i = 2 C e i j = 1 j = 3 C o j .
Proof. 
Let:
φ ( x , y , z ) = ( x , φ 1 ( y ) , φ 3 ( z ) ) = ( a 1 , , a 6 ) φ ( C ) F q 6 .
Note that φ is bijective and C = C 1 C e C o is linear. Thus, a 1 = x C 1 . Also note that φ 1 ( y ) = ( a 2 , a 3 ) , φ 2 ( z ) = ( a 4 , a 5 , a 6 ) . Sin ce φ i s are bijective, a 2 e 1 + a 3 e 2 e 1 C e 1 e 2 C e 2 = C e . Hence, ( a 2 , a 3 ) C e 1 C e 2 and similarly ( a 4 , a 5 , a 6 ) C o 1 C o 2 C o 2 . The converse holds in a similar way. The second part of the statement follows from the fact that φ is bijective. □
The following Theorem furnishes the decompostion of the dual of the linear code C .
Theorem 4.
If C = C 1 C e C o is a linear code over R then C = C 1 C e C o , where C 1 , C e and C o are duals for the respective linear codes.
Proof. 
Let C = { c R γ | c , c = 0 for all c C } = { ( x , y , z ) R | x F q n 1 , y R 1 n 2 , z R 2 n 3 } . Let c = ( x , y , z ) C = C 1 C e C o . Then:
c , c = x x + y y + z z = 0 .
Thus, x C 1 , y C e , z C o and so C C 1 C e C o . Since | C | = | C 1 | | C e | | C o | , the statement holds.
The next result shows that the Gray maps is compatible with duality.
Theorem 5.
If C R γ is linear, then φ ( C ) = φ ( C ) .
Proof. 
Let ( x , y , z ) C and ( x , y , z ) C , where x C 1 , y C e , z C o and x C 1 , y C e , z C o , then ( x | y | z , x | y | z ) = 0 . Using Theorem 4, C 1 , C e and C o are duals for C 1 , C e , and C o . Now, we have φ ( x , y , z ) = ( x , φ 1 ( y ) , φ 2 ( z ) ) , φ ( x , y , z ) = ( x , φ 1 ( y ) , φ 2 ( z ) ) , then the inner product is given by:
φ ( x , y , z ) , φ ( x , y , z ) = ( x , φ 1 ( y ) , φ 2 ( z ) ) , ( x , φ 1 ( y ) , φ 2 ( z ) ) = ( x , 0 , 0 ) , ( x , 0 , 0 ) + ( 0 , φ 1 ( y ) , 0 ) , ( 0 , φ 1 ( y ) , 0 ) + ( 0 , 0 , φ 2 ( z ) ) , ( 0 , 0 , φ 2 ( z ) ) = 0 ( φ 1 ( C ) = φ 1 ( C ) , φ 2 ( C ) = φ 2 ( C ) )
Thus, φ ( C ) φ ( C ) . Since the cardinality is the same on both sides, the statement holds. □
The following result provides the self duality nature of the linear code and its Gray image.
Corollary 1.
If C is a linear R γ -code, then C is self-dual iff φ ( C ) is self-dual. Moreover, φ ( C ) is a self-orthogonal code over F q iff C is self-orthogonal.
Proof. 
Let C be a self-dual linear code of length n over R . Thus, C = C . Then, φ ( C ) = φ ( C ) , and hence, by Theorem 5, we have φ ( C ) = ( φ ( C ) ) . Thus, φ ( C ) is a self-dual linear code of length n 1 + 2 n 2 + 3 n 3 over F q . Conversely, let φ ( C ) be a self-dual linear code of length n 1 + 2 n 2 + 3 n 3 over F q . Then, φ ( C ) = ( φ ( C ) ) , and hence, by Theorem 5, we have φ ( C ) = φ ( C ) . Since φ is bijection, C = C . Therefore, C is a self-dual linear code over R γ . Similarly, the self orthogonal case holds. □

4. Skew Cyclic R -Codes

Let θ t be a non-trivial Frobenius automorphism defined by:
θ t : F q F q , θ t ( a ) = a p t ,
where t divides m . It can be extended to R 1 and R 2 by:
θ t ( a + u b ) = θ t ( a ) + u θ t ( b ) , θ t ( a + u b + v c ) = θ t ( a ) + u θ t ( b ) + v θ t ( b ) .
Since t | m , the order of automorphism θ t is m t . We define a polynomial ring R i [ x , θ t ] ( 1 i 2 ) as follows:
R i [ x , θ t ] = { a 1 + + a n x n | a j R i , 1 j n }
Clearly, R i [ x , θ t ] is a ring with respect to usual addition and the multiplication defined by:
a x m b x n = a θ t m ( b ) x m + n
Note that it is a non-commutative ring unless θ t is an identity map. A non-empty set C is said to be a linear code of length n i over R i if it is a R i submodule of R i n i . Using the above polynomial rings above, we extend the polynomial ring to R by:
R [ x , θ t ] = { ( a ( x ) , b ( x ) , c ( x ) ) : a ( x ) F q [ x ] , b ( x ) R 1 [ x ] , c ( x ) R 2 [ x ] } .
It can be seen that R [ x , θ t ] is a R 2 [ x ; θ t ] submodule with respect to usual addition and multiplication defined by:
: R 2 [ x ] × R [ x , θ t ] R [ x , θ t ] ( a x s ) ( b 1 x i , b 2 x j , b 3 x k ) = ( η ( a ) x s b 1 x i , δ ( a ) x s b 2 x j , a x s b 3 x k ) = ( η ( a ) θ t s ( b 1 ) x s + i , δ ( a ) θ t s ( b 2 ) x s + j , a θ t s ( b 3 ) x s + k )
However, under associative and distributive laws, the multiplication can be extended to R γ [ x ; θ t ] = F q [ x ; θ t ] x n 1 1 × R 1 [ x ; θ t ] x n 2 1 × R 2 [ x ; θ t ] x n 3 1 as follows:
: R 2 [ x ; θ t ] × R γ [ x ; θ t ] R γ [ x ; θ t ]
r ( x ) ( f 1 ( x ) + x n 1 1 , f 2 ( x ) + x n 2 1 , f 3 ( x ) + x n 3 1 ) = ( η ( r ( x ) ) f 1 ( x ) + x n 1 1 , δ ( r ( x ) ) f 2 ( x ) + x n 2 1 ,
r ( x ) f 3 ( x ) + x n 3 1 ) .
Definition 1
([2]). We say that an R -submodule C of R n is a θ t -cyclic code if for any c = ( c 0 , c 1 , , c n 1 ) C , σ 1 ( c ) = ( θ t ( c n 1 ) , θ t ( c 0 ) , , θ t ( c n 2 ) ) C . The operator σ 1 is then said to be a θ t -cyclic shift operator on R n .
Definition 2.
A non-trivial R 2 -submodule C of R γ is called a θ t -cyclic code if for any c = ( c 0 , 1 , c 1 , 1 , , c n 1 1 , 1 , c 0 , e , c 1 , e , , c n 2 1 , e , c 0 , o , c 1 , o , , c n 3 1 , o ) C , σ ( c ) = ( θ ( c n 1 1 , 1 ) , θ ( c 0 , 1 ) , , θ ( c n 1 2 , 1 ) , θ ( c n 2 1 , e ) , θ ( c 0 , e ) , , θ ( c n 2 2 , e ) , θ ( c n 3 1 , o ) , θ ( c 0 , o ) , , θ ( c n 3 2 , o ) ) C . The operator σ is called a θ t -cyclic shift operator on R n .
The following result yields the relationship between the θ t -cyclic codes over R and F q .
Theorem 6.
Let C = C 1 C e C o R γ be linear. Then C is a θ t -cyclic code if and only if C 1 , C e and C o are θ t -cyclic codes of length n 1 , n 2 and n 3 over F q , R 1 and R 2 respectively.
Proof. 
Let C = C 1 C e C o be a θ t -cyclic code over R . Let z = ( z 1 , z e , z o ) C , that is:
z = ( z 0 , 1 , z 1 , 1 , , z n 1 1 , 1 , z 0 , e , z 1 , e , , z n 2 1 , e , z 0 , o , z 1 , o , , z n 3 1 , o ) C .
Then, σ ( z ) = ( θ ( z n 1 1 , 1 ) , θ ( z 0 , 1 ) , , θ ( z n 1 2 , 1 ) , θ ( z n 2 1 , e ) , θ ( z 0 , e ) , , θ ( z n 2 2 , e ) , θ ( z n 3 1 , o ) , θ ( z 0 , o ) , , θ ( z n 3 2 , o ) ) = ( σ ( z 1 ) , σ ( z e ) , σ ( z o ) ) C . From this, we can conclude that:
σ ( z 1 ) C 1 , σ ( z e ) C e and σ ( z o ) C o
Hence, C 1 , C e , and C o are θ t -cyclic code of length n i . The converse holds in a similar way.
We recall the following Theorem from [9].
Theorem 7.
([9]). Let C o = o 1 C o 1 o 2 C o 2 o 3 C o 3 be a linear code over R 2 of length n 3 , then C o is θ t -cyclic code iff C o i ( 1 i 3 ) is a θ t -cyclic code of length n 3 over F q .
The analogue of this result in our setting is as follows.
Theorem 8.
([8]). Let C e = e 1 C e 1 e 2 C e 2 be a linear code over R 1 of length n 2 then C e is θ t -cyclic code iff C e i ( 1 i 2 ) is a θ t -cyclic code of length n 2 over F q .
Theorem 9.
If C = C 1 C e C o is a linear code of length γ = n 1 + n 2 + n 3 , then C is θ t -cyclic iff C 1 , C e i , C o j ( 1 i 2 , 1 j 3 ) are θ t -cyclic code of length n 1 , n 2 , n 3 over F q respecively.
Proof. 
We obtain the proof on combining proofs of Theorems 6–8. □
These notions are well-behaved with respect to duality as the next result shows.
Theorem 10.
If C is a θ t -cyclic code of length n , then its dual C is also a θ t -cyclic code.
Proof. 
From Theorem 9, C 1 , C e i , C o j ( 1 i 2 , 1 j 3 ) are θ t -cyclic codes over F q . Then, C 1 , C e i , C o j ( 1 i 2 , 1 j 3 ) are θ t -cyclic codes over F q from [29] and once again by using Theorem 9, C becomes a θ t -cylic code. □
Recall the following result from [4].
Lemma 1
([4]). Let C be a θ t -cyclic code of length n over F q . Then, there exists a polynomial f ( x ) F q [ x ; θ t ] such that C = f ( x ) and x n 1 = g ( x ) f ( x ) in F q [ x ; θ t ] .
By assuming o ( θ t ) | n , the counterpart follows.
Theorem 11.
Let C = C 1 C e C o be a θ t -cyclic code of length n over R and assume that the order of θ t divides n . Then, C = B 1 , B e , B o , where B 1 = ( f 1 ( x ) , 0 , 0 ) , B e = ( 0 , f e ( x ) , 0 ) , and B o = ( b 1 ( x ) , b e ( x ) , f o ( x ) ) , such that C 1 = f 1 ( x ) , C e = f e ( x ) , C o = f o ( x ) , b 1 ( x ) C 1 and   b 2 ( x ) C e .
Proof. 
Let C = C 1 C e C o be a θ t -cyclic code of length γ = n 1 + n 2 + n 3 over R . Then, by Thereom 6, C 1 , C e , C o are θ t -cyclic codes of length n i over F q , R 1 and R 2 . Define a homomorphism from C to R as follows:
ψ : C R ψ ( c 1 ( x ) , c e ( x ) , c o ( x ) ) = ( 0 , 0 , c o ( x ) )
Define:
k e r ( ψ ) = { ( c 1 ( x ) , c e ( x ) , 0 ) : c 1 ( x ) C 1 , c e ( x ) C e }
I = { ( c 1 ( x ) , c e ( x ) ) F q [ x ; θ t ] × R 1 [ x ; θ t ] : ( c 1 ( x ) , c e ( x ) , 0 ) ker ( ψ ) } .
Clearly, I = I 1 × I e forms a submodule of F q [ x ; θ t ] × R 1 [ x ; θ t ] . Therefore, there exist a polynomial f 1 ( x ) and f e ( x ) in F q [ x ; θ t ] and R 1 [ x ; θ t ] , respectively, generating I 1 and I e with f 1 ( x ) | x n 1 1 and f e ( x ) | x n e 1 . Thus, I = ( f 1 ( x ) , 0 ) , ( 0 , f e ( x ) ) , then for any ( c 1 ( x ) , c e ( x ) , 0 ) ker ( ψ ) , ( c 1 ( x ) , c e ( x ) ) = v ( x ) ( f 1 ( x ) , 0 ) , ( 0 , f e ( x ) ) for some v ( x ) R 1 [ x ; θ t ] . Finally, it leads to ker ( ψ ) = ( f 1 ( x ) , 0 , 0 ) , ( 0 , f e ( x ) , 0 ) . The fact that C is a submodule implies that ψ ( C ) is a submodule. By using the first isomorphism theorem:
C / k e r ( ψ ) ψ ( C ) .
Let ( b 1 ( x ) , b e ( x ) , f o ( x ) ) C , then ψ ( b 1 ( x ) , b e ( x ) , f o ( x ) ) = ( 0 , 0 , f o ( x ) ) . From this, any θ t -cyclic code of length n can be represented by C = ( f 1 ( x ) , 0 , 0 ) ( 0 , f e ( x ) , 0 ) , ( b 1 ( x ) , b e ( x ) , f o ( x ) ) , where f 1 ( x ) | ( x n 1 1 ) , f e ( x ) | ( x n 2 1 ) and f o ( x ) | ( x n 3 1 ) .
Furthermore, we have C is θ t -cyclic, then C k , where k { 1 , e 1 , e 2 , o 1 , o 2 , o 3 } is skew θ t -cyclic code over F q with respective lengths. From Theorem 3, | C | = C 1 i = 1 i = 2 C e i j = 1 j = 3 C o j , since each C k is θ t -cyclic it is generated by a polynomial f k ( x ) , and thus, | C | = q γ i = 1 6 ϵ k , where γ = n 1 + 2 ( n 2 ) + 3 ( n 3 ) . The following Theorem provides the generator polynomials for θ t -cylic codes over F q .
Theorem 12.
Let C = C 1 C e C o be a skew cyclic code over R of length γ = n 1 + n 2 + n 3 . Then, there exists a polynomial:
(i) 
f 1 ( x ) F q [ x ; θ t ] such that C 1 = f 1 ( x ) and x n 1 1 = g 1 ( x ) f 1 ( x ) .
(ii) 
f e ( x ) R 1 [ x ; θ t ] such that C e = f e ( x ) and x n 2 1 = g e ( x ) f e ( x ) where f e ( x ) = i = 1 2 e i f e i ( x ) .
(iii) 
f o ( x ) R 2 [ x ; θ t ] such that C o = f o ( x ) and x n 3 1 = g o ( x ) f o ( x ) where f o ( x ) = i = 1 3 o i f o i ( x ) .
Proof. 
Let C be a θ t -cyclic code of length γ = n 1 + n 2 + n 3 . From Theorem 6, we have that C 1 , C e , and C o are θ t -cyclic codes. Using Lemma 1, ( i ) follows.
Then, the proof of ( i i ) is as follows. Let C e = e 1 C e 1 e 2 C e 2 be a θ t -cyclic code of length n 2 over R 1 . Thereom 7 says that, C e 1 and C e 2 are θ t -cyclic codes of length n 2 over F q . Lemma 1 says that we have C i = f e i ( x ) and x n 2 1 = g e i ( x ) f e i ( x ) in F q [ x ; θ t ] for i { 1 , 2 } . Then, e i f e i ( x ) C for i { 1 , 2 } . Also, for any f e ( x ) C , we have f e ( x ) = i = 1 2 e i h e i ( x ) f e i ( x ) , where h e i ( x ) F q [ x ; θ t ] for i { 1 , 2 } . Thus, f e ( x ) e 1 f e 1 ( x ) , e 2 f e 2 ( x ) . Therefore, C = e 1 f e 1 ( x ) , e 2 f e 2 ( x ) . As x n 2 1 = g e i ( x ) f e i ( x ) in F q [ x ; θ t ] for i { 1 , 2 } . Let f e ( x ) = e 1 f e 1 ( x ) + e 2 f e 2 ( x ) R 1 [ x ; θ t ] . Then, f e ( x ) C . On the other hand e i f e i ( x ) = e i f e ( x ) f e ( x ) for i = 1 , 2 . Consequently, C = f e ( x ) . Furthermore, [ i = 1 2 e i g e i ( x ) ] f e ( x ) = i = 1 2 e i g e i ( x ) f e i ( x ) = i = 1 2 e i ( x n 2 1 ) = x n 2 1 . Then, x n 2 1 = g e ( x ) f e ( x ) in R 1 [ x ; θ t ] , where g e ( x ) = i = 1 2 e i g e i ( x ) . Thus, ( i i ) follows. ( i i i ) is similar to the proof of ( i i ) .

5. Skew Constacyclic Code over R

In this section, we study skew θ t -constacyclic codes over R . We choose a unit element α R 2 * such that α satisfies the condition α 2 = 1 , ( α = 1 , 1 , ) .
Definition 3.
Let α i F p t { 0 } . A linear code C R γ [ x , θ ] is called skew α = α 1 + u α 2 + v α 3 -constacyclic code if it is invariant under the cyclic shift operator λ α , which is whenever:
c = ( x 0 , x 1 , , x n 1 1 , y 0 , y 1 , , y n 2 1 , z 0 , z 1 , , z n 3 1 ) C λ α ( c ) = ( α 1 θ t ( x n 1 1 ) , θ t ( x 0 ) , , θ t ( x n 1 ) , ( α 1 + u α 2 ) θ t ( y n 1 1 ) , θ t ( y 1 ) , , θ t ( y n 2 2 ) , ( α 1 + u α 2 + v α 3 ) θ t ( z n 3 1 ) , θ t ( z 0 ) , , θ t ( z n 3 2 ) ) C
The following two results translate symmetry conditions into algebraic constraints. We give the first result without proof.
Theorem 13.
Let R n , λ = R [ x ; θ t ] / x n λ . A linear code C of length n over R is ( θ t , λ ) -cyclic code if and only if C is a left R [ x ; θ t ] -submodule of R n , λ .
The second result is less immediate.
Theorem 14.
A code C is skew α-cyclic code over R γ = F q [ x , θ t ] x n 1 α × R 1 [ x , θ t ] x n 2 α × R 2 [ x , θ t ] x n 3 α iff C is a left R 2 [ x , θ t ] module over R γ .
Proof. 
Let C be a skew α -cyclic code. Then, by definition x ( f ( x ) | g ( x ) | h ( x ) ) C :
x ( f ( x ) | g ( x ) | h ( x ) ) = ( θ t ( f 0 ) x + θ t ( f 1 ) x 2 + + α 1 θ t ( f n 1 1 ) , θ t ( g 0 ) x + θ t ( g 1 ) x 2 + + ( α 1 + u α 2 ) θ t ( g n 2 1 ) , θ t ( h 0 ) x + θ t ( h 1 ) x 2 + + ( α 1 + u α 2 + v α 3 ) θ t ( h n 3 1 ) ) C
Moreover, by using linearity of C :
r ( x ) ( g 1 ( x ) | g 2 ( x ) | g 3 ( x ) ) C
for some r ( x ) R 2 [ x , θ t ] . Hence, C is an left R 2 [ x , θ t ] submodule over R γ . Conversely, assume that C is an left R 2 [ x , θ t ] submodule over R γ , then we have x ( f ( x ) | g ( x ) | h ( x ) ) C implies C is skew α -cyclic code. □
Theorem 15.
The code C o R 2 n is skew α = α 1 + u α 2 + v α 3 -cyclic of length n iff C o 1 , C o 2 , and C o 3 are skew α 1 , α 1 + α 2 , α 1 + α 3 -cyclic codes over F q of length n .
Proof. 
Let C o be a skew α -cyclic code. Let a = x o 1 + y o 2 + z o 3 C o , where x = ( x 0 , x 1 , , x n 1 ) C o 1 , y = ( y 0 , y 1 , , y n 1 ) C o 2 and x = ( z 0 , z 1 , , z n 1 ) C o 3 . Then, we have by definiton, λ α ( x ) C o , :
λ α ( o 1 ( x 0 , x 1 , , x n 1 ) + o 2 ( y 0 , y 1 , + y n 1 ) + o 3 ( z 0 , z 1 , , z n 1 ) ) = ( ( α 1 + u α 2 + v α 3 ) o 1 ( θ t ( x n 1 ) , θ t ( x 0 ) , , θ t ( x n 2 ) ) + ( α 1 + u α 2 + v α 3 ) o 2 ( θ t ( y n 1 ) , θ t ( y 0 ) , + θ t ( y n 2 ) ) + ( α 1 + u α 2 + v α 3 ) o 3 ( θ t ( z n 1 ) , θ t ( z 0 ) , , θ t ( z n 1 ) ) ) λ α 1 ( x ) + λ α 1 + α 2 ( y ) + λ α 1 + α 3 ( z ) C o λ α 1 ( x ) C o 1 , λ α 1 + α 2 ( y ) C o 2 , λ α 1 + α 3 ( z ) C o 3
Hence, C o 1 , C o 2 , and C o 3 are skew α 1 , α 1 + α 2 , α 1 + α 3 -cyclic codes over F q of length n .
Conversely, assume that C o 1 , C o 2 and C o 3 are skew α 1 , α 1 + α 2 , α 1 + α 3 -cyclic codes over F q of length n . Let m 0 , m 1 , , m n 1 be an element in C o , where m i = o 1 x i + o 2 y i + o 3 z i such that x = ( x 0 , x 2 , , x n 1 ) C o 1 , y = ( y 0 , y 2 , , y n 1 ) C o 2 and z = ( z 0 , z 2 , , z n 1 ) C o 3 . Then we have λ α 1 ( x ) C o 1 , λ α 1 + α 2 ( y ) C o 2 and λ α 1 + α 3 ( z ) C o 3 . So we get,
o 1 λ α 1 ( x ) + o 2 λ α 1 + α 2 ( y ) + o 3 λ α 1 + α 3 ( z ) = o 1 λ α 1 ( x 0 , x 1 , , x n 1 ) + o 2 λ α 1 + α 2 ( y 0 , y 1 , + y n 1 ) + o 3 λ α 1 + α 3 ( z 0 , z 1 , , z n 1 ) C = λ α ( m 0 , m 1 , , m n 1 ) C
Hence, C is skew α cyclic code over R 2 n .
Theorem 16.
C e be a a skew α = α 1 + u α 2 -cyclic code over R 1 iff C e 1 and C e 2 are skew α 1 + α 2 and α 1 -cyclic codes over F q .
Proof. 
The proof is similar to Theorem 15 taking mod v to the above condition. □
Theorem 17.
C be a skew α = α 1 + u α 2 + v α 3 -cyclic code over R of length γ = n 1 + n 2 + n 3 iff C 1 , C e and C o are α 1 , α 1 + u α 2 , and α 1 + u α 2 + v α 3 -cyclic codes over F q , R 1 and R 2 , respectively.
Proof. 
C 1 , C e and C o be α 1 , α 1 + u α 2 , and α 1 + u α 2 + v α 3 -cyclic. Consider x = ( x 0 , x 1 , , x n 1 1 ) ,   y = ( y 0 , y 1 , , y n 2 1 ) and z = ( z 0 , z 1 , , z n 3 1 ) . Consider α 1 + u α 2 = β . Then, we have:
( x , y , z ) C ( λ α 1 ( x ) , λ β ( y ) , λ α ( y ) ) C
Hence, C is skew α -cyclic. The converse part holds similarly. □
Theorem 18.
C be a skew α-cyclic code of length γ = n 1 + n 2 + n 3 iff C 1 is skew α 1 -cyclic code of length n 1 , C e 1 , and C e 2 are α 1 + α 2 , α 1 -cyclic codes of length n 2 and C o 1 , C o 2 , and C o 3 are skew α 1 , α 1 + α 2 , α 1 + α 3 -cyclic codes over F q of length n 3 .
Proof. 
Using Theorems 15–17 the result follows. □
Theorem 19.
C be a skew α = α 1 + u α 2 + v α 3 -cyclic code over R of length γ = n 1 + n 2 + n 3 iff C 1 , C e , and C o are ( α 1 ) 1 , ( α 1 + u α 2 ) 1 , and ( α 1 + u α 2 + v α 3 ) 1 -cyclic.
Proof. 
Let C be a skew α -cyclic code, Lemma 3.1 [5] says that C is skew ( α 1 + u α 2 + v α 3 ) 1 -cyclic code. From Theorem 17, we have C 1 , C e and C o are skew ( α 1 ) 1 , ( α 1 + u α 2 ) 1 and ( α 1 + u α 2 + v α 3 ) 1 -cyclic. □
Corollary 2.
Let C = C 1 C e C o . be a skew α = α 1 + u α 2 + v α 3 -cyclic code over R of length γ = n 1 + n 2 + n 3 . Then, there exist polynomials:
(i)
f 1 ( x ) F q [ x ; θ t ] such that C 1 = f 1 ( x ) and x n 1 α 1 = g 1 ( x ) f 1 ( x ) .
(ii)
f e ( x ) R 1 [ x ; θ t ] such that C e = f e ( x ) and x n 2 ( α 1 + u α 2 ) = g e ( x ) f e ( x ) .
(iii)
f o ( x ) R 2 [ x ; θ t ] such that C o = f o ( x ) and x n 3 ( α 1 + u α 2 + v α 3 ) = g o ( x ) f o ( x ) .
Proof. 
The proof is similar to the proof of Theorem 12. □
Theorem 20.
Let C = C 1 C e C o be a θ t -constacyclic code of length γ over R . Then C = B 1 , B 2 , B o , where B 1 = ( f 1 ( x ) , 0 , 0 ) , B 1 = ( 0 , f e ( x ) , 0 ) , and B 1 = ( b 1 ( x ) , b e ( x ) , f o ( x ) ) .
Proof. 
The proof is similar to the proof of Theorem 11. □
Example 1.
Let q = 9 and F 9 = F 3 [ z ] with z 2 + 1 = 0 . Consider the ring R γ = F 9 [ x , θ 3 ] x 4 1 × R 1 [ x , θ 3 ] x 5 1 × R 2 [ x , θ 3 ] x 5 1 , where θ 3 is the Frobenius automorphism defined by θ 3 ( a ) = a 3 for any a F 9 . Write:
x 4 1 = ( x + 1 ) ( x + 2 ) ( x + z ) ( x + 2 z ) F 9 [ x , θ 3 ]
x 5 1 = ( x + 2 ) ( x 4 + x 3 + x 2 + x + 1 ) F 9 [ x , θ 3 ]
f 1 ( x ) = ( x + 1 ) , f e ( x ) = e 1 ( x + 2 ) + e 2 ( x + 2 ) , f o ( x ) = o 1 ( x + 2 ) + o 2 ( x + 2 ) + o 3 ( x + 2 ) By Theorem 12, we have that f i divides x n i 1 for ( i = 1 , e , o ) , yielding a code with parameter [ 29 , 18 , 2 ] over F 9 .
Example 2.
Let q = 25 and F 25 = F 5 [ z ] with z 2 + z + 1 = 0 . Consider the ring R γ = F 25 [ x , θ 5 ] x 4 1 × R 1 [ x , θ 5 ] x 6 1 × R 2 [ x , θ 5 ] x 4 1 , where θ 5 is the Frobenius automorphism defined by θ 5 ( a ) = a 5 for any a F 25 . Write
x 4 1 = ( x + 2 ) ( x + 3 ) ( x + z ) ( x + z + 1 ) F 25 [ x , θ 5 ]
x 6 1 = ( x 2 1 ) ( x 2 + x + 1 ) ( x 2 x + 1 ) F 25 [ x , θ 5 ]
f 1 ( x ) = ( x + 2 ) , f e ( x ) = e 1 ( x 2 1 ) + e 2 ( x 2 1 ) , f o ( x ) = o 1 ( x + z + 1 ) + o 2 ( x + z + 1 ) + o 3 ( x + z + 1 ) By Theorem 12, we have that f i divides x n i 1 for ( i = 1 , e , o ) yielding a code with parameter [ 28 , 20 , 2 ] over F 25 .

6. Conclusions and Open Problems

In this note, we have studied the algebraic and metric structure of skew cyclic and skew constacyclic codes over a special mixed alphabet. Thus, our codes have a structure of module over the largest of the three alphabets R 2 . Codes over the product ring F q × R 1 × R 2 would be modules over that larger ring. The two algebraic structures are different and should not be confused.
The present work leads itself to two paths of generalization: consider different mixed alphabets or replace the concepts of cyclicity by that of quasi-cyclicity. The former path seems easier than the latter, in view of the many examples of rings that have been used as alphabets of cyclic codes in recent years. On the other hand, the structure of quasi-cyclic codes is always more subtle than that of cyclic codes.

Author Contributions

Conceptualization, K.G., C.D., S.Ç. and P.S.; Methodology, C.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Berlekamp, E.R. Negacyclic codes for the Lee metric. In Combinatorial Mathematics; Bose, R.C., Dowling, T.A., Eds.; University of North Carolian Press: Chapel Hill, NC, USA, 1969; pp. 298–316. [Google Scholar]
  2. Boucher, D.; Geiselmann, W.; Ulmer, F. Skew cyclic codes. Appl. Algebra Eng. Comm. 2007, 18, 379–389. [Google Scholar] [CrossRef]
  3. Boucher, D.; Sol, P.; Ulmer, F. Skew constacyclic codes over Galois rings. Adv. Math. Commun. 2011, 2, 273–292. [Google Scholar] [CrossRef]
  4. Siap, I.; Abualrub, T.; Aydin, N.; Seneviratne, P. Skew cyclic codes of arbitrary length. Int. J. Inf. Coding Theory 2011, 2, 10–20. [Google Scholar] [CrossRef]
  5. Jitman, S.; Ling, S.; Udomkavanich, P. Skew constacyclic codes over finite chain ring. Adv. Math. Commun. 2012, 6, 39–63. [Google Scholar]
  6. Abualrub, T.; Aydin, N.; Seneviratne, P. On θ-cyclic codes over F2+vF2. Aust. J. Comb. 2012, 54, 115–126. [Google Scholar]
  7. Ashraf, M.; Mohammad, G. Skew cyclic codes F 3 + v F 3 . Int. J. Inf. Coding Theory 2014, 24, 218–225. [Google Scholar]
  8. Gursoy, F.; Siap, I.; Yildiz, B. Construction of skew cyclic codes over F q + v F q . Adv. Math. Commun. 2014, 8, 313–322. [Google Scholar] [CrossRef]
  9. Ashraf, M.; Mohammad, G. Skew cyclic codes F q + u F q + v F q . Asian-Eur. J. Math. 2018, 115, 1850072. [Google Scholar] [CrossRef]
  10. Dertli, A.; Cengellenmis, Y. Skew cyclic codes over F q + u F q + v F q + u v F q . J. Sci. Arts 2017, 2, 215–222. [Google Scholar]
  11. Yao, T.; Shi, M.; Sole, P. On Skew cyclic codes over F q + u F q + v F q + u v F q . J. Algebra Comb. Discret. Struct. Appl. 2015, 2, 163–168. [Google Scholar]
  12. Gao, J.; Ma, F.; Fu, F. Skew constacyclic codes over the ring F q + v F q . Appl. Comput. Math. 2017, 6, 286–295. [Google Scholar]
  13. Islam, H.; Prakash, O. Skew cyclic and skew (α1+2+3+uvα4)-constacyclic codes over F q + u F q + v F q + u v F q . Int. J. Inf. Coding Theory 2018, 5, 101–116. [Google Scholar]
  14. Islam, H.; Prakash, O. A note on skew constacyclic codes over F q + u F q + v F q . Discret. Math. Algorithms Appl. 2019, 11, 1950030. [Google Scholar] [CrossRef]
  15. Bhardwaj, S.; Raka, M. Skew constacyclic codes over a non-chain ring F q [u,v]/〈f(u),g(v),uv-vu〉. arXiv 2019, arXiv:1905.12933. [Google Scholar]
  16. Borges, J.; Fernandez-Cordoba, C.; Pujol, J.; Rifa, J. z 2 z 4 -linear codes: Generator matrices and duality. Des. Codes Cryptogr. 2010, 54, 167–179. [Google Scholar] [CrossRef]
  17. Fernandez-Cordoba, C.; Pujol, J.; Villanueva, M. z z z 4 -linear codes: Rank and kernel. Des. Codes Cryptogr. 2010, 56, 43–59. [Google Scholar] [CrossRef]
  18. Rifa-Pous, H.; Rifa, J.; Ronquillo, L. z z z 4 -additive perfect codes in steganography. Adv. Math. Commun. 2011, 5, 425–433. [Google Scholar]
  19. Aydogdu, I.; Siap, I. The structure of Z 2 Z 2 s -additive codes: Bounds on the minimum distance. Appl. Math. Inf. Sci. 2013, 7, 2271–2278. [Google Scholar] [CrossRef]
  20. Aydogdu, I.; Siap, I. On Z p r Z p s -additive codes. Linear Multilinear Algebra 2015, 63, 2089–2102. [Google Scholar] [CrossRef]
  21. Shi, M.; Wu, R.; Krotov, D.S. On Z p Z p k -additive codes and their duality. IEEE Trans. Inf. Theory 2018, 65, 3842–3847. [Google Scholar]
  22. Yao, T.; Zhu, S. Z p Z p s -additive cyclic codes are asymptotically good. Cryptogr. Commun. 2020, 12, 253–264. [Google Scholar] [CrossRef]
  23. Yao, T.; Zhu, S.; Kai, X. Asymptotically good Z p r Z p s -additive cyclic codes. Finite Fields Appl. 2020, 63, 101633. [Google Scholar] [CrossRef]
  24. Abualrub, T.; Siap, I.; Aydin, N. Z 2 Z 4 -Additive cyclic codes. IEEE Trans. Inform. Theory 2014, 60, 1508–1514. [Google Scholar] [CrossRef]
  25. Borges, J.; Fernandez-Cordoba, C.; Ten-Valls, R. Z 2 Z 4 -additive cyclic codes, generator polynomials and dual codes. IEEE Trans. Inform. Theory 2016, 62, 6348–6354. [Google Scholar] [CrossRef]
  26. Aydogdu, I.; Abualrub, T.; Siap, I. On Z 2 Z 2 [u]-additive codes. Int. J. Comput. Math. 2015, 92, 1806–1814. [Google Scholar] [CrossRef]
  27. Aydogdu, I.; Abualrub, T.; Siap, I. The Z 2 Z 2 [u]-cyclic and constacyclic codes. IEEE Trans. Inform. Theory 2016, 63, 4883–4893. [Google Scholar] [CrossRef]
  28. Srinivasulu, B.; Maheshanand, B. The Z 2 ( Z 2 + u Z 2 ) -additive cyclic codes and their duals. Discret. Math. Algorithms Appl. 2016, 8, 1793–8317. [Google Scholar] [CrossRef]
  29. Boucher, D.; Ulmer, F. Coding with skew polynomial rings. J. Symb. Comput. 2009, 44, 1644–1656. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Gowdhaman, K.; Mohan, C.; Durairajan, C.; Çalkavur, S.; Solé, P. Skew Cyclic and Skew Constacyclic Codes over a Mixed Alphabet. Axioms 2024, 13, 360. https://doi.org/10.3390/axioms13060360

AMA Style

Gowdhaman K, Mohan C, Durairajan C, Çalkavur S, Solé P. Skew Cyclic and Skew Constacyclic Codes over a Mixed Alphabet. Axioms. 2024; 13(6):360. https://doi.org/10.3390/axioms13060360

Chicago/Turabian Style

Gowdhaman, Karthick, Cruz Mohan, Chinnapillai Durairajan, Selda Çalkavur, and Patrick Solé. 2024. "Skew Cyclic and Skew Constacyclic Codes over a Mixed Alphabet" Axioms 13, no. 6: 360. https://doi.org/10.3390/axioms13060360

APA Style

Gowdhaman, K., Mohan, C., Durairajan, C., Çalkavur, S., & Solé, P. (2024). Skew Cyclic and Skew Constacyclic Codes over a Mixed Alphabet. Axioms, 13(6), 360. https://doi.org/10.3390/axioms13060360

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop