A Family of Low-Complexity Binary Codes with Constant Hamming Weights (2401.16647v2)
Abstract: In this paper, we focus on the design of binary constant weight codes that admit low-complexity encoding and decoding algorithms, and that have a size $M=2k$. For every integer $\ell \geq 3$, we construct a $(n=2\ell, M=2{k_{\ell}}, d=2)$ constant weight code ${\cal C}[\ell]$ of weight $\ell$ by encoding information in the gaps between successive $1$'s. The code is associated with an integer sequence of length $\ell$ with a constraint defined as {\em anchor-decodability} that ensures low complexity for encoding and decoding. The complexity of the encoding is linear in the input size $k$, and that of the decoding is poly-logarithmic in the input size $n$, discounting the linear time spent on parsing the input. Both the algorithms do not require expensive computation of binomial coefficients, unlike the case in many existing schemes. Among codes generated by all anchor-decodable sequences, we show that ${\cal C}[\ell]$ has the maximum size with $k_{\ell} \geq \ell2-\ell\log_2\ell + \log_2\ell - 0.279\ell - 0.721$. As $k$ is upper bounded by $\ell2-\ell\log_2\ell +O(\ell)$ information-theoretically, the code ${\cal C}[\ell]$ is optimal in its size with respect to two higher order terms of $\ell$. In particular, $k_\ell$ meets the upper bound for $\ell=3$ and one-bit away for $\ell=4$. On the other hand, we show that ${\cal C}[\ell]$ is not unique in attaining $k_{\ell}$ by constructing an alternate code ${\cal \hat{C}}[\ell]$ again parameterized by an integer $\ell \geq 3$ with a different low-complexity decoder, yet having the same size $2{k_{\ell}}$ when $3 \leq \ell \leq 7$. Finally, we also derive new codes by modifying ${\cal C}[\ell]$ that offer a wider range on blocklength and weight while retaining low complexity for encoding and decoding. For certain selected values of parameters, these modified codes too have an optimal $k$.
- Graham, R., Sloane, N.: Lower bounds for constant weight codes. IEEE Transactions on Information Theory 26(1), 37–43 (1980) https://doi.org/10.1109/TIT.1980.1056141 Brouwer et al. [1990] Brouwer, A.E., Shearer, J.B., Sloane, N.J.A., Smith, W.D.: A new table of constant weight codes. IEEE Transactions on Information Theory 36(6), 1334–1380 (1990) https://doi.org/10.1109/18.59932 Agrell et al. [2000] Agrell, E., Vardy, A., Zeger, K.: Upper bounds for constant-weight codes. IEEE Transactions on Information Theory 46(7), 2373–2395 (2000) https://doi.org/10.1109/18.887851 Brouwer [2023] Brouwer, A.: Bounds for binary constant weight codes. https://www.win.tue.nl/%7eaeb/codes/Andw.html. [Online; accessed 23-Oct-2023] (2023) Moreno et al. [1995] Moreno, O., Zhang, Z., Kumar, P.V., Zinoviev, V.A.: New constructions of optimal cyclically permutable constant weight codes. IEEE Transactions on Information Theory 41(2), 448–455 (1995) https://doi.org/10.1109/18.370146 Bitan and Etzion [1995] Bitan, S., Etzion, T.: Constructions for optimal constant weight cyclically permutable codes and difference families. IEEE Transactions on Information Theory 41(1), 77–87 (1995) https://doi.org/10.1109/18.370117 Nordio and Viterbo [2003] Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Brouwer, A.E., Shearer, J.B., Sloane, N.J.A., Smith, W.D.: A new table of constant weight codes. IEEE Transactions on Information Theory 36(6), 1334–1380 (1990) https://doi.org/10.1109/18.59932 Agrell et al. [2000] Agrell, E., Vardy, A., Zeger, K.: Upper bounds for constant-weight codes. IEEE Transactions on Information Theory 46(7), 2373–2395 (2000) https://doi.org/10.1109/18.887851 Brouwer [2023] Brouwer, A.: Bounds for binary constant weight codes. https://www.win.tue.nl/%7eaeb/codes/Andw.html. [Online; accessed 23-Oct-2023] (2023) Moreno et al. [1995] Moreno, O., Zhang, Z., Kumar, P.V., Zinoviev, V.A.: New constructions of optimal cyclically permutable constant weight codes. IEEE Transactions on Information Theory 41(2), 448–455 (1995) https://doi.org/10.1109/18.370146 Bitan and Etzion [1995] Bitan, S., Etzion, T.: Constructions for optimal constant weight cyclically permutable codes and difference families. IEEE Transactions on Information Theory 41(1), 77–87 (1995) https://doi.org/10.1109/18.370117 Nordio and Viterbo [2003] Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Agrell, E., Vardy, A., Zeger, K.: Upper bounds for constant-weight codes. IEEE Transactions on Information Theory 46(7), 2373–2395 (2000) https://doi.org/10.1109/18.887851 Brouwer [2023] Brouwer, A.: Bounds for binary constant weight codes. https://www.win.tue.nl/%7eaeb/codes/Andw.html. [Online; accessed 23-Oct-2023] (2023) Moreno et al. [1995] Moreno, O., Zhang, Z., Kumar, P.V., Zinoviev, V.A.: New constructions of optimal cyclically permutable constant weight codes. IEEE Transactions on Information Theory 41(2), 448–455 (1995) https://doi.org/10.1109/18.370146 Bitan and Etzion [1995] Bitan, S., Etzion, T.: Constructions for optimal constant weight cyclically permutable codes and difference families. IEEE Transactions on Information Theory 41(1), 77–87 (1995) https://doi.org/10.1109/18.370117 Nordio and Viterbo [2003] Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Brouwer, A.: Bounds for binary constant weight codes. https://www.win.tue.nl/%7eaeb/codes/Andw.html. [Online; accessed 23-Oct-2023] (2023) Moreno et al. [1995] Moreno, O., Zhang, Z., Kumar, P.V., Zinoviev, V.A.: New constructions of optimal cyclically permutable constant weight codes. IEEE Transactions on Information Theory 41(2), 448–455 (1995) https://doi.org/10.1109/18.370146 Bitan and Etzion [1995] Bitan, S., Etzion, T.: Constructions for optimal constant weight cyclically permutable codes and difference families. IEEE Transactions on Information Theory 41(1), 77–87 (1995) https://doi.org/10.1109/18.370117 Nordio and Viterbo [2003] Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Moreno, O., Zhang, Z., Kumar, P.V., Zinoviev, V.A.: New constructions of optimal cyclically permutable constant weight codes. IEEE Transactions on Information Theory 41(2), 448–455 (1995) https://doi.org/10.1109/18.370146 Bitan and Etzion [1995] Bitan, S., Etzion, T.: Constructions for optimal constant weight cyclically permutable codes and difference families. IEEE Transactions on Information Theory 41(1), 77–87 (1995) https://doi.org/10.1109/18.370117 Nordio and Viterbo [2003] Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Bitan, S., Etzion, T.: Constructions for optimal constant weight cyclically permutable codes and difference families. IEEE Transactions on Information Theory 41(1), 77–87 (1995) https://doi.org/10.1109/18.370117 Nordio and Viterbo [2003] Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Brouwer, A.E., Shearer, J.B., Sloane, N.J.A., Smith, W.D.: A new table of constant weight codes. IEEE Transactions on Information Theory 36(6), 1334–1380 (1990) https://doi.org/10.1109/18.59932 Agrell et al. [2000] Agrell, E., Vardy, A., Zeger, K.: Upper bounds for constant-weight codes. IEEE Transactions on Information Theory 46(7), 2373–2395 (2000) https://doi.org/10.1109/18.887851 Brouwer [2023] Brouwer, A.: Bounds for binary constant weight codes. https://www.win.tue.nl/%7eaeb/codes/Andw.html. [Online; accessed 23-Oct-2023] (2023) Moreno et al. [1995] Moreno, O., Zhang, Z., Kumar, P.V., Zinoviev, V.A.: New constructions of optimal cyclically permutable constant weight codes. IEEE Transactions on Information Theory 41(2), 448–455 (1995) https://doi.org/10.1109/18.370146 Bitan and Etzion [1995] Bitan, S., Etzion, T.: Constructions for optimal constant weight cyclically permutable codes and difference families. IEEE Transactions on Information Theory 41(1), 77–87 (1995) https://doi.org/10.1109/18.370117 Nordio and Viterbo [2003] Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Agrell, E., Vardy, A., Zeger, K.: Upper bounds for constant-weight codes. IEEE Transactions on Information Theory 46(7), 2373–2395 (2000) https://doi.org/10.1109/18.887851 Brouwer [2023] Brouwer, A.: Bounds for binary constant weight codes. https://www.win.tue.nl/%7eaeb/codes/Andw.html. [Online; accessed 23-Oct-2023] (2023) Moreno et al. [1995] Moreno, O., Zhang, Z., Kumar, P.V., Zinoviev, V.A.: New constructions of optimal cyclically permutable constant weight codes. IEEE Transactions on Information Theory 41(2), 448–455 (1995) https://doi.org/10.1109/18.370146 Bitan and Etzion [1995] Bitan, S., Etzion, T.: Constructions for optimal constant weight cyclically permutable codes and difference families. IEEE Transactions on Information Theory 41(1), 77–87 (1995) https://doi.org/10.1109/18.370117 Nordio and Viterbo [2003] Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Brouwer, A.: Bounds for binary constant weight codes. https://www.win.tue.nl/%7eaeb/codes/Andw.html. [Online; accessed 23-Oct-2023] (2023) Moreno et al. [1995] Moreno, O., Zhang, Z., Kumar, P.V., Zinoviev, V.A.: New constructions of optimal cyclically permutable constant weight codes. IEEE Transactions on Information Theory 41(2), 448–455 (1995) https://doi.org/10.1109/18.370146 Bitan and Etzion [1995] Bitan, S., Etzion, T.: Constructions for optimal constant weight cyclically permutable codes and difference families. IEEE Transactions on Information Theory 41(1), 77–87 (1995) https://doi.org/10.1109/18.370117 Nordio and Viterbo [2003] Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Moreno, O., Zhang, Z., Kumar, P.V., Zinoviev, V.A.: New constructions of optimal cyclically permutable constant weight codes. IEEE Transactions on Information Theory 41(2), 448–455 (1995) https://doi.org/10.1109/18.370146 Bitan and Etzion [1995] Bitan, S., Etzion, T.: Constructions for optimal constant weight cyclically permutable codes and difference families. IEEE Transactions on Information Theory 41(1), 77–87 (1995) https://doi.org/10.1109/18.370117 Nordio and Viterbo [2003] Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Bitan, S., Etzion, T.: Constructions for optimal constant weight cyclically permutable codes and difference families. IEEE Transactions on Information Theory 41(1), 77–87 (1995) https://doi.org/10.1109/18.370117 Nordio and Viterbo [2003] Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Agrell, E., Vardy, A., Zeger, K.: Upper bounds for constant-weight codes. IEEE Transactions on Information Theory 46(7), 2373–2395 (2000) https://doi.org/10.1109/18.887851 Brouwer [2023] Brouwer, A.: Bounds for binary constant weight codes. https://www.win.tue.nl/%7eaeb/codes/Andw.html. [Online; accessed 23-Oct-2023] (2023) Moreno et al. [1995] Moreno, O., Zhang, Z., Kumar, P.V., Zinoviev, V.A.: New constructions of optimal cyclically permutable constant weight codes. IEEE Transactions on Information Theory 41(2), 448–455 (1995) https://doi.org/10.1109/18.370146 Bitan and Etzion [1995] Bitan, S., Etzion, T.: Constructions for optimal constant weight cyclically permutable codes and difference families. IEEE Transactions on Information Theory 41(1), 77–87 (1995) https://doi.org/10.1109/18.370117 Nordio and Viterbo [2003] Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Brouwer, A.: Bounds for binary constant weight codes. https://www.win.tue.nl/%7eaeb/codes/Andw.html. [Online; accessed 23-Oct-2023] (2023) Moreno et al. [1995] Moreno, O., Zhang, Z., Kumar, P.V., Zinoviev, V.A.: New constructions of optimal cyclically permutable constant weight codes. IEEE Transactions on Information Theory 41(2), 448–455 (1995) https://doi.org/10.1109/18.370146 Bitan and Etzion [1995] Bitan, S., Etzion, T.: Constructions for optimal constant weight cyclically permutable codes and difference families. IEEE Transactions on Information Theory 41(1), 77–87 (1995) https://doi.org/10.1109/18.370117 Nordio and Viterbo [2003] Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Moreno, O., Zhang, Z., Kumar, P.V., Zinoviev, V.A.: New constructions of optimal cyclically permutable constant weight codes. IEEE Transactions on Information Theory 41(2), 448–455 (1995) https://doi.org/10.1109/18.370146 Bitan and Etzion [1995] Bitan, S., Etzion, T.: Constructions for optimal constant weight cyclically permutable codes and difference families. IEEE Transactions on Information Theory 41(1), 77–87 (1995) https://doi.org/10.1109/18.370117 Nordio and Viterbo [2003] Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Bitan, S., Etzion, T.: Constructions for optimal constant weight cyclically permutable codes and difference families. IEEE Transactions on Information Theory 41(1), 77–87 (1995) https://doi.org/10.1109/18.370117 Nordio and Viterbo [2003] Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Brouwer, A.: Bounds for binary constant weight codes. https://www.win.tue.nl/%7eaeb/codes/Andw.html. [Online; accessed 23-Oct-2023] (2023) Moreno et al. [1995] Moreno, O., Zhang, Z., Kumar, P.V., Zinoviev, V.A.: New constructions of optimal cyclically permutable constant weight codes. IEEE Transactions on Information Theory 41(2), 448–455 (1995) https://doi.org/10.1109/18.370146 Bitan and Etzion [1995] Bitan, S., Etzion, T.: Constructions for optimal constant weight cyclically permutable codes and difference families. IEEE Transactions on Information Theory 41(1), 77–87 (1995) https://doi.org/10.1109/18.370117 Nordio and Viterbo [2003] Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Moreno, O., Zhang, Z., Kumar, P.V., Zinoviev, V.A.: New constructions of optimal cyclically permutable constant weight codes. IEEE Transactions on Information Theory 41(2), 448–455 (1995) https://doi.org/10.1109/18.370146 Bitan and Etzion [1995] Bitan, S., Etzion, T.: Constructions for optimal constant weight cyclically permutable codes and difference families. IEEE Transactions on Information Theory 41(1), 77–87 (1995) https://doi.org/10.1109/18.370117 Nordio and Viterbo [2003] Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Bitan, S., Etzion, T.: Constructions for optimal constant weight cyclically permutable codes and difference families. IEEE Transactions on Information Theory 41(1), 77–87 (1995) https://doi.org/10.1109/18.370117 Nordio and Viterbo [2003] Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Moreno, O., Zhang, Z., Kumar, P.V., Zinoviev, V.A.: New constructions of optimal cyclically permutable constant weight codes. IEEE Transactions on Information Theory 41(2), 448–455 (1995) https://doi.org/10.1109/18.370146 Bitan and Etzion [1995] Bitan, S., Etzion, T.: Constructions for optimal constant weight cyclically permutable codes and difference families. IEEE Transactions on Information Theory 41(1), 77–87 (1995) https://doi.org/10.1109/18.370117 Nordio and Viterbo [2003] Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Bitan, S., Etzion, T.: Constructions for optimal constant weight cyclically permutable codes and difference families. IEEE Transactions on Information Theory 41(1), 77–87 (1995) https://doi.org/10.1109/18.370117 Nordio and Viterbo [2003] Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Bitan, S., Etzion, T.: Constructions for optimal constant weight cyclically permutable codes and difference families. IEEE Transactions on Information Theory 41(1), 77–87 (1995) https://doi.org/10.1109/18.370117 Nordio and Viterbo [2003] Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Nordio, A., Viterbo, E.: Permutation modulation for fading channels. In: 10th International Conference on Telecommunications, 2003. ICT 2003., vol. 2, pp. 1177–11832 (2003). https://doi.org/10.1109/ICTEL.2003.1191603 MacWilliams and Sloane [1977] MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. Mathematical Library. North-Holland Publishing Company, New York (1977) Schalkwijk [1972] Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Schalkwijk, J.: An algorithm for source coding. IEEE Transactions on Information Theory 18(3), 395–399 (1972) Cover [1973] Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Cover, T.: Enumerative source encoding. IEEE Transactions on Information Theory 19(1), 73–77 (1973) Lehmer [1960] Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: Proc. Sympos. Appl. Math., Vol. 10, pp. 179–193. Amer. Math. Soc., Providence, RI, New York (1960) Pascal [1887] Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Pascal, E.: Sopra una formula numerica. Gi Di Mat 25, 45–49 (1887) Knott [1974] Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Knott, G.D.: A numbering systems for combinations. Commun. ACM 17(1), 45–46 (1974) Er [1985] Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Er, M.C.: Lexicographic ordering, ranking and unranking of combinations. Int. J. Comput. Math. 17(1), 277–283 (1985) Kokosinski [1995] Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Kokosinski, Z.: Algorithms for unranking combinations and their applications. In: Hamza, M.H. (ed.) Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, Washington, D.C., USA, October 19-21, 1995, pp. 216–224 (1995) Ruskey and Williams [2009] Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Ruskey, F., Williams, A.: The coolest way to generate combinations. Discret. Math. 309(17), 5305–5320 (2009) Genitrini and Pépin [2021] Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Genitrini, A., Pépin, M.: Lexicographic unranking of combinations revisited. Algorithms 14(3), 97 (2021) Kruchinin et al. [2022] Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Kruchinin, V.V., Shablya, Y.V., Kruchinin, D.V., Rulevskiy, V.: Unranking small combinations of a large set in co-lexicographic order. Algorithms 15(2), 36 (2022) Sendrier [2005] Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Sendrier, N.: Encoding information into constant weight words. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp. 435–438 (2005) Slepian [1965] Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Slepian, D.: Permutation modulation. Proceedings of the IEEE 53(3), 228–236 (1965) https://doi.org/10.1109/PROC.1965.3680 Riordan [1978] Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Riordan, J.: An Introduction to Combinatorial Analysis. Princeton Legacy Library. Princeton University Press, Princeton (1978) Dai and Zakhor [2003] Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Dai, V., Zakhor, A.: Binary combinatorial coding. In: Data Compression Conference, 2003. Proceedings. DCC 2003, p. 420 (2003). https://doi.org/10.1109/DCC.2003.1194039 Kurmaev [2011] Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Kurmaev, O.F.: Constant-weight and constant-charge binary run-length limited codes. IEEE Transactions on Information Theory 57(7), 4497–4515 (2011) https://doi.org/10.1109/TIT.2011.2145490 Ericson and Zinoviev [2001] Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Ericson, T., Zinoviev, V.: Chapter 6 - non-symmetric alphabets. In: Ericson, T., Zinoviev, V. (eds.) Codes on Euclidean Spheres. North-Holland Mathematical Library, vol. 63, pp. 179–194. Elsevier, New York (2001). https://doi.org/10.1016/S0924-6509(01)80051-9 Chung and Kumar [1990] Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Chung, H., Kumar, P.V.: Optical orthogonal codes - new bounds and an optimal construction. IEEE Transactions on Information Theory 36(4), 866–873 (1990) https://doi.org/10.1109/18.53748 Ding et al. [2009] Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Ding, C., Fuji-Hara, R., Fujiwara, Y., Jimbo, M., Mishima, M.: Sets of frequency hopping sequences: Bounds and optimal constructions. IEEE Transactions on Information Theory 55(7), 3297–3304 (2009) https://doi.org/10.1109/TIT.2009.2021366 Finiasz et al. [2011] Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011) Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)
- Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: ECRYPT Hash Workshop 2007, Proceedings, p. 155 (2011)