-
Soft Decision Decoding of Recursive Plotkin Constructions Based on Hidden Code Words
Authors:
Martin Bossert
Abstract:
The Plotkin construction combines two codes to a code of doubled length. It can be applied recursively. The class of Reed-Muller (RM) codes is a particular example. Also, a special class of generalized concatenated codes (GCC) can be described as recursive Plotkin construction. Exploiting a property of the code words constructed by the recursive Plotkin construction, we present novel soft-decision…
▽ More
The Plotkin construction combines two codes to a code of doubled length. It can be applied recursively. The class of Reed-Muller (RM) codes is a particular example. Also, a special class of generalized concatenated codes (GCC) can be described as recursive Plotkin construction. Exploiting a property of the code words constructed by the recursive Plotkin construction, we present novel soft-decision decoders. These are based on the decoding of hidden code words which are inherent contained in the constructed code words and can be uncovered by adding particular parts of the overall code word. The main idea is to use more than one decoding variant where each variant starts with the decoding of a different hidden code word. The final decoding decision selects the best of the decisions of the used variants. The more variants are used the closer the performance gets to the maximum-likelihood (ML) decoding performance. This is verified by an ML-bound for the cases where the ML performance is not known. The decoding algorithms use only additions, comparisons, and sign operations. Further, due to the recursive structure, only relatively short codes have to be decoded, thus, the decoding complexity is very low. In addition, we introduce two novel classes of half-rate codes based on recursive Plotkin constructions with RM codes.
△ Less
Submitted 23 August, 2024;
originally announced August 2024.
-
A New Aligned Simple German Corpus
Authors:
Vanessa Toborek,
Moritz Busch,
Malte Boßert,
Christian Bauckhage,
Pascal Welke
Abstract:
"Leichte Sprache", the German counterpart to Simple English, is a regulated language aiming to facilitate complex written language that would otherwise stay inaccessible to different groups of people. We present a new sentence-aligned monolingual corpus for Simple German -- German. It contains multiple document-aligned sources which we have aligned using automatic sentence-alignment methods. We ev…
▽ More
"Leichte Sprache", the German counterpart to Simple English, is a regulated language aiming to facilitate complex written language that would otherwise stay inaccessible to different groups of people. We present a new sentence-aligned monolingual corpus for Simple German -- German. It contains multiple document-aligned sources which we have aligned using automatic sentence-alignment methods. We evaluate our alignments based on a manually labelled subset of aligned documents. The quality of our sentence alignments, as measured by F1-score, surpasses previous work. We publish the dataset under CC BY-SA and the accompanying code under MIT license.
△ Less
Submitted 26 May, 2023; v1 submitted 2 September, 2022;
originally announced September 2022.
-
On Hard and Soft Decision Decoding of BCH Codes
Authors:
Martin Bossert,
Rebekka Schulz,
Sebastian Bitzer
Abstract:
The binary primitive BCH codes are cyclic and are constructed by choosing a subset of the cyclotomic cosets. Which subset is chosen determines the dimension, the minimum distance and the weight distribution of the BCH code. We construct possible BCH codes and determine their coderate, true minimum distance and the non-equivalent codes. A particular choice of cyclotomic cosets gives BCH codes which…
▽ More
The binary primitive BCH codes are cyclic and are constructed by choosing a subset of the cyclotomic cosets. Which subset is chosen determines the dimension, the minimum distance and the weight distribution of the BCH code. We construct possible BCH codes and determine their coderate, true minimum distance and the non-equivalent codes. A particular choice of cyclotomic cosets gives BCH codes which are, extended by one bit, equivalent to Reed-Muller codes, which is a known result from the sixties. We show that BCH codes have possibly better parameters than Reed-Muller codes, which are related in recent publications to polar codes. We study the decoding performance of these different BCH codes using information set decoding based on minimal weight codewords of the dual code. We show that information set decoding is possible even in case of a channel without reliability information since the decoding algorithm inherently calculates reliability information. Different BCH codes of the same rate are compared and different decoding performances and complexity are observed. Some examples of hard decision decoding of BCH codes have the same decoding performance as maximum likelihood decoding. All presented decoding methods can possibly be extended to include reliability information of a Gaussian channel for soft decision decoding. We show simulation results for soft decision list information set decoding and compare the performance to other methods.
△ Less
Submitted 20 June, 2022; v1 submitted 15 July, 2021;
originally announced July 2021.
-
Bounds and Genericity of Sum-Rank-Metric Codes
Authors:
Cornelia Ott,
Sven Puchinger,
Martin Bossert
Abstract:
We derive simplified sphere-packing and Gilbert--Varshamov bounds for codes in the sum-rank metric, which can be computed more efficiently than previous ones. They give rise to asymptotic bounds that cover the asymptotic setting that has not yet been considered in the literature: families of sum-rank-metric codes whose block size grows in the code length. We also provide two genericity results: we…
▽ More
We derive simplified sphere-packing and Gilbert--Varshamov bounds for codes in the sum-rank metric, which can be computed more efficiently than previous ones. They give rise to asymptotic bounds that cover the asymptotic setting that has not yet been considered in the literature: families of sum-rank-metric codes whose block size grows in the code length. We also provide two genericity results: we show that random linear codes achieve almost the sum-rank-metric Gilbert--Varshamov bound with high probability. Furthermore, we derive bounds on the probability that a random linear code attains the sum-rank-metric Singleton bound, showing that for large enough extension fields, almost all linear codes achieve it.
△ Less
Submitted 21 March, 2023; v1 submitted 3 February, 2021;
originally announced February 2021.
-
Direct observation of homogeneous cavitation in nanopores
Authors:
V. Doebele,
A. Benoit-Gonin,
F. Souris,
L. Cagnon,
P. Spathis,
P. E. Wolf,
A. Grosman,
M. Bossert,
I. Trimaille,
C. Noûs,
E. Rolley
Abstract:
We report on the evaporation of hexane from porous alumina and silicon membranes. These membranes contain billions of independent nanopores tailored to an ink-bottle shape, where a cavity several tens of nanometers in diameter is separated from the bulk vapor by a constriction. For alumina membranes with narrow enough constrictions, we demonstrate that cavity evaporation proceeds by cavitation. Me…
▽ More
We report on the evaporation of hexane from porous alumina and silicon membranes. These membranes contain billions of independent nanopores tailored to an ink-bottle shape, where a cavity several tens of nanometers in diameter is separated from the bulk vapor by a constriction. For alumina membranes with narrow enough constrictions, we demonstrate that cavity evaporation proceeds by cavitation. Measurements of the pressure dependence of the cavitation rate follow the predictions of the bulk, homogeneous, classical nucleation theory, definitively establishing the relevance of homogeneous cavitation as an evaporation mechanism in mesoporous materials. Our results imply that porous alumina membranes are a promising new system to study liquids in a deeply metastable state.
△ Less
Submitted 14 December, 2020; v1 submitted 7 July, 2020;
originally announced July 2020.
-
On Decoding Using Codewords of the Dual Code
Authors:
Martin Bossert
Abstract:
We present novel decoding schemes for hard and soft decision decoding of block codes using the minimal weight codewords of the dual code. The decoding schemes will be described for cyclic codes where polynomials can be used, however, the modification for non-cyclic codes is possible and straight forward. The hard decision decoding calculates syndrome polynomials which are the product of the receiv…
▽ More
We present novel decoding schemes for hard and soft decision decoding of block codes using the minimal weight codewords of the dual code. The decoding schemes will be described for cyclic codes where polynomials can be used, however, the modification for non-cyclic codes is possible and straight forward. The hard decision decoding calculates syndrome polynomials which are the product of the received polynomial with dual codewords. Proper cyclic shifts of these syndrome polynomials are obtained and the non-zero positions are counted componentwise for these shifts. The values of this counting are a reliability measure and can be used for locating the error and also the non-error positions. This reliability measure is the basis for various variants of hard decision decoding algorithms. Decoding schemes with iterative error reduction are possible as well as information set decoding using the inherent reliability information of the measure even if there is no reliability information from the channel. Further, we will show how reliability information from the channel can be included in order to obtain soft decision decoding schemes. We derive the relation between bit flipping, believe propagation, and majority logic decoding to the novel schemes. As examples to illustrate the functioning we use BCH and Reed-Muller codes as examples for binary codes, and RS codes for non-binary codes. Besides the Plotkin construction we recall a known result that Reed-Muller codes punctured by one position are cyclic and thus, are equivalent to special cases of BCH codes. Simulation results for hard and soft decision decoding will be given for several examples and compared with results from literature. Finally, we analyze the soft decision decoding of the Plotkin construction and derive that one of the two codes uses a $3$ dB better channel (also known as channel polarization).
△ Less
Submitted 9 January, 2020;
originally announced January 2020.
-
Reed-Solomon Codes over Fields of Characteristic Zero
Authors:
Carmen Sippel,
Cornelia Ott,
Sven Puchinger,
Martin Bossert
Abstract:
We study Reed--Solomon codes over arbitrary fields, inspired by several recent papers dealing with Gabidulin codes over fields of characteristic zero. Over the field of rational numbers, we derive bounds on the coefficient growth during encoding and the bit complexity of decoding, which is polynomial in the code length and in the bit width of error and codeword values. The results can be generaliz…
▽ More
We study Reed--Solomon codes over arbitrary fields, inspired by several recent papers dealing with Gabidulin codes over fields of characteristic zero. Over the field of rational numbers, we derive bounds on the coefficient growth during encoding and the bit complexity of decoding, which is polynomial in the code length and in the bit width of error and codeword values. The results can be generalized to arbitrary number fields.
△ Less
Submitted 28 June, 2019; v1 submitted 21 January, 2019;
originally announced January 2019.
-
Structural Properties of Twisted Reed-Solomon Codes with Applications to Cryptography
Authors:
Peter Beelen,
Martin Bossert,
Sven Puchinger,
Johan Rosenkilde
Abstract:
We present a generalisation of Twisted Reed-Solomon codes containing a new large class of MDS codes. We prove that the code class contains a large subfamily that is closed under duality. Furthermore, we study the Schur squares of the new codes and show that their dimension is often large. Using these structural properties, we single out a subfamily of the new codes which could be considered for co…
▽ More
We present a generalisation of Twisted Reed-Solomon codes containing a new large class of MDS codes. We prove that the code class contains a large subfamily that is closed under duality. Furthermore, we study the Schur squares of the new codes and show that their dimension is often large. Using these structural properties, we single out a subfamily of the new codes which could be considered for code-based cryptography: These codes resist some existing structural attacks for Reed-Solomon-like codes, i.e. methods for retrieving the code parameters from an obfuscated generator matrix.
△ Less
Submitted 11 May, 2018; v1 submitted 22 January, 2018;
originally announced January 2018.
-
Algebraic Soft Decoding of Reed-Solomon Codes Using Module Minimization
Authors:
Jiongyue Xing,
Li Chen,
Martin Bossert
Abstract:
The interpolation based algebraic decoding for Reed-Solomon (RS) codes can correct errors beyond half of the code's minimum Hamming distance. Using soft information, the algebraic soft decoding (ASD) further improves the decoding performance. This paper presents a unified study of two classical ASD algorithms in which the computationally expensive interpolation is solved by the module minimization…
▽ More
The interpolation based algebraic decoding for Reed-Solomon (RS) codes can correct errors beyond half of the code's minimum Hamming distance. Using soft information, the algebraic soft decoding (ASD) further improves the decoding performance. This paper presents a unified study of two classical ASD algorithms in which the computationally expensive interpolation is solved by the module minimization (MM) technique. An explicit module basis construction for the two ASD algorithms will be introduced. Compared with Koetter's interpolation, the MM interpolation enables the algebraic Chase decoding and the Koetter-Vardy decoding perform less finite field arithmetic operations. Re-encoding transform is applied to further reduce the decoding complexity. Computational cost of the two ASD algorithms as well as their re-encoding transformed variants are analyzed. This research shows re-encoding transform attributes to a lower decoding complexity by reducing the degree of module generators. Furthermore, Monte-Carlo simulation of the two ASD algorithms has been performed to show their decoding and complexity competency.
△ Less
Submitted 17 May, 2018; v1 submitted 4 December, 2017;
originally announced December 2017.
-
Code Constructions based on Reed-Solomon Codes
Authors:
Michael Schelling,
Martin Bossert
Abstract:
Reed--Solomon codes are a well--studied code class which fulfill the Singleton bound with equality. However, their length is limited to the size $q$ of the underlying field $\mathbb{F}_q$. In this paper we present a code construction which yields codes with lengths of factors of the field size. Furthermore a decoding algorithm beyond half the minimum distance is given and analyzed.
Reed--Solomon codes are a well--studied code class which fulfill the Singleton bound with equality. However, their length is limited to the size $q$ of the underlying field $\mathbb{F}_q$. In this paper we present a code construction which yields codes with lengths of factors of the field size. Furthermore a decoding algorithm beyond half the minimum distance is given and analyzed.
△ Less
Submitted 19 June, 2017;
originally announced June 2017.
-
On the Success Probability of Decoding (Partial) Unit Memory Codes
Authors:
Sven Puchinger,
Sven Müelich,
Martin Bossert
Abstract:
In this paper, we derive analytic expressions for the success probability of decoding (Partial) Unit Memory codes in memoryless channels. An applications of this result is that these codes outperform individual block codes in certain channels.
In this paper, we derive analytic expressions for the success probability of decoding (Partial) Unit Memory codes in memoryless channels. An applications of this result is that these codes outperform individual block codes in certain channels.
△ Less
Submitted 24 May, 2017;
originally announced May 2017.
-
Using Convolutional Codes for Key Extraction in SRAM Physical Unclonable Functions
Authors:
Sven Müelich,
Sven Puchinger,
Martin Bossert
Abstract:
Physical Unclonable Functions (PUFs) exploit variations in the manufacturing process to derive bit sequences from integrated circuits, which can be used as secure cryptographic keys. Instead of storing the keys in an insecure, non-volatile memory, they can be reproduced when needed. Since the reproduced sequences are not stable due to physical reasons, error correction must be applied. Recently, c…
▽ More
Physical Unclonable Functions (PUFs) exploit variations in the manufacturing process to derive bit sequences from integrated circuits, which can be used as secure cryptographic keys. Instead of storing the keys in an insecure, non-volatile memory, they can be reproduced when needed. Since the reproduced sequences are not stable due to physical reasons, error correction must be applied. Recently, convolutional codes were shown to be suitable for key reproduction in PUFs based on SRAM. This work shows how to further decrease the reconstruction failure probability and PUF implementation size using codes with larger memory length and decoding concepts such as soft-information and list decoding.
△ Less
Submitted 10 January, 2018; v1 submitted 5 April, 2017;
originally announced April 2017.
-
Constructing an LDPC Code Containing a Given Vector
Authors:
Sven Müelich,
Sven Puchinger,
Martin Bossert
Abstract:
The coding problem considered in this work is to construct a linear code $\mathcal{C}$ of given length $n$ and dimension $k<n$ such that a given binary vector $\mathbf{r} \in \mathbb{F}^{n}$ is contained in the code. We study a recent solution of this problem by Müelich and Bossert, which is based on LDPC codes. We address two open questions of this construction. First, we show that under certain…
▽ More
The coding problem considered in this work is to construct a linear code $\mathcal{C}$ of given length $n$ and dimension $k<n$ such that a given binary vector $\mathbf{r} \in \mathbb{F}^{n}$ is contained in the code. We study a recent solution of this problem by Müelich and Bossert, which is based on LDPC codes. We address two open questions of this construction. First, we show that under certain assumptions, this code construction is possible with high probability if $\mathbf{r}$ is chosen uniformly at random. Second, we calculate the uncertainty of $\mathbf{r}$ given the constructed code $\mathcal{C}$. We present an application of this problem in the field of Physical Unclonable Functions (PUFs).
△ Less
Submitted 14 August, 2018; v1 submitted 23 March, 2017;
originally announced March 2017.
-
Multi-Block Interleaved Codes for Local and Global Read Access
Authors:
Yuval Cassuto,
Evyatar Hemo,
Sven Puchinger,
Martin Bossert
Abstract:
We define multi-block interleaved codes as codes that allow reading information from either a small sub-block or from a larger full block. The former offers faster access, while the latter provides better reliability. We specify the correction capability of the sub-block code through its gap $t$ from optimal minimum distance, and look to have full-block minimum distance that grows with the paramet…
▽ More
We define multi-block interleaved codes as codes that allow reading information from either a small sub-block or from a larger full block. The former offers faster access, while the latter provides better reliability. We specify the correction capability of the sub-block code through its gap $t$ from optimal minimum distance, and look to have full-block minimum distance that grows with the parameter $t$. We construct two families of such codes when the number of sub-blocks is $3$. The codes match the distance properties of known integrated-interleaving codes, but with the added feature of mapping the same number of information symbols to each sub-block. As such, they are the first codes that provide read access in multiple size granularities and correction capabilities.
△ Less
Submitted 25 January, 2017;
originally announced January 2017.
-
Guruswami--Sudan List Decoding for Complex Reed--Solomon Codes
Authors:
Mostafa H. Mohamed,
Sven Puchinger,
Martin Bossert
Abstract:
We analyze the Guruswami--Sudan list decoding algorithm for Reed--Solomon codes over the complex field for sparse recovery in Compressed Sensing. We propose methods of stabilizing both the interpolation and the root-finding steps against numerical instabilities, where the latter is the most sensitive. For this purpose, we modify the Roth--Ruckenstein algorithm and propose a method to refine its re…
▽ More
We analyze the Guruswami--Sudan list decoding algorithm for Reed--Solomon codes over the complex field for sparse recovery in Compressed Sensing. We propose methods of stabilizing both the interpolation and the root-finding steps against numerical instabilities, where the latter is the most sensitive. For this purpose, we modify the Roth--Ruckenstein algorithm and propose a method to refine its result using Newton's method. The overall decoding performance is then further improved using Generalized Minimum Distance decoding based on intrinsic soft information. This method also allows to obtain a unique solution of the recovery problem. The approach is numerically evaluated and shown to improve upon recently proposed decoding techniques.
△ Less
Submitted 23 November, 2016;
originally announced November 2016.
-
Timing Attack Resilient Decoding Algorithms for Physical Unclonable Functions
Authors:
Sven Puchinger,
Sven Müelich,
Antonia Wachter-Zeh,
Martin Bossert
Abstract:
This paper deals with the application of list decoding of Reed--Solomon codes to a concatenated code for key reproduction using Physical Unclonable Functions. The resulting codes achieve a higher error-correction performance at the same code rate than known schemes in this scenario. We also show that their decoding algorithms can be protected from side-channel attacks on the runtime both by maskin…
▽ More
This paper deals with the application of list decoding of Reed--Solomon codes to a concatenated code for key reproduction using Physical Unclonable Functions. The resulting codes achieve a higher error-correction performance at the same code rate than known schemes in this scenario. We also show that their decoding algorithms can be protected from side-channel attacks on the runtime both by masking techniques and by directly modifying the algorithms to have constant runtime.
△ Less
Submitted 23 November, 2016;
originally announced November 2016.
-
A New Error Correction Scheme for Physical Unclonable Functions
Authors:
Sven Müelich,
Martin Bossert
Abstract:
Error correction is an indispensable component when Physical Unclonable Functions (PUFs) are used in cryptographic applications. So far, there exist schemes that obtain helper data, which they need within the error correction process. We introduce a new scheme, which only uses an error correcting code without any further helper data. The main idea is to construct for each PUF instance an individua…
▽ More
Error correction is an indispensable component when Physical Unclonable Functions (PUFs) are used in cryptographic applications. So far, there exist schemes that obtain helper data, which they need within the error correction process. We introduce a new scheme, which only uses an error correcting code without any further helper data. The main idea is to construct for each PUF instance an individual code which contains the initial PUF response as codeword. In this work we use LDPC codes, however other code classes are also possible. Our scheme allows a trade-off between code rate and cryptographic security. In addition, decoding with linear complexity is possible.
△ Less
Submitted 8 November, 2016; v1 submitted 7 November, 2016;
originally announced November 2016.
-
Space-Time Codes Based on Rank-Metric Codes and Their Decoding
Authors:
Sven Puchinger,
Sebastian Stern,
Martin Bossert,
Robert F. H. Fischer
Abstract:
We propose a new class of space-time block codes based on finite-field rank-metric codes in combination with a rank-metric-preserving mapping to the set of Eisenstein integers. It is shown that these codes achieve maximum diversity order and improve upon certain existing constructions. Moreover, we present a new decoding algorithm for these codes which utilizes the algebraic structure of the under…
▽ More
We propose a new class of space-time block codes based on finite-field rank-metric codes in combination with a rank-metric-preserving mapping to the set of Eisenstein integers. It is shown that these codes achieve maximum diversity order and improve upon certain existing constructions. Moreover, we present a new decoding algorithm for these codes which utilizes the algebraic structure of the underlying finite-field rank-metric codes and employs lattice-reduction-aided equalization. This decoder does not achieve the same performance as the classical maximum-likelihood decoding methods, but has polynomial complexity in the matrix dimension, making it usable for large field sizes and numbers of antennas.
△ Less
Submitted 29 May, 2017; v1 submitted 18 May, 2016;
originally announced May 2016.
-
Decoding Interleaved Gabidulin Codes using Alekhnovich's Algorithm
Authors:
Sven Puchinger,
Sven Müelich,
David Mödinger,
Johan Rosenkilde né Nielsen,
Martin Bossert
Abstract:
We prove that Alekhnovich's algorithm can be used for row reduction of skew polynomial matrices. This yields an $O(\ell^3 n^{(ω+1)/2} \log(n))$ decoding algorithm for $\ell$-Interleaved Gabidulin codes of length $n$, where $ω$ is the matrix multiplication exponent, improving in the exponent of $n$ compared to previous results.
We prove that Alekhnovich's algorithm can be used for row reduction of skew polynomial matrices. This yields an $O(\ell^3 n^{(ω+1)/2} \log(n))$ decoding algorithm for $\ell$-Interleaved Gabidulin codes of length $n$, where $ω$ is the matrix multiplication exponent, improving in the exponent of $n$ compared to previous results.
△ Less
Submitted 15 September, 2016; v1 submitted 20 April, 2016;
originally announced April 2016.
-
Low-Rank Matrix Recovery using Gabidulin Codes in Characteristic Zero
Authors:
Sven Müelich,
Sven Puchinger,
Martin Bossert
Abstract:
We present a new approach on low-rank matrix recovery (LRMR) based on Gabidulin Codes. Since most applications of LRMR deal with matrices over infinite fields, we use the recently introduced generalization of Gabidulin codes to fields of characterstic zero. We show that LRMR can be reduced to decoding of Gabidulin codes and discuss which field extensions can be used in the code construction.
We present a new approach on low-rank matrix recovery (LRMR) based on Gabidulin Codes. Since most applications of LRMR deal with matrices over infinite fields, we use the recently introduced generalization of Gabidulin codes to fields of characterstic zero. We show that LRMR can be reduced to decoding of Gabidulin codes and discuss which field extensions can be used in the code construction.
△ Less
Submitted 15 September, 2016; v1 submitted 15 April, 2016;
originally announced April 2016.
-
An Alternative Decoding Method for Gabidulin Codes in Characteristic Zero
Authors:
Sven Müelich,
Sven Puchinger,
David Mödinger,
Martin Bossert
Abstract:
Gabidulin codes, originally defined over finite fields, are an important class of rank metric codes with various applications. Recently, their definition was generalized to certain fields of characteristic zero and a Welch--Berlekamp like algorithm with complexity $O(n^3)$ was given. We propose a new application of Gabidulin codes over infinite fields: low-rank matrix recovery. Also, an alternativ…
▽ More
Gabidulin codes, originally defined over finite fields, are an important class of rank metric codes with various applications. Recently, their definition was generalized to certain fields of characteristic zero and a Welch--Berlekamp like algorithm with complexity $O(n^3)$ was given. We propose a new application of Gabidulin codes over infinite fields: low-rank matrix recovery. Also, an alternative decoding approach is presented based on a Gao type key equation, reducing the complexity to at least $O(n^2)$. This method immediately connects the decoding problem to well-studied problems, which have been investigated in terms of coefficient growth and numerical stability.
△ Less
Submitted 21 April, 2016; v1 submitted 20 January, 2016;
originally announced January 2016.
-
Code-Based Cryptosystems Using Generalized Concatenated Codes
Authors:
Sven Puchinger,
Sven Müelich,
Karim Ishak,
Martin Bossert
Abstract:
The security of public-key cryptosystems is mostly based on number theoretic problems like factorization and the discrete logarithm. There exists an algorithm which solves these problems in polynomial time using a quantum computer. Hence, these cryptosystems will be broken as soon as quantum computers emerge. Code-based cryptography is an alternative which resists quantum computers since its secur…
▽ More
The security of public-key cryptosystems is mostly based on number theoretic problems like factorization and the discrete logarithm. There exists an algorithm which solves these problems in polynomial time using a quantum computer. Hence, these cryptosystems will be broken as soon as quantum computers emerge. Code-based cryptography is an alternative which resists quantum computers since its security is based on an NP-complete problem, namely decoding of random linear codes. The McEliece cryptosystem is the most prominent scheme to realize code-based cryptography. Many codeclasses were proposed for the McEliece cryptosystem, but most of them are broken by now. Sendrier suggested to use ordinary concatenated codes, however, he also presented an attack on such codes. This work investigates generalized concatenated codes to be used in the McEliece cryptosystem. We examine the application of Sendrier's attack on generalized concatenated codes and present alternative methods for both partly finding the code structure and recovering the plaintext from a cryptogram. Further, we discuss modifications of the cryptosystem making it resistant against these attacks.
△ Less
Submitted 26 November, 2015;
originally announced November 2015.
-
Error Correction for Differential Linear Network Coding in Slowly-Varying Networks
Authors:
Sven Puchinger,
Michael Cyran,
Robert F. H. Fischer,
Martin Bossert,
Johannes B. Huber
Abstract:
Differential linear network coding (DLNC) is a precoding scheme for information transmission over random linear networks. By using differential encoding and decoding, the conventional approach of lifting, required for inherent channel sounding, can be omitted and in turn higher transmission rates are supported. However, the scheme is sensitive to variations in the network topology. In this paper,…
▽ More
Differential linear network coding (DLNC) is a precoding scheme for information transmission over random linear networks. By using differential encoding and decoding, the conventional approach of lifting, required for inherent channel sounding, can be omitted and in turn higher transmission rates are supported. However, the scheme is sensitive to variations in the network topology. In this paper, we derive an extended DLNC channel model which includes slow network changes. Based on this, we propose and analyze a suitable channel coding scheme matched to the situation at hand using rank-metric convolutional codes.
△ Less
Submitted 28 January, 2015;
originally announced January 2015.
-
On Error Correction for Physical Unclonable Functions
Authors:
Sven Puchinger,
Sven Müelich,
Martin Bossert,
Matthias Hiller,
Georg Sigl
Abstract:
Physical Unclonable Functions evaluate manufacturing variations to generate secure cryptographic keys for embedded systems without secure key storage. It is explained how methods from coding theory are applied in order to ensure reliable key reproduction. We show how better results can be obtained using code classes and decoding principles not used for this scenario before. These methods are exemp…
▽ More
Physical Unclonable Functions evaluate manufacturing variations to generate secure cryptographic keys for embedded systems without secure key storage. It is explained how methods from coding theory are applied in order to ensure reliable key reproduction. We show how better results can be obtained using code classes and decoding principles not used for this scenario before. These methods are exemplified by specific code constructions which improve existing codes with respect to error probability, decoding complexity and codeword length.
△ Less
Submitted 27 January, 2015;
originally announced January 2015.
-
Error Correction for Physical Unclonable Functions Using Generalized Concatenated Codes
Authors:
Sven Müelich,
Sven Puchinger,
Martin Bossert,
Matthias Hiller,
Georg Sigl
Abstract:
Physical Unclonable Functions can be used for secure key generation in cryptographic applications. It is explained how methods from coding theory must be applied in order to ensure reliable key regeneration. Based on previous work, we show ways how to obtain better results with respect to error probability and codeword length. Also, an example based on Generalized Concatenated codes is given, whic…
▽ More
Physical Unclonable Functions can be used for secure key generation in cryptographic applications. It is explained how methods from coding theory must be applied in order to ensure reliable key regeneration. Based on previous work, we show ways how to obtain better results with respect to error probability and codeword length. Also, an example based on Generalized Concatenated codes is given, which improves upon used coding schemes for PUFs.
△ Less
Submitted 30 July, 2014;
originally announced July 2014.
-
Reduced List-Decoding of Reed--Solomon Codes Using Reliability Information
Authors:
Mostafa Hosni Mohamed,
Johan S. R. Nielsen,
Martin Bossert
Abstract:
We decode Reed-Solomon codes using soft information provided at the receiver. The Extended Euclidean Algorithm (EEA) is considered as an initial step to obtain an intermediate result. The final decoding result is obtained by interpolating the output of the EEA at the least reliable positions of the received word. We refer to this decoding method as reduced list-decoding, since not all received pos…
▽ More
We decode Reed-Solomon codes using soft information provided at the receiver. The Extended Euclidean Algorithm (EEA) is considered as an initial step to obtain an intermediate result. The final decoding result is obtained by interpolating the output of the EEA at the least reliable positions of the received word. We refer to this decoding method as reduced list-decoding, since not all received positions are used in the interpolation as in other list-decoding methods, such as the Guruswami-Sudan and Wu algorithms. Consequently the complexity of the interpolation step is reduced considerably. The probability of failure can be minimised by adjusting certain parameters, making it comparable with the Kötter-Vardy algorithm but having a much lower complexity.
△ Less
Submitted 3 June, 2014;
originally announced June 2014.
-
Coherence Optimization and Best Complex Antipodal Spherical Codes
Authors:
Henning Zörlein,
Martin Bossert
Abstract:
Vector sets with optimal coherence according to the Welch bound cannot exist for all pairs of dimension and cardinality. If such an optimal vector set exists, it is an equiangular tight frame and represents the solution to a Grassmannian line packing problem. Best Complex Antipodal Spherical Codes (BCASCs) are the best vector sets with respect to the coherence. By extending methods used to find be…
▽ More
Vector sets with optimal coherence according to the Welch bound cannot exist for all pairs of dimension and cardinality. If such an optimal vector set exists, it is an equiangular tight frame and represents the solution to a Grassmannian line packing problem. Best Complex Antipodal Spherical Codes (BCASCs) are the best vector sets with respect to the coherence. By extending methods used to find best spherical codes in the real-valued Euclidean space, the proposed approach aims to find BCASCs, and thereby, a complex-valued vector set with minimal coherence. There are many applications demanding vector sets with low coherence. Examples are not limited to several techniques in wireless communication or to the field of compressed sensing. Within this contribution, existing analytical and numerical approaches for coherence optimization of complex-valued vector spaces are summarized and compared to the proposed approach. The numerically obtained coherence values improve previously reported results. The drawback of increased computational effort is addressed and a faster approximation is proposed which may be an alternative for time critical cases.
△ Less
Submitted 18 December, 2015; v1 submitted 23 April, 2014;
originally announced April 2014.
-
Dictionary Adaptation in Sparse Recovery Based on Different Types of Coherence
Authors:
Henning Zörlein,
Faisal Akram,
Martin Bossert
Abstract:
In sparse recovery, the unique sparsest solution to an under-determined system of linear equations is of main interest. This scheme is commonly proposed to be applied to signal acquisition. In most cases, the signals are not sparse themselves, and therefore, they need to be sparsely represented with the help of a so-called dictionary being specific to the corresponding signal family. The dictionar…
▽ More
In sparse recovery, the unique sparsest solution to an under-determined system of linear equations is of main interest. This scheme is commonly proposed to be applied to signal acquisition. In most cases, the signals are not sparse themselves, and therefore, they need to be sparsely represented with the help of a so-called dictionary being specific to the corresponding signal family. The dictionaries cannot be used for optimization of the resulting under-determined system because they are fixed by the given signal family. However, the measurement matrix is available for optimization and can be adapted to the dictionary. Multiple properties of the resulting linear system have been proposed which can be used as objective functions for optimization. This paper discusses two of them which are both related to the coherence of vectors. One property aims for having incoherent measurements, while the other aims for insuring the successful reconstruction. In the following, the influences of both criteria are compared with different reconstruction approaches.
△ Less
Submitted 15 July, 2013;
originally announced July 2013.
-
Computing preimages of Boolean Networks
Authors:
Johannes Georg Klotz,
Martin Bossert,
Steffen Schober
Abstract:
In this paper we present an algorithm to address the predecessor problem of feed-forward Boolean networks. We propose an probabilistic algorithm, which solves this problem in linear time with respect to the number of nodes in the network. Finally, we evaluate our algorithm for random Boolean networks and the regulatory network of Escherichia coli.
In this paper we present an algorithm to address the predecessor problem of feed-forward Boolean networks. We propose an probabilistic algorithm, which solves this problem in linear time with respect to the number of nodes in the network. Finally, we evaluate our algorithm for random Boolean networks and the regulatory network of Escherichia coli.
△ Less
Submitted 15 February, 2013;
originally announced February 2013.
-
Canalizing Boolean Functions Maximize the Mutual Information
Authors:
Johannes Georg Klotz,
David Kracht,
Martin Bossert,
Steffen Schober
Abstract:
The ability of information processing in biologically motivated Boolean networks is of interest in recent information theoretic research. One measure to quantify this ability is the well known mutual information. Using Fourier analysis we show that canalizing functions maximize the mutual information between an input variable and the outcome of the function. We proof our result for Boolean functio…
▽ More
The ability of information processing in biologically motivated Boolean networks is of interest in recent information theoretic research. One measure to quantify this ability is the well known mutual information. Using Fourier analysis we show that canalizing functions maximize the mutual information between an input variable and the outcome of the function. We proof our result for Boolean functions with uniform distributed as well as product distributed input variables.
△ Less
Submitted 5 November, 2012; v1 submitted 31 July, 2012;
originally announced July 2012.
-
Efficient Decoding of Partial Unit Memory Codes of Arbitrary Rate
Authors:
Antonia Wachter-Zeh,
Markus Stinner,
Martin Bossert
Abstract:
Partial Unit Memory (PUM) codes are a special class of convolutional codes, which are often constructed by means of block codes. Decoding of PUM codes may take advantage of existing decoders for the block code. The Dettmar--Sorger algorithm is an efficient decoding algorithm for PUM codes, but allows only low code rates. The same restriction holds for several known PUM code constructions. In this…
▽ More
Partial Unit Memory (PUM) codes are a special class of convolutional codes, which are often constructed by means of block codes. Decoding of PUM codes may take advantage of existing decoders for the block code. The Dettmar--Sorger algorithm is an efficient decoding algorithm for PUM codes, but allows only low code rates. The same restriction holds for several known PUM code constructions. In this paper, an arbitrary-rate construction, the analysis of its distance parameters and a generalized decoding algorithm for PUM codes of arbitrary rate are provided. The correctness of the algorithm is proven and it is shown that its complexity is cubic in the length.
△ Less
Submitted 8 February, 2012;
originally announced February 2012.
-
Some Comments on the Strong Simplex Conjecture
Authors:
Dejan E. Lazich,
Christian Senger,
Martin Bossert
Abstract:
In the disproof of the Strong Simplex Conjecture presented in [Steiner, 1994], a counterexample signal set was found that has higher average probability of correct optimal decoding than the corresponding regular simplex signal set, when compared at small values of the signal-to-noise ratio. The latter was defined as the quotient of average signal energy and average noise power. In this paper, it i…
▽ More
In the disproof of the Strong Simplex Conjecture presented in [Steiner, 1994], a counterexample signal set was found that has higher average probability of correct optimal decoding than the corresponding regular simplex signal set, when compared at small values of the signal-to-noise ratio. The latter was defined as the quotient of average signal energy and average noise power. In this paper, it is shown that this interpretation of the signal-to-noise ratio is inappropriate for a comparison of signal sets, since it leads to a contradiction with the Channel Coding Theorem. A modified counterexample signal set is proposed and examined using the classical interpretation of the signal-to-noise ratio, i.e., as the quotient of average signal energy and average noise energy. This signal set outperforms the regular simplex signal set for small signal-to-noise ratios without contradicting the Channel Coding Theorem, hence the Strong Simplex Conjecture remains proven false.
△ Less
Submitted 6 February, 2012;
originally announced February 2012.
-
Harmonic Analysis of Boolean Networks: Determinative Power and Perturbations
Authors:
Reinhard Heckel,
Steffen Schober,
Martin Bossert
Abstract:
Consider a large Boolean network with a feed forward structure. Given a probability distribution on the inputs, can one find, possibly small, collections of input nodes that determine the states of most other nodes in the network? To answer this question, a notion that quantifies the determinative power of an input over the states of the nodes in the network is needed. We argue that the mutual inf…
▽ More
Consider a large Boolean network with a feed forward structure. Given a probability distribution on the inputs, can one find, possibly small, collections of input nodes that determine the states of most other nodes in the network? To answer this question, a notion that quantifies the determinative power of an input over the states of the nodes in the network is needed. We argue that the mutual information (MI) between a given subset of the inputs X = {X_1, ..., X_n} of some node i and its associated function f_i(X) quantifies the determinative power of this set of inputs over node i. We compare the determinative power of a set of inputs to the sensitivity to perturbations to these inputs, and find that, maybe surprisingly, an input that has large sensitivity to perturbations does not necessarily have large determinative power. However, for unate functions, which play an important role in genetic regulatory networks, we find a direct relation between MI and sensitivity to perturbations. As an application of our results, we analyze the large-scale regulatory network of Escherichia coli. We identify the most determinative nodes and show that a small subset of those reduces the overall uncertainty of the network state significantly. Furthermore, the network is found to be tolerant to perturbations of its inputs.
△ Less
Submitted 21 May, 2013; v1 submitted 5 September, 2011;
originally announced September 2011.
-
Optimal Threshold-Based Multi-Trial Error/Erasure Decoding with the Guruswami-Sudan Algorithm
Authors:
Christian Senger,
Vladimir R. Sidorenko,
Martin Bossert,
Victor V. Zyablov
Abstract:
Traditionally, multi-trial error/erasure decoding of Reed-Solomon (RS) codes is based on Bounded Minimum Distance (BMD) decoders with an erasure option. Such decoders have error/erasure tradeoff factor L=2, which means that an error is twice as expensive as an erasure in terms of the code's minimum distance. The Guruswami-Sudan (GS) list decoder can be considered as state of the art in algebraic d…
▽ More
Traditionally, multi-trial error/erasure decoding of Reed-Solomon (RS) codes is based on Bounded Minimum Distance (BMD) decoders with an erasure option. Such decoders have error/erasure tradeoff factor L=2, which means that an error is twice as expensive as an erasure in terms of the code's minimum distance. The Guruswami-Sudan (GS) list decoder can be considered as state of the art in algebraic decoding of RS codes. Besides an erasure option, it allows to adjust L to values in the range 1<L<=2. Based on previous work, we provide formulae which allow to optimally (in terms of residual codeword error probability) exploit the erasure option of decoders with arbitrary L, if the decoder can be used z>=1 times. We show that BMD decoders with z_BMD decoding trials can result in lower residual codeword error probability than GS decoders with z_GS trials, if z_BMD is only slightly larger than z_GS. This is of practical interest since BMD decoders generally have lower computational complexity than GS decoders.
△ Less
Submitted 18 April, 2011;
originally announced April 2011.
-
Adaptive Single-Trial Error/Erasure Decoding of Reed-Solomon Codes
Authors:
Christian Senger,
Vladimir R. Sidorenko,
Steffen Schober,
Martin Bossert,
Victor V. Zyablov
Abstract:
Algebraic decoding algorithms are commonly applied for the decoding of Reed-Solomon codes. Their main advantages are low computational complexity and predictable decoding capabilities. Many algorithms can be extended for correction of both errors and erasures. This enables the decoder to exploit binary quantized reliability information obtained from the transmission channel: Received symbols with…
▽ More
Algebraic decoding algorithms are commonly applied for the decoding of Reed-Solomon codes. Their main advantages are low computational complexity and predictable decoding capabilities. Many algorithms can be extended for correction of both errors and erasures. This enables the decoder to exploit binary quantized reliability information obtained from the transmission channel: Received symbols with high reliability are forwarded to the decoding algorithm while symbols with low reliability are erased. In this paper we investigate adaptive single-trial error/erasure decoding of Reed-Solomon codes, i.e. we derive an adaptive erasing strategy which minimizes the residual codeword error probability after decoding. Our result is applicable to any error/erasure decoding algorithm as long as its decoding capabilities can be expressed by a decoder capability function. Examples are Bounded Minimum Distance decoding with the Berlekamp-Massey- or the Sugiyama algorithms and the Guruswami-Sudan list decoder.
△ Less
Submitted 4 April, 2011;
originally announced April 2011.
-
On (Partial) Unit Memory Codes Based on Gabidulin Codes
Authors:
Antonia Wachter,
Vladimir Sidorenko,
Martin Bossert,
Victor Zyablov
Abstract:
(Partial) Unit Memory ((P)UM) codes provide a powerful possibility to construct convolutional codes based on block codes in order to achieve a high decoding performance. In this contribution, a construction based on Gabidulin codes is considered. This construction requires a modified rank metric, the so-called sum rank metric. For the sum rank metric, the free rank distance, the extended row rank…
▽ More
(Partial) Unit Memory ((P)UM) codes provide a powerful possibility to construct convolutional codes based on block codes in order to achieve a high decoding performance. In this contribution, a construction based on Gabidulin codes is considered. This construction requires a modified rank metric, the so-called sum rank metric. For the sum rank metric, the free rank distance, the extended row rank distance and its slope are defined analogous to the extended row distance in Hamming metric. Upper bounds for the free rank distance and the slope of (P)UM codes in the sum rank metric are derived and an explicit construction of (P)UM codes based on Gabidulin codes is given, achieving the upper bound for the free rank distance.
△ Less
Submitted 15 February, 2011; v1 submitted 14 February, 2011;
originally announced February 2011.
-
The Euclidean Algorithm for Generalized Minimum Distance Decoding of Reed-Solomon Codes
Authors:
Sabine Kampf,
Martin Bossert
Abstract:
This paper presents a method to merge Generalized Minimum Distance decoding of Reed-Solomon codes with the extended Euclidean algorithm. By merge, we mean that the steps taken to perform the Generalized Minimum Distance decoding are similar to those performed by the extended Euclidean algorithm. The resulting algorithm has a complexity of O(n^2).
This paper presents a method to merge Generalized Minimum Distance decoding of Reed-Solomon codes with the extended Euclidean algorithm. By merge, we mean that the steps taken to perform the Generalized Minimum Distance decoding are similar to those performed by the extended Euclidean algorithm. The resulting algorithm has a complexity of O(n^2).
△ Less
Submitted 14 June, 2010;
originally announced June 2010.
-
A Basis for all Solutions of the Key Equation for Gabidulin Codes
Authors:
Antonia Wachter,
Vladimir Sidorenko,
Martin Bossert
Abstract:
We present and prove the correctness of an efficient algorithm that provides a basis for all solutions of a key equation in order to decode Gabidulin (G-) codes up to a given radius tau. This algorithm is based on a symbolic equivalent of the Euclidean Algorithm (EA) and can be applied for decoding of G-codes beyond half the minimum rank distance. If the key equation has a unique solution, our alg…
▽ More
We present and prove the correctness of an efficient algorithm that provides a basis for all solutions of a key equation in order to decode Gabidulin (G-) codes up to a given radius tau. This algorithm is based on a symbolic equivalent of the Euclidean Algorithm (EA) and can be applied for decoding of G-codes beyond half the minimum rank distance. If the key equation has a unique solution, our algorithm reduces to Gabidulin's decoding algorithm up to half the minimum distance. If the solution is not unique, we provide a basis for all solutions of the key equation. Our algorithm has time complexity O(tau^2) and is a generalization of the modified EA by Bossert and Bezzateev for Reed-Solomon codes.
△ Less
Submitted 9 June, 2010;
originally announced June 2010.
-
A Fast Generalized Minimum Distance Decoder for Reed-Solomon Codes Based on the Extended Euclidean Algorithm
Authors:
Sabine Kampf,
Martin Bossert
Abstract:
This paper presents a method to determine a set of basis polynomials from the extended Euclidean algorithm that allows Generalized Minimum Distance decoding of Reed-Solomon codes with a complexity of O(nd).
This paper presents a method to determine a set of basis polynomials from the extended Euclidean algorithm that allows Generalized Minimum Distance decoding of Reed-Solomon codes with a complexity of O(nd).
△ Less
Submitted 1 June, 2010;
originally announced June 2010.
-
Adaptive Single-Trial Error/Erasure Decoding for Binary Codes
Authors:
Christian Senger,
Vladimir R. Sidorenko,
Steffen Schober,
Martin Bossert,
Victor V. Zyablov
Abstract:
We investigate adaptive single-trial error/erasure decoding of binary codes whose decoder is able to correct e errors and t erasures if le+t<=d-1. Thereby, d is the minimum Hamming distance of the code and 1<l<=2 is the tradeoff parameter between errors and erasures. The error/erasure decoder allows to exploit soft information by treating a set of most unreliable received symbols as erasures. The…
▽ More
We investigate adaptive single-trial error/erasure decoding of binary codes whose decoder is able to correct e errors and t erasures if le+t<=d-1. Thereby, d is the minimum Hamming distance of the code and 1<l<=2 is the tradeoff parameter between errors and erasures. The error/erasure decoder allows to exploit soft information by treating a set of most unreliable received symbols as erasures. The obvious question here is, how this erasing should be performed, i.e. how the unreliable symbols which must be erased to obtain the smallest possible residual codeword error probability are determined. In a previous paper, we answer this question for the case of fixed erasing, where only the channel state and not the individual symbol reliabilities are taken into consideration. In this paper, we address the adaptive case, where the optimal erasing strategy is determined for every given received vector.
△ Less
Submitted 30 April, 2010; v1 submitted 20 April, 2010;
originally announced April 2010.
-
Optimal Thresholds for GMD Decoding with (L+1)/L-extended Bounded Distance Decoders
Authors:
Christian Senger,
Vladimir R. Sidorenko,
Martin Bossert,
Victor V. Zyablov
Abstract:
We investigate threshold-based multi-trial decoding of concatenated codes with an inner Maximum-Likelihood decoder and an outer error/erasure (L+1)/L-extended Bounded Distance decoder, i.e. a decoder which corrects e errors and t erasures if e(L+1)/L + t <= d - 1, where d is the minimum distance of the outer code and L is a positive integer. This is a generalization of Forney's GMD decoding, whi…
▽ More
We investigate threshold-based multi-trial decoding of concatenated codes with an inner Maximum-Likelihood decoder and an outer error/erasure (L+1)/L-extended Bounded Distance decoder, i.e. a decoder which corrects e errors and t erasures if e(L+1)/L + t <= d - 1, where d is the minimum distance of the outer code and L is a positive integer. This is a generalization of Forney's GMD decoding, which was considered only for L = 1, i.e. outer Bounded Minimum Distance decoding. One important example for (L+1)/L-extended Bounded Distance decoders is decoding of L-Interleaved Reed-Solomon codes. Our main contribution is a threshold location formula, which allows to optimally erase unreliable inner decoding results, for a given number of decoding trials and parameter L. Thereby, the term optimal means that the residual codeword error probability of the concatenated code is minimized. We give an estimation of this probability for any number of decoding trials.
△ Less
Submitted 20 April, 2010; v1 submitted 7 January, 2010;
originally announced January 2010.
-
Decoding Generalized Concatenated Codes Using Interleaved Reed-Solomon Codes
Authors:
Christian Senger,
Vladimir Sidorenko,
Martin Bossert,
Victor Zyablov
Abstract:
Generalized Concatenated codes are a code construction consisting of a number of outer codes whose code symbols are protected by an inner code. As outer codes, we assume the most frequently used Reed-Solomon codes; as inner code, we assume some linear block code which can be decoded up to half its minimum distance. Decoding up to half the minimum distance of Generalized Concatenated codes is cla…
▽ More
Generalized Concatenated codes are a code construction consisting of a number of outer codes whose code symbols are protected by an inner code. As outer codes, we assume the most frequently used Reed-Solomon codes; as inner code, we assume some linear block code which can be decoded up to half its minimum distance. Decoding up to half the minimum distance of Generalized Concatenated codes is classically achieved by the Blokh-Zyablov-Dumer algorithm, which iteratively decodes by first using the inner decoder to get an estimate of the outer code words and then using an outer error/erasure decoder with a varying number of erasures determined by a set of pre-calculated thresholds. In this paper, a modified version of the Blokh-Zyablov-Dumer algorithm is proposed, which exploits the fact that a number of outer Reed-Solomon codes with average minimum distance d can be grouped into one single Interleaved Reed-Solomon code which can be decoded beyond d/2. This allows to skip a number of decoding iterations on the one hand and to reduce the complexity of each decoding iteration significantly - while maintaining the decoding performance - on the other.
△ Less
Submitted 5 May, 2008;
originally announced May 2008.
-
Analysis of random Boolean networks using the average sensitivity
Authors:
Steffen Schober,
Martin Bossert
Abstract:
In this work we consider random Boolean networks that provide a general model for genetic regulatory networks. We extend the analysis of James Lynch who was able to proof Kauffman's conjecture that in the ordered phase of random networks, the number of ineffective and freezing gates is large, where as in the disordered phase their number is small. Lynch proved the conjecture only for networks wi…
▽ More
In this work we consider random Boolean networks that provide a general model for genetic regulatory networks. We extend the analysis of James Lynch who was able to proof Kauffman's conjecture that in the ordered phase of random networks, the number of ineffective and freezing gates is large, where as in the disordered phase their number is small. Lynch proved the conjecture only for networks with connectivity two and non-uniform probabilities for the Boolean functions. We show how to apply the proof to networks with arbitrary connectivity $K$ and to random networks with biased Boolean functions. It turns out that in these cases Lynch's parameter $λ$ is equivalent to the expectation of average sensitivity of the Boolean functions used to construct the network. Hence we can apply a known theorem for the expectation of the average sensitivity. In order to prove the results for networks with biased functions, we deduct the expectation of the average sensitivity when only functions with specific connectivity and specific bias are chosen at random.
△ Less
Submitted 2 April, 2007;
originally announced April 2007.
-
Syndrome Decoding of Reed-Solomon Codes Beyond Half the Minimum Distance based on Shift-Register Synthesis
Authors:
Georg Schmidt,
Vladimir R. Sidorenko,
Martin Bossert
Abstract:
In this paper, a new approach for decoding low-rate Reed-Solomon codes beyond half the minimum distance is considered and analyzed. Unlike the Sudan algorithm published in 1997, this new approach is based on multi-sequence shift-register synthesis, which makes it easy to understand and simple to implement. The computational complexity of this shift-register based algorithm is of the same order a…
▽ More
In this paper, a new approach for decoding low-rate Reed-Solomon codes beyond half the minimum distance is considered and analyzed. Unlike the Sudan algorithm published in 1997, this new approach is based on multi-sequence shift-register synthesis, which makes it easy to understand and simple to implement. The computational complexity of this shift-register based algorithm is of the same order as the complexity of the well-known Berlekamp-Massey algorithm. Moreover, the error correcting radius coincides with the error correcting radius of the original Sudan algorithm, and the practical decoding performance observed on a q-ary symmetric channel (QSC) is virtually identical to the decoding performance of the Sudan algorithm. Bounds for the failure and error probability as well as for the QSC decoding performance of the new algorithm are derived, and the performance is illustrated by means of examples.
△ Less
Submitted 22 February, 2007;
originally announced February 2007.
-
Collaborative Decoding of Interleaved Reed-Solomon Codes and Concatenated Code Designs
Authors:
Georg Schmidt,
Vladimir R. Sidorenko,
Martin Bossert
Abstract:
Interleaved Reed-Solomon codes are applied in numerous data processing, data transmission, and data storage systems. They are generated by interleaving several codewords of ordinary Reed-Solomon codes. Usually, these codewords are decoded independently by classical algebraic decoding methods. However, by collaborative algebraic decoding approaches, such interleaved schemes allow the correction o…
▽ More
Interleaved Reed-Solomon codes are applied in numerous data processing, data transmission, and data storage systems. They are generated by interleaving several codewords of ordinary Reed-Solomon codes. Usually, these codewords are decoded independently by classical algebraic decoding methods. However, by collaborative algebraic decoding approaches, such interleaved schemes allow the correction of error patterns beyond half the minimum distance, provided that the errors in the received signal occur in bursts. In this work, collaborative decoding of interleaved Reed-Solomon codes by multi-sequence shift-register synthesis is considered and analyzed. Based on the framework of interleaved Reed-Solomon codes, concatenated code designs are investigated, which are obtained by interleaving several Reed-Solomon codes, and concatenating them with an inner block code.
△ Less
Submitted 12 October, 2006; v1 submitted 12 October, 2006;
originally announced October 2006.