Hassan Khodaiemehr

Hassan Khodaiemehr
Khaje Nasir Toosi University of Technology | KNTU · Computer Science and Statistics

Assistant Professor-Computer Science and Statistics - K.N. Toosi University of Technology
Postdoctoral Associate, School of Engineering, The University of British Columbia

About

19
Publications
1,799
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
124
Citations
Citations since 2017
13 Research Items
105 Citations
20172018201920202021202220230510152025
20172018201920202021202220230510152025
20172018201920202021202220230510152025
20172018201920202021202220230510152025
Introduction
I received the B.S degrees in pure mathematics (2010) and electrical engineering (2012), and the M.Sc. degree in pure mathematics (Non-commutative Algebra) in 2012. I received my Ph.D. on coding and information theory, in Feb. 2017. My research interests: Data science, Deep Learning, Blockchain, Quantum Computing, Coding Theory, Lattice theory, Information Theory, Cryptography, Physical layer security and Wireless Communication.
Additional affiliations
February 2018 - present
Institute for Research in Fundamental Sciences (IPM)
Position
  • Researcher
October 2017 - January 2018
University of Tehran
Position
  • Lecturer
Description
  • Teaching Cryptography for undergraduate students
October 2017 - February 2018
Institute for Research in Fundamental Sciences (IPM)
Position
  • PostDoc Position
Description
  • Post Doctoral Research Fellow
Education
October 2012 - February 2017
Amirkabir University of Technology
Field of study
  • Pure Mathematics (Coding Theory)
October 2010 - September 2012
Amirkabir University of Technology
Field of study
  • Pure Mathematics (Algebra)
October 2008 - September 2012
Amirkabir University of Technology
Field of study
  • Electrical Engineering (Power)

Publications

Publications (19)
Conference Paper
Full-text available
LDPC lattices were first family of lattices which have efficient decoding algorithm in high dimensions. An LDPC lattice can be constructed from Construction D' and a number of nested LDPC codes. When we consider one code as underlying code of these lattices, one-level LDPC lattices will be obtained. In this paper we propose a new encoding and decod...
Preprint
Full-text available
p>Quantum computers pose a significant threat to blockchain technology’s security, which heavily relies on public-key cryptography and hash functions. The cryptographic algorithms used in blockchains, based on large odd prime numbers and discrete logarithms, can be easily compromised by quantum computing algorithms like Shor’s algorithm and its fut...
Preprint
Full-text available
p>Quantum computers pose a significant threat to blockchain technology’s security, which heavily relies on public-key cryptography and hash functions. The cryptographic algorithms used in blockchains, based on large odd prime numbers and discrete logarithms, can be easily compromised by quantum computing algorithms like Shor’s algorithm and its fut...
Article
Full-text available
The smart grid provides efficient transmission of energy and data. However, the frequent gathering of users’ consumption data discloses users’ privacy. Plenty of data aggregation schemes have been introduced to preserve the privacy of users’ private information. Unfortunately, with the advent of quantum machines, most of these schemes will be rende...
Article
Full-text available
In this paper, we present a one-way relaying scheme in which two wireless nodes create an information flow to each other via a single decode-and-forward (DF) relay. We consider an additional secrecy constraint for protection against an honest-but-curious relay. Indeed, while the relay should decode the source message, it should be fully ignorant ab...
Conference Paper
Full-text available
In this paper, we propose a list decoding algorithm for the family of unit codes introduced by C. Maire and F. Oggier. Unit codes are constructed based on number fields and these codes are generalized version of number field codes for which a list decoding algorithm has already been proposed. We employ the list decoding algorithm of the number fiel...
Article
Block-fading channel (BF) is a useful model for various wireless communication channels in both indoor and outdoor environments. Frequency-hopping schemes and orthogonal frequency division multiplexing (OFDM) can conveniently be modelled as BF channels. Applying lattices in this type of channel entails dividing a lattice point into multiple blocks...
Preprint
Full-text available
Block-fading channel (BF) is a useful model for various wireless communication channels in both indoor and outdoor environments. The design of lattices for BF channels offers a challenging problem, which differs greatly from its counterparts like AWGN channels. Recently, the original binary Construction A for lattices, due to Forney, has been gener...
Article
We propose a new nonlinear Rao-Nam like symmetric key encryption scheme. In our design, we employ a specific type of coded modulation schemes namely quasi-cyclic low-density parity-check (QC-LDPC) lattice-codes which have low-complexity encoding and decoding algorithms. Due to the application of coded modulation schemes in our design, the proposed...
Article
In this paper, we present some recent instances of applying algebraic tools from different categories, in the design of digital communications systems. More specifically, we present a structure based on the elements of a group ring for constructing and encoding QC-LDPC codes. As another instance, we present the construction of space-time block code...
Conference Paper
Unidirectional or one-way relaying, where two wireless nodes, each of which would like to create an in- formation flow from one node to the other one via a single decode-and-forward (DF) relay, has been an active area of recent research. We consider an additional secrecy constraint for protection against an honest but curious relay. Indeed, while t...
Conference Paper
We present an overview of recent advances in the Area of information security using algebraic number fields. This overview indicates the importance of modular lattices in information security and in recently proposed methods for obtaining modular lattices using algebraic number fields. Obtaining Construction a unimodular lattices using cyclotomic n...
Article
Quasi-cyclic (QC) low-density parity-check (LDPC) codes which are known as QC-LDPC codes, have many applications due to their simple encoding implementation by means of cyclic shift registers. In this paper, we construct QC-LDPC codes from group rings. A group ring is a free module (at the same time a ring) constructed in a natural way from any giv...
Article
LDPC lattices were the first family of lattices to show efficient decoding in high dimensions. We consider a case of these lattices with one binary LDPC code as underlying code. We employ the encoding and decoding of the LDPC lattices in a cooperative transmission framework. We establish two efficient shaping based on hypercube and Voronoi shaping,...
Article
Full-text available
LDPC lattices were the first family of lattices which have an efficient decoding algorithm in high dimensions over an AWGN channel. Considering Construction D' of lattices with one binary LDPC code as underlying code gives the well known Construction A LDPC lattices or 1-level LDPC lattices. Block-fading channel (BF) is a useful model for various w...
Article
LDPC lattices were the first family of lattices equipped with iterative decoding algorithms. We introduce quasi cyclic low density parity check (QC LDPC) lattices as a special case of LDPC lattices with one binary QC-LDPC code as their underlying code. These lattices are obtained from Construction A of lattices providing us to encode them efficient...
Conference Paper
LDPC lattices were the first family of lattices which have an efficient decoding algorithm in high dimensions over an AWGN channel. When we consider Construction D' of lattices with one binary LDPC code as its underlying code, 1-level LDPC lattices are obtained. Block fading channel (BF) is a useful model for various wireless communication channels...
Article
We construct full-diversity, arbitrary rate STBCs for specific number of transmit antennas over an apriori specified signal set using twisted Laurent series rings. Constructing full-diversity space-time block codes from algebraic constructions like division algebras has been done by Shashidhar et al. Constructing STBCs from crossed product algebras...

Questions

Questions (2)
Question
Specially, I am interested about the application of lattices in physical layer network coding and the latest advances in the implementation of lattices in wireless communication devices.
Question
Stopping sets will influence the performance of LDPC codes in binary erasure channels. BEC and block fading channels have some common properties. So, is relationship between the existence of stopping sets in the structure of LDPC codes and their performance in block fading channels? 

Network

Cited By