Martin Bossert's research while affiliated with Ulm University and other places

Publications (137)

Article
The binary primitive BCH codes are cyclic and are constructed by choosing a subset of the cyclotomic cosets. Which subset is chosen determines the dimension, the minimum distance and the weight distribution of the BCH code. We construct possible BCH codes and determine their coderate, true minimum distance and the non-equivalent codes. A particular...
Preprint
We present novel decoding schemes for hard and soft decision decoding of block codes using the minimal weight codewords of the dual code. The decoding schemes will be described for cyclic codes where polynomials can be used, however, the modification for non-cyclic codes is possible and straight forward. The hard decision decoding calculates syndro...
Book
This edited monograph presents the collected interdisciplinary research results of the priority program “Information- and Communication Theory in Molecular Biology (InKoMBio, SPP 1395)”, funded by the German Research Foundation DFG, 2010 until 2016. The topical spectrum is very broad and comprises, but is not limited to, aspects such as microRNA as...
Article
Reed--Solomon codes are a well--studied code class which fulfill the Singleton bound with equality. However, their length is limited to the size $q$ of the underlying field $\mathbb{F}_q$. In this paper we present a code construction which yields codes with lengths of factors of the field size. Furthermore a decoding algorithm beyond half the minim...
Article
Physical Unclonable Functions (PUFs) exploit variations in the manufacturing process to derive bit sequences from integrated circuits which can be used as secure cryptographic keys. Instead of storing the keys, they can be reproduced when needed. Since the reproduced sequences are not stable, error correction must be applied. Recently, convolutiona...
Article
Error correction is an indispensable component when Physical Unclonable Functions (PUFs) are used in cryptographic applications. So far, there exist schemes that obtain helper data, which they need within the error correction process. We introduce a new scheme, which only uses an error correcting code without any further helper data. The main idea...
Article
We propose a new class of space-time block codes based on finite-field rank-metric codes in combination with a rank-metric-preserving mapping to the set of Eisenstein integers. It is shown that these codes achieve maximum diversity order and improve upon certain existing constructions. Moreover, we present a new decoding algorithm for these codes w...
Article
We prove that Alekhnovich's algorithm can be used for row reduction of skew polynomial matrices. This yields an $O(\ell^3 n^{(\omega+1)/2} \log(n))$ decoding algorithm for $\ell$-Interleaved Gabidulin codes of length $n$, where $\omega$ is the matrix multiplication exponent, improving in the exponent of $n$ compared to previous results.
Article
We present a new approach on low-rank matrix recovery (LRMR) based on Gabidulin Codes. Since most applications of LRMR deal with matrices over infinite fields, we use the recently introduced generalization of Gabidulin codes to fields of characterstic zero. We show that LRMR can be reduced to decoding of Gabidulin codes and discuss which field exte...
Article
Gabidulin codes, originally defined over finite fields, are an important class of rank metric codes with various applications. Recently, their definition was generalized to certain fields of characteristic zero and a Welch--Berlekamp like algorithm with complexity $O(n^3)$ was given. We propose a new application of Gabidulin codes over infinite fie...
Article
The security of public-key cryptosystems is mostly based on number theoretic problems like factorization and the discrete logarithm. There exists an algorithm which solves these problems in polynomial time using a quantum computer. Hence, these cryptosystems will be broken as soon as quantum computers emerge. Code-based cryptography is an alternati...
Conference Paper
Physical Unclonable Functions (PUFs) enable secure key storage for integrated circuits and FPGAs. PUF responses are noisy such that error correction is required to generate stable cryptographic keys. One popular approach is to use error-correcting codes. We present an area-optimized VLSI implementation of a recent Generalized Concatenated (GC) code...
Article
Full-text available
Differential linear network coding (DLNC) is a precoding scheme for information transmission over random linear networks. By using differential encoding and decoding, the conventional approach of lifting, required for inherent channel sounding, can be omitted and in turn higher transmission rates are supported. However, the scheme is sensitive to v...
Article
Physical Unclonable Functions evaluate manufacturing variations to generate secure cryptographic keys for embedded systems without secure key storage. It is explained how methods from coding theory are applied in order to ensure reliable key reproduction. We show how better results can be obtained using code classes and decoding principles not used...
Article
Physical Unclonable Functions can be used for secure key generation in cryptographic applications. It is explained how methods from coding theory must be applied in order to ensure reliable key regeneration. Based on previous work, we show ways how to obtain better results with respect to error probability and codeword length. Also, an example base...
Article
Full-text available
We decode Reed-Solomon codes using soft information provided at the receiver. The Extended Euclidean Algorithm (EEA) is considered as an initial step to obtain an intermediate result. The final decoding result is obtained by interpolating the output of the EEA at the least reliable positions of the received word. We refer to this decoding method as...
Article
Known properties of cyclic codes are used to give a unified description of many classical decoding algorithms for Reed–Solomon codes up to half the minimum distance. This description allows also simplified proofs for these decoders. Further, a novel decoding algorithm is derived using these properties directly and variants of a new error/erasure de...
Conference Paper
Full-text available
In sparse recovery, the unique sparsest solution to an under-determined system of linear equations is of main interest. This scheme is commonly proposed to be applied to signal acquisition. In most cases, the signals are not sparse themselves, and therefore, they need to be sparsely represented with the help of a so-called dictionary being specific...
Article
Full-text available
Partial Unit Memory (PUM) codes are a special class of convolutional codes, which are often constructed by means of block codes. Decoding of PUM codes may take advantage of existing decoders for the block code. The Dettmar--Sorger algorithm is an efficient decoding algorithm for PUM codes, but allows only low code rates. The same restriction holds...
Article
Full-text available
Transcriptional regulation networks are often modeled as Boolean networks. We discuss certain properties of Boolean functions (BFs), which are considered as important in such networks, namely, membership to the classes of unate or canalizing functions. Of further interest is the average sensitivity (AS) of functions. In this article, we discuss sev...
Conference Paper
In this paper, the real-valued Compressed Sensing (CS)-based error correction scheme which was proposed by Candes and Tao is evaluated against the background of channel coding theory. Substantial differences to conventional linear block codes over Galois fields are reviewed and interpreted. A unified channel model is introduced. It enables performa...
Conference Paper
This paper presents a division algorithm to solve the key equation for Hermitian codes, which is capable of locating most error patterns with weight up to half the designed minimum distance. The algorithm has a structure similar to the Euclidean algorithm used in the decoding of Reed-Solomon codes, yet it is a little more complex because bivariate...
Conference Paper
Algebraic decoding algorithms are commonly applied for the decoding of Reed-Solomon codes. Their main advantages are low computational complexity and predictable decoding capabilities. Many algorithms can be extended for correction of both errors and erasures. This enables the decoder to exploit binary quantized reliability information obtained fro...
Article
4.1 Efficient Analysis of OFDM Channels 4.2 Generic Description of a MIMO-OFDM-Radio-Transmission-Link 4.3 Resource Allocation Using Broadcast Techniques 4.4 Rate Allocation for the 2-user Multiple Access Channel with MMSE Turbo Equalization 4.5 Coexistence of Systems 4.6 System Design for Time-Variant Channels 4.7 Combination of Adaptive and Non-A...
Article
We consider the decoding for Silva-Kschischang-Kötter random network codes based on Gabidulin’s rank-metric codes. The model of a random network coding channel can be reduced to transmitting matrices of a rank code through a channel introducing three types of additive errors. The first type is called random rank errors. To describe other types, the...
Article
For decoding concatenated codes up to half their designed distance, generalized minimum distance (GMD) decoding can be used. GMD decoding applies multitrial error/erasure decoding of the outer code, where erased symbols depend on some reliability measure stemming from the inner decoders. We consider the case where the outer decoder is able to decod...
Conference Paper
Ensembles of Boolean networks using linear random threshold functions with memory are considered. Such ensembles have been studied previously by Szejka et al.. They obtained analytical results for the order parameter which can be used to predict the expected behavior of a network randomly drawn from the ensemble. Using numerical simulations of rand...
Conference Paper
Rank-metric codes are widely used in communications and recently in random network coding. In this paper generalized matrix erasures are defined and an algorithm to correct them is described. However, the main result is that we show that for the common channel model in random network coding only erasures, and no random errors have to be corrected.
Conference Paper
The inference of genetic regulatory networks in the Boolean network model is considered. Given a set of measurements, a reasonably good approximation of the Boolean functions attached to each of the n nodes has to be found. Besides the fact that measurements are inherently noisy, another problem to deal with, is the huge amount of irrelevant data,...
Conference Paper
In this paper we investigate two new decoding schemes for Reed-Solomon codes, which allow to decode beyond half the minimum distance. One is Sudan's list-decoding principle, based on interpolation with a degree-restricted bivariate polynomial. We show a syndrome-based approach of it. We compare Sudan's procedure with a scheme that is based on an ex...
Conference Paper
We present an algorithm for decoding Reed-Solomon codes beyond half the minimum distance by using reliability information which is based on the extended Euclidean algorithm. The algorithm constitutes a Generalized Minimum Distance decoder since the reliability information is used to declare erasures in certain positions in the received word. We des...
Article
The subspace metric is an object of active research in network coding. Nevertheless, little is known on codes over this metric. In the present paper, several classes of codes over subspace metric are defined and investigated, including codes with distance 2, codes with the maximal distance, and constant-distance constant-dimension codes. Also, Gilb...
Conference Paper
In this paper we propose a new algorithm that solves the Guruswami-Sudan interpolation step for Reed-Solomon codes efficiently. It is a generalization of the Feng-Tzeng approach, the so-called fundamental iterative algorithm. From the interpolation constraints of the Guruswami-Sudan principle it is well known that an improvement of the decoding rad...
Conference Paper
In this paper we propose some algorithms for the termination and tailbiting of direct product convolutional codes, whose definition was given in a previous paper by M. Bossert, C. Medina, and V. Sidorenko. There, the properties of these codes were investigated analyzing their generator and parity check matrices. We assume to encode these codes by f...
Conference Paper
The problem of learning an affine Boolean function from noisy examples is considered. This problem is equivalent to the decoding of a binary message encoded with a random linear code and can be also viewed as the problem to decode a message encoded with a randomly punctured Reed-Muller code of first order. The error exponent of the error probabilit...
Chapter
IntroductionIntroduction to Linear CodesIntroduction to Forward Error CorrectionAlgebraic–Geometric CodesComputation of Riemann–Roch SpacesDecoding up to Half the Minimum DistanceInterpolation-Based DecodingPower Decoding of Low Rate Reed–Solomon CodesInterpolation-Based Soft-Decision DecodingSoft-Decision Decoding with the Dorsch AlgorithmReferenc...
Conference Paper
Consider a code C with Hamming distance d. Assume we have a decoder ¿ that corrects ¿ errors and ¿ erasures if ¿¿ + ¿ ¿ d - 1, where a real number 1 < ¿ ¿ 2 is the tradeoff rate between errors and erasures for this decoder. This holds e.g. for l-punctured Reed-Solomon codes, i.e., codes over the field F <sub>q</sub> <sup>l</sup> of length...
Conference Paper
The subspace metric is a subject of intensive researche recently. Nevertheless not much is known about codes in this metric in general. In this paper, one class of subspace metric based codes is defined. This class is a generalization of a Koetter-Kshishang-Silva construction, namely, the lifting construction. Also, a quasi-Singleton bound is deriv...
Article
In this letter, a low complexity decoding algorithm for binary linear block codes is applied to low-density paritycheck (LDPC) codes and improvements are described, namely an extension to soft-decision decoding and a loop detection mechanism. For soft decoding, only one real-valued addition per code symbol is needed, while the remaining operations...
Article
In this letter, an improved bit-flipping decoding algorithm for high-rate finite-geometry low-density parity-check (FG-LDPC) codes is proposed. Both improvement in performance and reduction in decoding delay are observed by flipping multiple bits in each iteration. Our studies show that the proposed algorithm achieves an appealing tradeoff between...
Conference Paper
In this paper a heuristic resource allocation algorithm for sum rate maximization is presented. We consider an orthogonal frequency division multiplexing channel with multiple antennas at the base station as well as at the mobile stations. Our algorithm uses eigen-beamforming and dirty paper coding. The user interference is estimated and the eigenv...
Conference Paper
In this paper we present the mutual information of a bit-interleaved V-BLAST space-time architecture. We assume interference cancellation by successive detection using MMSE equalizers without decoding of the channel codes. The mutual information is dependent on the MIMO channel realization and the detection order. However, the mutual information is...
Article
Adaptive coding, modulation and power allocation are well-known techniques for enhancing the performance of systems transmitting over quasi-static fading channels. Especially their application in orthogonal frequency division multiplexing (OFDM)-based systems promises gains in spectral efficiency. However, an open issue is the joint optimisation of...
Conference Paper
Adaptive coding and modulation are well known techniques for enhancing the performance of systems transmitting over quasi-static fading channels. Especially their application in OFDM based systems promises gains in spectral efficiency. In former work we presented an efficient method for the joint optimization of code rate and modulation formats if...
Conference Paper
In [4] a metric for error correction in network coding is introduced. Also constant-dimension codes were introduced and investigated. Nevertheless little is known on codes in this metric in general. In this paper, several classes of codes are defined and investigated.
Article
Full-text available
This paper analyzes the influence of time-varying cyclic delay diversity (TV-CDD) on the channel fading correlation properties in orthogonal frequency division multiplexing (OFDM) based systems. The underlying transmit diversity technique CDD only increases the frequency diversity at the receiver. In contrast, TV-CDD introduces additionally time di...
Conference Paper
We consider Boolean functions with noisy inputs. I.e., each binary input is sent over a binary symmetric channel with crossover probability isin before fed into the function. By proving an upper bound for the average l-sensitivity, we show that Boolean functions with average sensitivity less or equal 1 will not amplify the noise at their input. Thi...
Conference Paper
The influence of time-varying cyclic delay diversity (TV-CDD) on the channel fading correlation properties is analyzed in this paper. TV-CDD is an attractive transmit diversity technique which increases not only the frequency diversity like pure CDD but also the time diversity in orthogonal frequency division multiplexing (OFDM) based systems. Thes...
Conference Paper
We consider multidimensional bit interleaved coded modulation with iterative decoding (MD-BICM-ID) using 8-PSK constellations. We show that an optimum MD-labeling with a designed interleaver outperforms the two dimensional BICM-ID in the whole SNR region when modulation doping is used to compensate for the loss at the low SNR regions. In addition t...
Conference Paper
Achievable rate regions in broadcast channels are usually determined for infinite Gaussian input alphabets. Since these alphabets are not used for practical systems, we investigate the influence of finite signal constellations in the two user AWGN broadcast channel. We show that results derived with Gaussian inputs are not transferable to the finit...
Conference Paper
Full-text available
In this paper, a modified bit-flipping decoding algorithm for low-density parity-check (LDPC) codes is proposed. Both improvement in performance and reduction in decoding delay are observed by flipping multiple bits in each iteration. Our studies show that the proposed algorithm achieves an appealing tradeoff between performance and complexity for...
Article
Within the EU FP6 Integrated Project WINNER, adaptive transmission in a TDMA/OFDMA system is investigated as a key technology for boosting the spectral efficiency of a new radio interface for 4G systems. Adaptive allocation and link-adaptation of subcarriers or groups of subcarriers based on short-term channel quality prediction offer significant a...
Conference Paper
This paper introduces the concept of mapping code bits onto orthogonal channel links of different quality according to their importance for decoding. The applicability of this concept is shown with the gain in decoding performance using a punctured parallel concatenated convolutional code (PCCC) and OFDM transmission over a fading channel. For this...
Conference Paper
In this paper, we describe a method, how to optimize the asymptotic puncturing distributions for low-density parity-check codes constructed with different algorithms. Therefore, we generalize the discretized density evolution such that we can take care of the structure of the code. We show by density evolution and by simulations that even for the s...
Conference Paper
We calculate the rank of low-density parity-check (LDPC) matrices based on Vandermonde matrix like constructions. In the case of prime fields the rank is given exactly. We show that LDPC codes based on RS codes are a special case of the Vandermonde based construction, thus also for these LDPC matrix construction, the rank calculation is valid. Howe...
Conference Paper
It is known, that interleaved Reed-Solomon codes can be decoded algebraically beyond half the minimum distance using collaborative decoding strategies. Based on the same principles, we suggest a new effective algebraic decoding method, which is able to decode a single low rate Reed-Solomon code beyond half the minimum distance. This new algorithm i...
Conference Paper
We propose a multidimensional constellation labeling for bit interleaved space time coded modulation with iterative decoding (BI-STCM-ID) using the Alamouti scheme and one receive antenna. The labeling of two 16-QAM signals are designed jointly and optimized using the reactive tabu search (RTS) algorithm with a slight modification in the fitness fu...
Chapter
Block coded modulation schemes can be obtained by generalized concatenation of the modulation and block codes of length N. The modulation is considered as a code in the euclidean space IR 2. One obtains a concatenated code in the euclidean space IR 2N using binary block codes. In this paper the obtained code is taken as an inner code, which is conc...
Chapter
In this paper two fundamental aspects for wireless data transmission are addressed, namely the interrelation between multicarrier spread spec- trum transmission and multilevel coding and the view of downlink trans- mission as the broadcast channel from information theory. In the first part it will be shown that multicarrier spread spectrum systems...
Conference Paper
We define and investigate the direct product of convolutional codes. Properties of generator and parity check matrices are considered. Free distance of a product convolutional code is estimated using both, active distances and the suggested concept of "block distances" of convolutional component codes. We show that every product convolutional code...
Conference Paper
In this paper, a low complexity algorithm for binary linear block codes is applied to low-density parity-check (LDPC) codes and improvements are described, namely an extension to soft-decision decoding and a loop detection mechanism. For soft decoding, only one real-valued addition per code symbol is needed, while the remaining operations are only...
Conference Paper
In this paper, an algorithm for low-density parity-check (LDPC) codes with reduced complexity is presented. The complexity reduction is achieved by calculating a linear function for updating the check nodes in each iteration, instead of an exponential and logarithmic function. The parameters of the linear function are optimized by density evolution...
Conference Paper
This paper is concerned with the capacity evaluation of an incremental redundancy (IR) scheme with mapper rearrangement. The AWGN performance of the scheme originally proposed by Schmitt is evaluated for the coded modulation (CM) as well as for the bitinterleaved coded modulation (BICM) scenario. A mapper that is improving the BICM performance at l...
Conference Paper
In this paper, we consider an OFDM downlink situation, where the information is sent from only one transmitter to several receivers. For such a scenario the delay-limited capacity is investigated. We show that the delay-limited capacity is equal to zero when one Rayleigh channel is assigned to each user, and that it is greater than zero in case of...
Article
Abstract— In this paper the broadband,wireless access system provided by the IEEE 802.16 wireless MAN air interface with its amendment,to mobile users (IEEE 802.16e) is addressed. We exclusively consider data transmission in the uplink based on scalable OFDMA. We provide performance,results for the most,important forward,error correcting (FEC) sche...
Conference Paper
Interleaved Reed-Solomon codes allow the correction of errors beyond half the minimum code distance if the errors are not distributed independently in the received signal but occur in bursts. Therefore, these codes are mainly considered for applications in channels, that cause correlated error patterns, i.e., error bursts. However, they can also be...
Conference Paper
A polyalphabetic (or mixed) block code is a set of codewords of finite length, where every symbol of a codeword belongs to its own alphabet. In contrast to previous publications we consider a general case, where we do not assume any algebraic structure of the alphabets and the codes. Upper and lower bounds on the cardinality of a polyalphabetic cod...
Conference Paper
The serial concatenation of an outer convolutional code, a designed interleaver and inner minimum shift keying (MSK) is presented. This system is compared to serially concatenated MSK with random interleaver and to a system with three outer convolutional codes and random interleaver, which is called woven coded MSK. It is shown analytically that se...
Article
A solution for the design of space time codes over a complex signal constellation is given. The Gaussian integer field is described and shown to produce a similar complex signal constellation as QAM for particular parameters. The mapping between the Galois field and the Gaussian integer field is shown to preserve the rank statistics of codeword mat...
Conference Paper
We investigate a decision feedback strategy for convolutional codes which is based on a sliding window decoding procedure and a threshold test as decision rule. For this purpose, we introduce the burst distance spectrum of a convolutional code and derive asymptotic bounds for the ensemble of periodically time-varying convolutional codes. These resu...
Conference Paper
Serially concatenated trellis coded modulation (SCTCM) yield both power and bandwidth efficient transmission systems. In this paper the choice of the inner trellis code as well as the outer convolutional code based on the so-called slope is discussed.
Conference Paper
To find the best path in a trellis, the Viterbi algorithm can be used. We present an algorithm to find not only the best, but a sorted list of the ℓ best paths. Our algorithm is based on the Viterbi algorithm and iteratively applies a back-tracing procedure to find the ℓ best paths.
Conference Paper
This paper describes the hierarchical woven coded CPFSK (hWCCPFSK), is a serial concatenation of different outer convolutional codes and inner continuous phase frequency shift keying (CPFSK). Classical woven coded CPFSK (cWCCPFSK) has identical outer convolutional codes. We show that with a proper choice of the outer codes, hWCCPFSK has better deco...
Conference Paper
In attempting to find a channel code which is able to exploit maximum diversity, we investigate the possibility of constructing full antenna diversity space time codes based on concatenated convolutional codes. Three different code classes, woven convolutional codes, serially concatenated convolutional codes and partially concatenated convolutional...
Article
Nested convolutional codes are a set of convolutional codes that is derived from a given generator matrix. The structural properties of nested convolutional codes and nested generator matrices are studied. A method to construct the set of all minimal (rational) generator matrices of a given convolutional code is presented. As an example, two differ...
Conference Paper
The slope is the asymptotic growth rate of the active distances which are of particular interest for the design of trellis coded modulation schemes and concatenated codes. The higher the slope (growth rate) of the active burst distance, the better the error correcting capability of the code. In this paper we introduce the slope as a new parameter f...
Article
Recently, the concept of active distances, originally introduced for binary convolutional codes, was extended to the case of nonlinear trellis coded modulation. These distance measures allow an improved evaluation of the error correcting capability for trellis codes. Typically, the larger the slope of the active distances the better the performance...
Conference Paper
The paper reveals the interrelation between multicarrier spread spectrum (MC-SS) transmission and multilevel coding (MLC). It is shown that MC-SS systems can be interpreted as a multilevel code with repetition codes in the levels. The paper is intended to provide new insights into both MC-SS systems and MLC. For both schemes, a lot of theory has be...
Conference Paper
Full-text available
In this paper, we investigate the applicability of the Plotkin code construction method to arbitrary finite sets, particularly complex valued modulation alphabets. Furthermore, we derive a recursive soft-in/soft-out decoding algorithm for these code constructions. The purpose is to have an encoding/decoding scheme available, which uses elements of...
Article
The critical design criterion for space-time codes in asymptotically good channels is the minimum rank between codeword pairs. Rank codes are a two-dimensional matrix code construction where by the rank is the metric of merit. We look at the application of rank codes to space-time code design. In particular, we provide construction methods of full-...
Article
We present a space-frequency coding scheme using cyclic delay diversity (CDD) for an orthogonal frequency division multiplexing (OFDM)-based transmission system. CDD is a simple multiple transmit antenna approach for increasing the frequency selectivity of the channel seen at a single antenna receiver. This is due to the insertion of virtual echoes...
Conference Paper
Cyclic delay diversity (CDD) is a simple approach to increase the frequency selectivity of the channel in an orthogonal frequency division multiplexing (OFDM) based transmission scheme. The reason for this is that CDD inserts virtual echoes. Due to these virtual multipath components carriers experience different channels if the antenna specific cyc...
Conference Paper
Expander codes where introduced in (1996) by Sipser and Spielman. These codes are related to low-density parity-check codes (LDPC-codes) from (R.G. Gallager, 1963) and other codes described in (R.M. Tanner, 1981), but with the restriction that any code symbol is involved in only two check equations. Gallager showed in (1963) that this is not suitab...
Conference Paper
Space time codes seek to exploit the statistical properties of a multi-antenna transmission scenario. We focus on maximizing a codes diversity which is determined by the rank between codeword difference pairs at high SNR. This criterion must be evaluated over a complex modulation alphabet C. Work by Liu et al. (2000) presents a criterion for select...
Conference Paper
Nested convolutional codes are a set of convolutional codes that is derived from a given generator matrix. The structural properties of nested generator matrices and nested convolutional codes are studied. A method to construct the set of all (rational) minimal generator matrices of a given convolutional code is presented. Nested convolutional code...
Conference Paper
The space time cyclotomic coset factorization codes are a new class of block space time codes which achieve full diversity. The codes are based on classical linear coding theory which facilitates their design. Full rank code constructions also exist based on the Gaussian integer field where p, is a prime number satisfying p, = 4 * n + 1, n an integ...
Article
Cyclic Delay Diversity (CDD) is a simple ap-proach to introduce spatial diversity to an Orthogonal Fre-quency Division Multiplexing (OFDM) based transmission scheme that itself has no built-in diversity. It also can be re-garded as a Space-Time Code (STC). But in contrast to that there is no additional effort in the receiver necessary, since the di...
Article
A non-recursive algorithm with low complexity is presented that permits a receiver to quantify the reliability of segments within an estimated code sequence. This reliability output may be used for example in repeat request schemes with partial retransmissions, for decoding concatenated code structures or in error concealment schemes.
Conference Paper
Full-text available
Turbo codes (TC) with unequal error protection (UEP) are introduced. We consider a serial cascade of an array of repetition codes, an interleaver, and a TC. Such a coding scheme was introduced by B.J. Frey and D.J.C. MacKay (1999) as an irregular turbo code (ITC). A lower bound on the protection level of the ITC is presented. Additionally, simulati...
Conference Paper
We introduce the concept of transforming a space-time code into an equivalent code space which reduces the maximum-likelihood trellis decoding complexity. This concept is illustrated using the space-time Hadamard (STH) code construction

Citations

... In this paper, we will discuss only code-based cryptography. It includes all the cryptosystems in which security depends upon the hardness of encoding and decoding of the error-correcting codes like Goppa codes [8], Bose-Chaudhuri-Hocquenghem (BCH) codes [9], and Reed-Solomon codes [10]. In 1978, McEliece introduced the first code-based public-key cryptosystem [11]. ...
... This paper focuses on computing at cryogenic temperatures, for example, required to implement quantum computers. For this reason, the retention of DRAM memory modules was examined on temperatures from 358 K, 77 K and 263 K. Müelich et al. [20] present a theoretical model which captures the instabilities of PUF responses. DRAM retention PUFs are evaluated on temperatures from 25°C to 90°C. ...
... This gap can be closed in Step 3 with BMD(C 01 ), which is able to nd the correct solution since d 01 ≥ δ (r) 1,R = d f,R . The complexity is determined by the complexity of the BMD rank block error-erasure decoders from Table 6.1 (realized e.g., as in [SKK08,GPB10] and Subsection 3. ...
... In this sense, we can suppose that we are facing a microscopic communication system that to transfer information. Therefore in the procedure of translating genome sequence, it can be infered that genome sequence is the source of information transmission during genome sequence biological translation [5,6] and based on this fact, we suggest a source coding method for converting the gene sequence to a decimal sequence. After providing a digital signal for any given gene of genome sequence, since frequently have been observed that genome sequence demonstrate cyclic pattern [7], a powerful tools named HP filter will be applied to this decimal sequence to decompose it to trend component and Cyclic component. ...
... There are various error correction codes of PUFs that focus on optimizing the code in terms of implementation overhead, decoding complexity and hardware resources [BGS + 08, MVHV12, HKS20, MHK + 19, PMB + 15] applying Bose Chaudhuri Hocquenghem (BCH), Reed Solomon or Reed Muller Codes. Another way of reducing the implementation overhead is by including soft and reliability information [MTV09a,MTV09b,MPB18,HOSB16]. Apart from implementation efficiency, secrecy leakage is a known issue for PUFs. ...
... As this work focuses on the helper data generation and ECC parts, all bit mapping aspects are subsumed under the PUF and the output is interpreted as PUF response in the following. Incorporating the helper data into a specific ECC for each PUF, as it was shown in [55] for LDPC codes, would further increase the efficiency but is not possible for many use cases. ...
... In this model, corrupted symbols are usually seen as row errors and column errors and since those errors are generally bursty, codes designed for the hamming metric are not generally suitable in these situations. Note that those codes have also been used in the design of cryptosystems [17] and space-time codes [18], [19]. ...
... In (Roth, 1996;Augot et al., 2018), constructions of Gabidulin codes over arbitrary Galois field extensions were given. Decoding of Gabidulin codes over Galois extensions was studied by Robert (2016), Müelich et al. (2016), and Augot et al. (2018). For exact computation domains (such as number fields), it is still an open problem to properly analyze the intermediate coefficient growth in these decoding algorithms, e.g., analog to (Sippel et al., 2019) for Reed-Solomon codes. ...
... Streaming applications require low latency decoding of the received data blocks and it has been shown that, under such constraints, convolutional codes perform well [18], [19] for different erasure channels. When considering errors, convolutional codes are sensitive to burst errors but good at handling well-distributed errors [20]. ...
... A variety of methods [3], [5]- [7], [23], [32], [35], [36] exist for obtaining space-time codes from codes over finite fields. We set aside those focused on binary fields because linearized Reed-Solomon codes are only interesting when nonbinary due to the q > L requirement. ...