Skip to main content

Showing 1–14 of 14 results for author: Ytrehus, O

  1. arXiv:2309.12291  [pdf, other

    cs.IT

    Linearity of $\mathbb{Z}_{2^L}$-Linear Codes via Schur Product

    Authors: Gustavo T. Bastos, Maiara F. Bollauf, Agnaldo J. Ferrari, Øyvind Ytrehus

    Abstract: We propose an original approach to investigate the linearity of $\mathbb{Z}_{2^L}$-linear codes, i.e., codes obtained as the image of the generalized Gray map applied to $\mathbb{Z}_{2^L}$-additive codes. To accomplish that, we define two related binary codes: the associated and concatenated, where one could perform a straightforward analysis of the Schur product between their codewords and determ… ▽ More

    Submitted 27 January, 2024; v1 submitted 21 September, 2023; originally announced September 2023.

  2. arXiv:2303.08083  [pdf, ps, other

    cs.IT

    Secrecy Gain of Formally Unimodular Lattices from Codes over the Integers Modulo 4

    Authors: Maiara F. Bollauf, Hsuan-Yin Lin, Øyvind Ytrehus

    Abstract: Recently, a design criterion depending on a lattice's volume and theta series, called the secrecy gain, was proposed to quantify the secrecy-goodness of the applied lattice code for the Gaussian wiretap channel. To address the secrecy gain of Construction $\text{A}_4$ lattices from formally self-dual $\mathbb{Z}_4$-linear codes, i.e., codes for which the symmetrized weight enumerator (swe) coincid… ▽ More

    Submitted 13 February, 2024; v1 submitted 14 March, 2023; originally announced March 2023.

    Comments: arXiv admin note: text overlap with arXiv:2202.09236; Paper accepted for publication in IEEE Transactions on Information Theory

  3. arXiv:2206.14171  [pdf, ps, other

    cs.IT

    Formally Unimodular Packings for the Gaussian Wiretap Channel

    Authors: Maiara F. Bollauf, Hsuan-Yin Lin, Øyvind Ytrehus

    Abstract: This paper introduces the family of lattice-like packings, which generalizes lattices, consisting of packings possessing periodicity and geometric uniformity. The subfamily of formally unimodular (lattice-like) packings is further investigated. It can be seen as a generalization of the unimodular and isodual lattices, and the Construction A formally unimodular packings obtained from formally self-… ▽ More

    Submitted 28 September, 2023; v1 submitted 28 June, 2022; originally announced June 2022.

    Comments: Accepted for publication in IEEE Transactions on Information Theory. arXiv admin note: text overlap with arXiv:2111.01439

  4. arXiv:2202.09236  [pdf, ps, other

    cs.IT

    On the Secrecy Gain of Formally Unimodular Construction $\text{A}_4$ Lattices

    Authors: Maiara F. Bollauf, Hsuan-Yin Lin, Øyvind Ytrehus

    Abstract: Lattice coding for the Gaussian wiretap channel is considered, where the goal is to ensure reliable communication between two authorized parties while preventing an eavesdropper from learning the transmitted messages. Recently, a measure called secrecy gain was proposed as a design criterion to quantify the secrecy-goodness of the applied lattice code. In this paper, the theta series of the so-cal… ▽ More

    Submitted 18 February, 2022; originally announced February 2022.

  5. arXiv:2111.01439  [pdf, ps, other

    cs.IT

    The Secrecy Gain of Formally Unimodular Lattices on the Gaussian Wiretap Channel

    Authors: Maiara F. Bollauf, Hsuan-Yin Lin, Øyvind Ytrehus

    Abstract: We consider lattice coding for the Gaussian wiretap channel, where the challenge is to ensure reliable communication between two authorized parties while preventing an eavesdropper from learning the transmitted messages. Recently, a measure called the secrecy function of a lattice coding scheme was proposed as a design criterion to characterize the eavesdropper's probability of correct decision. I… ▽ More

    Submitted 2 November, 2021; originally announced November 2021.

  6. arXiv:2105.04253  [pdf, other

    cs.IT

    Tiling of Constellations

    Authors: Maiara F. Bollauf, Øyvind Ytrehus

    Abstract: Motivated by applications in reliable and secure communication, we address the problem of tiling (or partitioning) a finite constellation in $\mathbb{Z}_{2^L}^n$ by subsets, in the case that the constellation does not possess an abelian group structure. The property that we do require is that the constellation is generated by a linear code through an injective mapping. The intrinsic relation betwe… ▽ More

    Submitted 12 May, 2021; v1 submitted 10 May, 2021; originally announced May 2021.

  7. arXiv:1907.02944  [pdf

    cs.IT

    Proceedings of the 11th Asia-Europe Workshop on Concepts in Information Theory

    Authors: A. J. Han Vinck, Kees A. Schouhamer Immink, Tadashi Wadayama, Van Khu Vu, Akiko Manada, Kui Cai, Shunsuke Horii, Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta, Xingwei Zhong, Zhen Mei, Renfei Bu, J. H. Weber, Vitaly Skachek, Hiroyoshi Morita, N. Hovhannisyan, Hiroshi Kamabe, Shan Lu, Hirosuke Yamamoto, Kengo Hasimoto, O. Ytrehus, Shigeaki Kuzuoaka, Mikihiko Nishiara, Han Mao Kiah , et al. (2 additional authors not shown)

    Abstract: This year, 2019 we celebrate 30 years of our friendship between Asian and European scientists at the AEW11 in Rotterdam, the Netherlands. Many of the 1989 participants are also present at the 2019 event. This year we have many participants from different parts of Asia and Europe. It shows the importance of this event. It is a good tradition to pay a tribute to a special lecturer in our community.… ▽ More

    Submitted 26 June, 2019; originally announced July 2019.

  8. arXiv:1710.08540  [pdf, other

    cs.CR

    Eliminating Variables in Boolean Equation Systems

    Authors: Bjørn Møller Greve, Håvard Raddum, Gunnar Fløystad, Øyvind Ytrehus

    Abstract: Systems of Boolean equations of low degree arise in a natural way when analyzing block ciphers. The cipher's round functions relate the secret key to auxiliary variables that are introduced by each successive round. In algebraic cryptanalysis, the attacker attempts to solve the resulting equation system in order to extract the secret key. In this paper we study algorithms for eliminating the auxil… ▽ More

    Submitted 23 October, 2017; originally announced October 2017.

    Comments: 21 pages, 3 figures, Journal paper

  9. arXiv:1709.01455  [pdf, other

    cs.IT

    ML and Near-ML Decoding of LDPC Codes Over the BEC: Bounds and Decoding Algorithms

    Authors: Irina E. Bocharova, Boris D. Kudryashov, Vitaly Skachek, Eirik Rosnes, Øyvind Ytrehus

    Abstract: The performance of maximum-likelihood (ML) decoding on the binary erasure channel for finite-length low-density parity-check (LDPC) codes from two random ensembles is studied. The theoretical average spectrum of the Gallager ensemble is computed by using a recurrent procedure and compared to the empirically found average spectrum for the same ensemble as well as to the empirical average spectrum o… ▽ More

    Submitted 20 November, 2018; v1 submitted 5 September, 2017; originally announced September 2017.

    Comments: To appear in IEEE Transactions on Communications

  10. arXiv:1705.10091  [pdf, other

    cs.IT

    Rate $(n-1)/n$ Systematic MDS Convolutional Codes over $GF(2^m)$

    Authors: Ángela Barbero, Øyvind Ytrehus

    Abstract: A systematic convolutional encoder of rate $(n-1)/n$ and maximum degree $D$ generates a code of free distance at most ${\cal D} = D+2$ and, at best, a column distance profile (CDP) of $[2,3,\ldots,{\cal D}]$. A code is \emph{Maximum Distance Separable} (MDS) if it possesses this CDP. Applied on a communication channel over which packets are transmitted sequentially and which loses (erases) packets… ▽ More

    Submitted 29 May, 2017; originally announced May 2017.

  11. Near-Field Passive RFID Communication: Channel Model and Code Design

    Authors: Ángela I. Barbero, Eirik Rosnes, Guang Yang, Øyvind Ytrehus

    Abstract: This paper discusses a new channel model and code design for the reader-to-tag channel in near-field passive radio frequency identification (RFID) systems using inductive coupling as a power transfer mechanism. If the receiver resynchronizes its internal clock each time a bit is detected, the bit-shift channel used previously in the literature to model the reader-to-tag channel needs to be modifie… ▽ More

    Submitted 21 March, 2014; v1 submitted 20 September, 2013; originally announced September 2013.

    Comments: Submitted to IEEE Transactions on Communications. Accepted March 5, 2014

  12. Improved Delay Estimates for a Queueing Model for Random Linear Coding for Unicast

    Authors: Mohammad Ravanbakhsh, Angela I. Barbero Diez, Oyvind Ytrehus

    Abstract: Consider a lossy communication channel for unicast with zero-delay feedback. For this communication scenario, a simple retransmission scheme is optimum with respect to delay. An alternative approach is to use random linear coding in automatic repeat-request (ARQ) mode. We extend the work of Shrader and Ephremides, by deriving an expression for the delay of random linear coding over field of infi… ▽ More

    Submitted 26 May, 2009; v1 submitted 26 January, 2009; originally announced January 2009.

    Comments: 5 pages, 3 figures, accepted at the 2009 IEEE International Symposium on Information Theory

  13. arXiv:0705.0085  [pdf, other

    cs.IT

    An efficient centralized binary multicast network coding algorithm for any cyclic network

    Authors: Angela I. Barbero Diez, Oyvind Ytrehus

    Abstract: We give an algorithm for finding network encoding and decoding equations for error-free multicasting networks with multiple sources and sinks. The algorithm given is efficient (polynomial complexity) and works on any kind of network (acyclic, link cyclic, flow cyclic, or even in the presence of knots). The key idea will be the appropriate use of the delay (both natural and additional) during the… ▽ More

    Submitted 1 May, 2007; originally announced May 2007.

  14. arXiv:cs/0602072  [pdf, ps, other

    cs.IT

    Turbo Decoding on the Binary Erasure Channel: Finite-Length Analysis and Turbo Stopping Sets

    Authors: Eirik Rosnes, Øyvind Ytrehus

    Abstract: This paper is devoted to the finite-length analysis of turbo decoding over the binary erasure channel (BEC). The performance of iterative belief-propagation (BP) decoding of low-density parity-check (LDPC) codes over the BEC can be characterized in terms of stopping sets. We describe turbo decoding on the BEC which is simpler than turbo decoding on other channels. We then adapt the concept of st… ▽ More

    Submitted 20 February, 2006; originally announced February 2006.

    Comments: 28 pages, 5 figures, submitted to IEEE Transactions on Information Theory

    Journal ref: IEEE Trans. Inf. Theory, vol. 53, no. 11, pp. 4059-4075, Nov. 2007