Zum Hauptinhalt springen

Showing 1–43 of 43 results for author: Boßert, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.12946  [pdf, other

    cs.IT

    Soft Decision Decoding of Recursive Plotkin Constructions Based on Hidden Code Words

    Authors: Martin Bossert

    Abstract: The Plotkin construction combines two codes to a code of doubled length. It can be applied recursively. The class of Reed-Muller (RM) codes is a particular example. Also, a special class of generalized concatenated codes (GCC) can be described as recursive Plotkin construction. Exploiting a property of the code words constructed by the recursive Plotkin construction, we present novel soft-decision… ▽ More

    Submitted 23 August, 2024; originally announced August 2024.

  2. arXiv:2209.01106  [pdf, other

    cs.CL

    A New Aligned Simple German Corpus

    Authors: Vanessa Toborek, Moritz Busch, Malte Boßert, Christian Bauckhage, Pascal Welke

    Abstract: "Leichte Sprache", the German counterpart to Simple English, is a regulated language aiming to facilitate complex written language that would otherwise stay inaccessible to different groups of people. We present a new sentence-aligned monolingual corpus for Simple German -- German. It contains multiple document-aligned sources which we have aligned using automatic sentence-alignment methods. We ev… ▽ More

    Submitted 26 May, 2023; v1 submitted 2 September, 2022; originally announced September 2022.

    Comments: Accepted at ACL 2023

  3. On Hard and Soft Decision Decoding of BCH Codes

    Authors: Martin Bossert, Rebekka Schulz, Sebastian Bitzer

    Abstract: The binary primitive BCH codes are cyclic and are constructed by choosing a subset of the cyclotomic cosets. Which subset is chosen determines the dimension, the minimum distance and the weight distribution of the BCH code. We construct possible BCH codes and determine their coderate, true minimum distance and the non-equivalent codes. A particular choice of cyclotomic cosets gives BCH codes which… ▽ More

    Submitted 20 June, 2022; v1 submitted 15 July, 2021; originally announced July 2021.

    Comments: To appear in the IEEE Transactions on Information Theory

  4. arXiv:2102.02244  [pdf, ps, other

    cs.IT

    Bounds and Genericity of Sum-Rank-Metric Codes

    Authors: Cornelia Ott, Sven Puchinger, Martin Bossert

    Abstract: We derive simplified sphere-packing and Gilbert--Varshamov bounds for codes in the sum-rank metric, which can be computed more efficiently than previous ones. They give rise to asymptotic bounds that cover the asymptotic setting that has not yet been considered in the literature: families of sum-rank-metric codes whose block size grows in the code length. We also provide two genericity results: we… ▽ More

    Submitted 21 March, 2023; v1 submitted 3 February, 2021; originally announced February 2021.

  5. arXiv:2001.02956  [pdf, other

    cs.IT

    On Decoding Using Codewords of the Dual Code

    Authors: Martin Bossert

    Abstract: We present novel decoding schemes for hard and soft decision decoding of block codes using the minimal weight codewords of the dual code. The decoding schemes will be described for cyclic codes where polynomials can be used, however, the modification for non-cyclic codes is possible and straight forward. The hard decision decoding calculates syndrome polynomials which are the product of the receiv… ▽ More

    Submitted 9 January, 2020; originally announced January 2020.

    Comments: 12 pages, 5 figures, 1 table

  6. arXiv:1901.06863  [pdf, ps, other

    cs.IT

    Reed-Solomon Codes over Fields of Characteristic Zero

    Authors: Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert

    Abstract: We study Reed--Solomon codes over arbitrary fields, inspired by several recent papers dealing with Gabidulin codes over fields of characteristic zero. Over the field of rational numbers, we derive bounds on the coefficient growth during encoding and the bit complexity of decoding, which is polynomial in the code length and in the bit width of error and codeword values. The results can be generaliz… ▽ More

    Submitted 28 June, 2019; v1 submitted 21 January, 2019; originally announced January 2019.

    Comments: 8 pages, extended version of a paper accepted IEEE International Symposium on Information Theory 2019

  7. arXiv:1801.07003  [pdf, other

    cs.IT cs.CR

    Structural Properties of Twisted Reed-Solomon Codes with Applications to Cryptography

    Authors: Peter Beelen, Martin Bossert, Sven Puchinger, Johan Rosenkilde

    Abstract: We present a generalisation of Twisted Reed-Solomon codes containing a new large class of MDS codes. We prove that the code class contains a large subfamily that is closed under duality. Furthermore, we study the Schur squares of the new codes and show that their dimension is often large. Using these structural properties, we single out a subfamily of the new codes which could be considered for co… ▽ More

    Submitted 11 May, 2018; v1 submitted 22 January, 2018; originally announced January 2018.

    Comments: 5 pages, accepted at: IEEE International Symposium on Information Theory 2018

  8. arXiv:1712.00938  [pdf, ps, other

    cs.IT

    Algebraic Soft Decoding of Reed-Solomon Codes Using Module Minimization

    Authors: Jiongyue Xing, Li Chen, Martin Bossert

    Abstract: The interpolation based algebraic decoding for Reed-Solomon (RS) codes can correct errors beyond half of the code's minimum Hamming distance. Using soft information, the algebraic soft decoding (ASD) further improves the decoding performance. This paper presents a unified study of two classical ASD algorithms in which the computationally expensive interpolation is solved by the module minimization… ▽ More

    Submitted 17 May, 2018; v1 submitted 4 December, 2017; originally announced December 2017.

    Comments: 30 pages, 4 figures

  9. arXiv:1706.05830  [pdf, other

    cs.IT

    Code Constructions based on Reed-Solomon Codes

    Authors: Michael Schelling, Martin Bossert

    Abstract: Reed--Solomon codes are a well--studied code class which fulfill the Singleton bound with equality. However, their length is limited to the size $q$ of the underlying field $\mathbb{F}_q$. In this paper we present a code construction which yields codes with lengths of factors of the field size. Furthermore a decoding algorithm beyond half the minimum distance is given and analyzed.

    Submitted 19 June, 2017; originally announced June 2017.

  10. arXiv:1705.08652  [pdf, ps, other

    cs.IT

    On the Success Probability of Decoding (Partial) Unit Memory Codes

    Authors: Sven Puchinger, Sven Müelich, Martin Bossert

    Abstract: In this paper, we derive analytic expressions for the success probability of decoding (Partial) Unit Memory codes in memoryless channels. An applications of this result is that these codes outperform individual block codes in certain channels.

    Submitted 24 May, 2017; originally announced May 2017.

    Comments: 9 pages, extended version of a paper submitted to the International Workshop on Optimal Codes and Related Topics, 2017

  11. arXiv:1704.01306  [pdf, ps, other

    cs.IT cs.CR

    Using Convolutional Codes for Key Extraction in SRAM Physical Unclonable Functions

    Authors: Sven Müelich, Sven Puchinger, Martin Bossert

    Abstract: Physical Unclonable Functions (PUFs) exploit variations in the manufacturing process to derive bit sequences from integrated circuits, which can be used as secure cryptographic keys. Instead of storing the keys in an insecure, non-volatile memory, they can be reproduced when needed. Since the reproduced sequences are not stable due to physical reasons, error correction must be applied. Recently, c… ▽ More

    Submitted 10 January, 2018; v1 submitted 5 April, 2017; originally announced April 2017.

    Comments: Submitted to "Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE 2018)"

  12. arXiv:1703.07973  [pdf, other

    cs.IT

    Constructing an LDPC Code Containing a Given Vector

    Authors: Sven Müelich, Sven Puchinger, Martin Bossert

    Abstract: The coding problem considered in this work is to construct a linear code $\mathcal{C}$ of given length $n$ and dimension $k<n$ such that a given binary vector $\mathbf{r} \in \mathbb{F}^{n}$ is contained in the code. We study a recent solution of this problem by Müelich and Bossert, which is based on LDPC codes. We address two open questions of this construction. First, we show that under certain… ▽ More

    Submitted 14 August, 2018; v1 submitted 23 March, 2017; originally announced March 2017.

    Comments: 5 pages, accepted at the International Workshop on Algebraic and Combinatorial Coding Theory, 2018

  13. arXiv:1701.07184  [pdf, ps, other

    cs.IT

    Multi-Block Interleaved Codes for Local and Global Read Access

    Authors: Yuval Cassuto, Evyatar Hemo, Sven Puchinger, Martin Bossert

    Abstract: We define multi-block interleaved codes as codes that allow reading information from either a small sub-block or from a larger full block. The former offers faster access, while the latter provides better reliability. We specify the correction capability of the sub-block code through its gap $t$ from optimal minimum distance, and look to have full-block minimum distance that grows with the paramet… ▽ More

    Submitted 25 January, 2017; originally announced January 2017.

  14. arXiv:1611.07811  [pdf, ps, other

    cs.IT

    Guruswami--Sudan List Decoding for Complex Reed--Solomon Codes

    Authors: Mostafa H. Mohamed, Sven Puchinger, Martin Bossert

    Abstract: We analyze the Guruswami--Sudan list decoding algorithm for Reed--Solomon codes over the complex field for sparse recovery in Compressed Sensing. We propose methods of stabilizing both the interpolation and the root-finding steps against numerical instabilities, where the latter is the most sensitive. For this purpose, we modify the Roth--Ruckenstein algorithm and propose a method to refine its re… ▽ More

    Submitted 23 November, 2016; originally announced November 2016.

    Comments: 6 pages, accepted for publication at the 11th International ITG Conference on Systems, Communications and Coding (SCC 2017)

  15. arXiv:1611.07702  [pdf, ps, other

    cs.IT

    Timing Attack Resilient Decoding Algorithms for Physical Unclonable Functions

    Authors: Sven Puchinger, Sven Müelich, Antonia Wachter-Zeh, Martin Bossert

    Abstract: This paper deals with the application of list decoding of Reed--Solomon codes to a concatenated code for key reproduction using Physical Unclonable Functions. The resulting codes achieve a higher error-correction performance at the same code rate than known schemes in this scenario. We also show that their decoding algorithms can be protected from side-channel attacks on the runtime both by maskin… ▽ More

    Submitted 23 November, 2016; originally announced November 2016.

    Comments: 6 pages, accepted for publication at the 11th International ITG Conference on Systems, Communications and Coding (SCC 2017)

  16. arXiv:1611.01960  [pdf, ps, other

    cs.CR cs.IT

    A New Error Correction Scheme for Physical Unclonable Functions

    Authors: Sven Müelich, Martin Bossert

    Abstract: Error correction is an indispensable component when Physical Unclonable Functions (PUFs) are used in cryptographic applications. So far, there exist schemes that obtain helper data, which they need within the error correction process. We introduce a new scheme, which only uses an error correcting code without any further helper data. The main idea is to construct for each PUF instance an individua… ▽ More

    Submitted 8 November, 2016; v1 submitted 7 November, 2016; originally announced November 2016.

    Comments: 6 pages

  17. arXiv:1605.05716  [pdf, ps, other

    cs.IT

    Space-Time Codes Based on Rank-Metric Codes and Their Decoding

    Authors: Sven Puchinger, Sebastian Stern, Martin Bossert, Robert F. H. Fischer

    Abstract: We propose a new class of space-time block codes based on finite-field rank-metric codes in combination with a rank-metric-preserving mapping to the set of Eisenstein integers. It is shown that these codes achieve maximum diversity order and improve upon certain existing constructions. Moreover, we present a new decoding algorithm for these codes which utilizes the algebraic structure of the under… ▽ More

    Submitted 29 May, 2017; v1 submitted 18 May, 2016; originally announced May 2016.

    Comments: 6 pages, IEEE International Symposium on Wireless Communication Systems 2016

  18. arXiv:1604.05899  [pdf, ps, other

    cs.IT cs.SC

    Decoding Interleaved Gabidulin Codes using Alekhnovich's Algorithm

    Authors: Sven Puchinger, Sven Müelich, David Mödinger, Johan Rosenkilde né Nielsen, Martin Bossert

    Abstract: We prove that Alekhnovich's algorithm can be used for row reduction of skew polynomial matrices. This yields an $O(\ell^3 n^{(ω+1)/2} \log(n))$ decoding algorithm for $\ell$-Interleaved Gabidulin codes of length $n$, where $ω$ is the matrix multiplication exponent, improving in the exponent of $n$ compared to previous results.

    Submitted 15 September, 2016; v1 submitted 20 April, 2016; originally announced April 2016.

    Comments: 6 pages, presented at the International Workshop on Algebraic and Combinatorial Coding Theory (ACCT) 2016, submitted to Electronic Notes in Discrete Mathematics (volume devoted to ACCT 2016)

  19. arXiv:1604.04397  [pdf, ps, other

    cs.IT cs.CV

    Low-Rank Matrix Recovery using Gabidulin Codes in Characteristic Zero

    Authors: Sven Müelich, Sven Puchinger, Martin Bossert

    Abstract: We present a new approach on low-rank matrix recovery (LRMR) based on Gabidulin Codes. Since most applications of LRMR deal with matrices over infinite fields, we use the recently introduced generalization of Gabidulin codes to fields of characterstic zero. We show that LRMR can be reduced to decoding of Gabidulin codes and discuss which field extensions can be used in the code construction.

    Submitted 15 September, 2016; v1 submitted 15 April, 2016; originally announced April 2016.

    Comments: 6 pages, presented at the International Workshop on Algebraic and Combinatorial Coding Theory (ACCT) 2016, submitted to Electronic Notes in Discrete Mathematics (volume devoted to ACCT 2016)

  20. arXiv:1601.05205  [pdf, ps, other

    cs.IT

    An Alternative Decoding Method for Gabidulin Codes in Characteristic Zero

    Authors: Sven Müelich, Sven Puchinger, David Mödinger, Martin Bossert

    Abstract: Gabidulin codes, originally defined over finite fields, are an important class of rank metric codes with various applications. Recently, their definition was generalized to certain fields of characteristic zero and a Welch--Berlekamp like algorithm with complexity $O(n^3)$ was given. We propose a new application of Gabidulin codes over infinite fields: low-rank matrix recovery. Also, an alternativ… ▽ More

    Submitted 21 April, 2016; v1 submitted 20 January, 2016; originally announced January 2016.

    Comments: 5 pages, accepted at IEEE International Symposium on Information Theory 2016

  21. arXiv:1511.08413  [pdf, ps, other

    cs.IT cs.CR

    Code-Based Cryptosystems Using Generalized Concatenated Codes

    Authors: Sven Puchinger, Sven Müelich, Karim Ishak, Martin Bossert

    Abstract: The security of public-key cryptosystems is mostly based on number theoretic problems like factorization and the discrete logarithm. There exists an algorithm which solves these problems in polynomial time using a quantum computer. Hence, these cryptosystems will be broken as soon as quantum computers emerge. Code-based cryptography is an alternative which resists quantum computers since its secur… ▽ More

    Submitted 26 November, 2015; originally announced November 2015.

    Comments: Submitted to Springer Proceedings in Mathematics & Statistics, special issue devoted to the conference Application of Computer Algebra (ACA) 2015

  22. arXiv:1501.07033  [pdf, ps, other

    cs.IT

    Error Correction for Differential Linear Network Coding in Slowly-Varying Networks

    Authors: Sven Puchinger, Michael Cyran, Robert F. H. Fischer, Martin Bossert, Johannes B. Huber

    Abstract: Differential linear network coding (DLNC) is a precoding scheme for information transmission over random linear networks. By using differential encoding and decoding, the conventional approach of lifting, required for inherent channel sounding, can be omitted and in turn higher transmission rates are supported. However, the scheme is sensitive to variations in the network topology. In this paper,… ▽ More

    Submitted 28 January, 2015; originally announced January 2015.

    Comments: 6 pages, accepted at 10th International ITG Conference on Systems, Communications and Coding, Hamburg, Germany, February 2015

  23. arXiv:1501.06698  [pdf, ps, other

    cs.IT

    On Error Correction for Physical Unclonable Functions

    Authors: Sven Puchinger, Sven Müelich, Martin Bossert, Matthias Hiller, Georg Sigl

    Abstract: Physical Unclonable Functions evaluate manufacturing variations to generate secure cryptographic keys for embedded systems without secure key storage. It is explained how methods from coding theory are applied in order to ensure reliable key reproduction. We show how better results can be obtained using code classes and decoding principles not used for this scenario before. These methods are exemp… ▽ More

    Submitted 27 January, 2015; originally announced January 2015.

    Comments: 6 pages, accepted at 10th International ITG Conference on Systems, Communications and Coding, Hamburg, Germany, February 2015

  24. arXiv:1407.8034  [pdf, ps, other

    cs.IT

    Error Correction for Physical Unclonable Functions Using Generalized Concatenated Codes

    Authors: Sven Müelich, Sven Puchinger, Martin Bossert, Matthias Hiller, Georg Sigl

    Abstract: Physical Unclonable Functions can be used for secure key generation in cryptographic applications. It is explained how methods from coding theory must be applied in order to ensure reliable key regeneration. Based on previous work, we show ways how to obtain better results with respect to error probability and codeword length. Also, an example based on Generalized Concatenated codes is given, whic… ▽ More

    Submitted 30 July, 2014; originally announced July 2014.

    Comments: Accepted for: Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory ACCT2014, Svetlogorsk (Kaliningrad region), Russia

  25. arXiv:1406.0688  [pdf, other

    cs.IT

    Reduced List-Decoding of Reed--Solomon Codes Using Reliability Information

    Authors: Mostafa Hosni Mohamed, Johan S. R. Nielsen, Martin Bossert

    Abstract: We decode Reed-Solomon codes using soft information provided at the receiver. The Extended Euclidean Algorithm (EEA) is considered as an initial step to obtain an intermediate result. The final decoding result is obtained by interpolating the output of the EEA at the least reliable positions of the received word. We refer to this decoding method as reduced list-decoding, since not all received pos… ▽ More

    Submitted 3 June, 2014; originally announced June 2014.

  26. Coherence Optimization and Best Complex Antipodal Spherical Codes

    Authors: Henning Zörlein, Martin Bossert

    Abstract: Vector sets with optimal coherence according to the Welch bound cannot exist for all pairs of dimension and cardinality. If such an optimal vector set exists, it is an equiangular tight frame and represents the solution to a Grassmannian line packing problem. Best Complex Antipodal Spherical Codes (BCASCs) are the best vector sets with respect to the coherence. By extending methods used to find be… ▽ More

    Submitted 18 December, 2015; v1 submitted 23 April, 2014; originally announced April 2014.

    Journal ref: IEEE Transactions on Signal Processing, vol. 63, no. 24, pp. 6606 - 6615, Dec. 2015

  27. arXiv:1307.3901  [pdf, ps, other

    cs.IT

    Dictionary Adaptation in Sparse Recovery Based on Different Types of Coherence

    Authors: Henning Zörlein, Faisal Akram, Martin Bossert

    Abstract: In sparse recovery, the unique sparsest solution to an under-determined system of linear equations is of main interest. This scheme is commonly proposed to be applied to signal acquisition. In most cases, the signals are not sparse themselves, and therefore, they need to be sparsely represented with the help of a so-called dictionary being specific to the corresponding signal family. The dictionar… ▽ More

    Submitted 15 July, 2013; originally announced July 2013.

    Comments: Contribution to the 2nd International Workshop on Compressed Sensing applied to Radar (CoSeRa) 2013

  28. arXiv:1302.3723  [pdf, ps, other

    cs.IT

    Computing preimages of Boolean Networks

    Authors: Johannes Georg Klotz, Martin Bossert, Steffen Schober

    Abstract: In this paper we present an algorithm to address the predecessor problem of feed-forward Boolean networks. We propose an probabilistic algorithm, which solves this problem in linear time with respect to the number of nodes in the network. Finally, we evaluate our algorithm for random Boolean networks and the regulatory network of Escherichia coli.

    Submitted 15 February, 2013; originally announced February 2013.

    Comments: Submitted to WCSB 2013

  29. arXiv:1207.7193  [pdf, other

    cs.IT nlin.AO q-bio.MN

    Canalizing Boolean Functions Maximize the Mutual Information

    Authors: Johannes Georg Klotz, David Kracht, Martin Bossert, Steffen Schober

    Abstract: The ability of information processing in biologically motivated Boolean networks is of interest in recent information theoretic research. One measure to quantify this ability is the well known mutual information. Using Fourier analysis we show that canalizing functions maximize the mutual information between an input variable and the outcome of the function. We proof our result for Boolean functio… ▽ More

    Submitted 5 November, 2012; v1 submitted 31 July, 2012; originally announced July 2012.

    Comments: Accepted at SCC 2013, Munich, Germany, www.scc2013.net

  30. arXiv:1202.1692  [pdf, other

    cs.IT

    Efficient Decoding of Partial Unit Memory Codes of Arbitrary Rate

    Authors: Antonia Wachter-Zeh, Markus Stinner, Martin Bossert

    Abstract: Partial Unit Memory (PUM) codes are a special class of convolutional codes, which are often constructed by means of block codes. Decoding of PUM codes may take advantage of existing decoders for the block code. The Dettmar--Sorger algorithm is an efficient decoding algorithm for PUM codes, but allows only low code rates. The same restriction holds for several known PUM code constructions. In this… ▽ More

    Submitted 8 February, 2012; originally announced February 2012.

    Comments: 5 pages, submitted to ISIT 2012

  31. arXiv:1202.1081  [pdf, ps, other

    cs.IT

    Some Comments on the Strong Simplex Conjecture

    Authors: Dejan E. Lazich, Christian Senger, Martin Bossert

    Abstract: In the disproof of the Strong Simplex Conjecture presented in [Steiner, 1994], a counterexample signal set was found that has higher average probability of correct optimal decoding than the corresponding regular simplex signal set, when compared at small values of the signal-to-noise ratio. The latter was defined as the quotient of average signal energy and average noise power. In this paper, it i… ▽ More

    Submitted 6 February, 2012; originally announced February 2012.

    Comments: Submitted to the 2012 IEEE International Symposium on Information Theory, Cambridge, MA, USA, July 1 - 6, 2012. 5 pages, 6 figures

  32. arXiv:1109.0807  [pdf, other

    cs.IT cond-mat.dis-nn q-bio.MN

    Harmonic Analysis of Boolean Networks: Determinative Power and Perturbations

    Authors: Reinhard Heckel, Steffen Schober, Martin Bossert

    Abstract: Consider a large Boolean network with a feed forward structure. Given a probability distribution on the inputs, can one find, possibly small, collections of input nodes that determine the states of most other nodes in the network? To answer this question, a notion that quantifies the determinative power of an input over the states of the nodes in the network is needed. We argue that the mutual inf… ▽ More

    Submitted 21 May, 2013; v1 submitted 5 September, 2011; originally announced September 2011.

    Journal ref: EURASIP Journal on Bioinformatics and Systems Biology 2013, 2013:6

  33. Optimal Threshold-Based Multi-Trial Error/Erasure Decoding with the Guruswami-Sudan Algorithm

    Authors: Christian Senger, Vladimir R. Sidorenko, Martin Bossert, Victor V. Zyablov

    Abstract: Traditionally, multi-trial error/erasure decoding of Reed-Solomon (RS) codes is based on Bounded Minimum Distance (BMD) decoders with an erasure option. Such decoders have error/erasure tradeoff factor L=2, which means that an error is twice as expensive as an erasure in terms of the code's minimum distance. The Guruswami-Sudan (GS) list decoder can be considered as state of the art in algebraic d… ▽ More

    Submitted 18 April, 2011; originally announced April 2011.

    Comments: Accepted for the 2011 IEEE International Symposium on Information Theory, St. Petersburg, Russia, July 31 - August 05, 2011. 5 pages, 2 figures

  34. arXiv:1104.0576  [pdf, ps, other

    cs.IT

    Adaptive Single-Trial Error/Erasure Decoding of Reed-Solomon Codes

    Authors: Christian Senger, Vladimir R. Sidorenko, Steffen Schober, Martin Bossert, Victor V. Zyablov

    Abstract: Algebraic decoding algorithms are commonly applied for the decoding of Reed-Solomon codes. Their main advantages are low computational complexity and predictable decoding capabilities. Many algorithms can be extended for correction of both errors and erasures. This enables the decoder to exploit binary quantized reliability information obtained from the transmission channel: Received symbols with… ▽ More

    Submitted 4 April, 2011; originally announced April 2011.

    Comments: Accepted for the 2011 Canadian Workshop on Information Theory, Kelowna, BC, Canada, May 17 - 20, 2011. 5 pages, 4 figures

  35. arXiv:1102.2700  [pdf, ps, other

    cs.IT

    On (Partial) Unit Memory Codes Based on Gabidulin Codes

    Authors: Antonia Wachter, Vladimir Sidorenko, Martin Bossert, Victor Zyablov

    Abstract: (Partial) Unit Memory ((P)UM) codes provide a powerful possibility to construct convolutional codes based on block codes in order to achieve a high decoding performance. In this contribution, a construction based on Gabidulin codes is considered. This construction requires a modified rank metric, the so-called sum rank metric. For the sum rank metric, the free rank distance, the extended row rank… ▽ More

    Submitted 15 February, 2011; v1 submitted 14 February, 2011; originally announced February 2011.

  36. The Euclidean Algorithm for Generalized Minimum Distance Decoding of Reed-Solomon Codes

    Authors: Sabine Kampf, Martin Bossert

    Abstract: This paper presents a method to merge Generalized Minimum Distance decoding of Reed-Solomon codes with the extended Euclidean algorithm. By merge, we mean that the steps taken to perform the Generalized Minimum Distance decoding are similar to those performed by the extended Euclidean algorithm. The resulting algorithm has a complexity of O(n^2).

    Submitted 14 June, 2010; originally announced June 2010.

  37. arXiv:1006.1743  [pdf, ps, other

    cs.IT

    A Basis for all Solutions of the Key Equation for Gabidulin Codes

    Authors: Antonia Wachter, Vladimir Sidorenko, Martin Bossert

    Abstract: We present and prove the correctness of an efficient algorithm that provides a basis for all solutions of a key equation in order to decode Gabidulin (G-) codes up to a given radius tau. This algorithm is based on a symbolic equivalent of the Euclidean Algorithm (EA) and can be applied for decoding of G-codes beyond half the minimum rank distance. If the key equation has a unique solution, our alg… ▽ More

    Submitted 9 June, 2010; originally announced June 2010.

    Comments: accepted for ISIT 2010, Austin, TX, USA

  38. A Fast Generalized Minimum Distance Decoder for Reed-Solomon Codes Based on the Extended Euclidean Algorithm

    Authors: Sabine Kampf, Martin Bossert

    Abstract: This paper presents a method to determine a set of basis polynomials from the extended Euclidean algorithm that allows Generalized Minimum Distance decoding of Reed-Solomon codes with a complexity of O(nd).

    Submitted 1 June, 2010; originally announced June 2010.

    Comments: ISIT Austin 2010

  39. arXiv:1004.3372  [pdf, ps, other

    cs.IT

    Adaptive Single-Trial Error/Erasure Decoding for Binary Codes

    Authors: Christian Senger, Vladimir R. Sidorenko, Steffen Schober, Martin Bossert, Victor V. Zyablov

    Abstract: We investigate adaptive single-trial error/erasure decoding of binary codes whose decoder is able to correct e errors and t erasures if le+t<=d-1. Thereby, d is the minimum Hamming distance of the code and 1<l<=2 is the tradeoff parameter between errors and erasures. The error/erasure decoder allows to exploit soft information by treating a set of most unreliable received symbols as erasures. The… ▽ More

    Submitted 30 April, 2010; v1 submitted 20 April, 2010; originally announced April 2010.

    Comments: Submitted to the 2010 International Symposium on Information Theory and its Applications, Taichung, Taiwan, October 17 - 20, 2010. 6 pages, 4 figures

  40. Optimal Thresholds for GMD Decoding with (L+1)/L-extended Bounded Distance Decoders

    Authors: Christian Senger, Vladimir R. Sidorenko, Martin Bossert, Victor V. Zyablov

    Abstract: We investigate threshold-based multi-trial decoding of concatenated codes with an inner Maximum-Likelihood decoder and an outer error/erasure (L+1)/L-extended Bounded Distance decoder, i.e. a decoder which corrects e errors and t erasures if e(L+1)/L + t <= d - 1, where d is the minimum distance of the outer code and L is a positive integer. This is a generalization of Forney's GMD decoding, whi… ▽ More

    Submitted 20 April, 2010; v1 submitted 7 January, 2010; originally announced January 2010.

    Comments: Accepted for the 2010 IEEE International Symposium on Information Theory, Austin, TX, USA, June 13 - 18, 2010. 5 pages, 2 figures

  41. Decoding Generalized Concatenated Codes Using Interleaved Reed-Solomon Codes

    Authors: Christian Senger, Vladimir Sidorenko, Martin Bossert, Victor Zyablov

    Abstract: Generalized Concatenated codes are a code construction consisting of a number of outer codes whose code symbols are protected by an inner code. As outer codes, we assume the most frequently used Reed-Solomon codes; as inner code, we assume some linear block code which can be decoded up to half its minimum distance. Decoding up to half the minimum distance of Generalized Concatenated codes is cla… ▽ More

    Submitted 5 May, 2008; originally announced May 2008.

    Comments: Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008. 5 pages, 2 figures

  42. arXiv:cs/0702130  [pdf, ps, other

    cs.IT

    Syndrome Decoding of Reed-Solomon Codes Beyond Half the Minimum Distance based on Shift-Register Synthesis

    Authors: Georg Schmidt, Vladimir R. Sidorenko, Martin Bossert

    Abstract: In this paper, a new approach for decoding low-rate Reed-Solomon codes beyond half the minimum distance is considered and analyzed. Unlike the Sudan algorithm published in 1997, this new approach is based on multi-sequence shift-register synthesis, which makes it easy to understand and simple to implement. The computational complexity of this shift-register based algorithm is of the same order a… ▽ More

    Submitted 22 February, 2007; originally announced February 2007.

    Comments: 14 pages, 5 figures

  43. arXiv:cs/0610074  [pdf, ps, other

    cs.IT

    Collaborative Decoding of Interleaved Reed-Solomon Codes and Concatenated Code Designs

    Authors: Georg Schmidt, Vladimir R. Sidorenko, Martin Bossert

    Abstract: Interleaved Reed-Solomon codes are applied in numerous data processing, data transmission, and data storage systems. They are generated by interleaving several codewords of ordinary Reed-Solomon codes. Usually, these codewords are decoded independently by classical algebraic decoding methods. However, by collaborative algebraic decoding approaches, such interleaved schemes allow the correction o… ▽ More

    Submitted 12 October, 2006; v1 submitted 12 October, 2006; originally announced October 2006.

    Comments: 20 pages, 7 figures