Zum Hauptinhalt springen

Showing 1–40 of 40 results for author: Oggier, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2111.11623  [pdf, other

    cs.SI cs.IT cs.LG

    A Modular Framework for Centrality and Clustering in Complex Networks

    Authors: Frederique Oggier, Silivanxay Phetsouvanh, Anwitaman Datta

    Abstract: The structure of many complex networks includes edge directionality and weights on top of their topology. Network analysis that can seamlessly consider combination of these properties are desirable. In this paper, we study two important such network analysis techniques, namely, centrality and clustering. An information-flow based model is adopted for clustering, which itself builds upon an informa… ▽ More

    Submitted 22 November, 2021; originally announced November 2021.

  2. arXiv:2008.13551  [pdf, other

    cs.IT cs.CR

    Coding Constructions for Efficient Oblivious Transfer from Noisy Channels

    Authors: Frédérique Oggier, Gilles Zémor

    Abstract: We consider oblivious transfer protocols performed over binary symmetric channels in a malicious setting where parties will actively cheat if they can. We provide constructions purely based on coding theory that achieve an explicit positive rate, the essential ingredient being the existence of linear codes whose Schur products are asymptotically good.

    Submitted 31 August, 2020; originally announced August 2020.

  3. arXiv:2004.01641  [pdf, ps, other

    cs.IT math.NT

    A Quadratic Form Approach to Construction A of Lattices over Cyclic Algebras

    Authors: Grégory Berhuy, Frédérique Oggier

    Abstract: We propose a construction of lattices from (skew-) polynomial codes, by endowing quotients of some ideals in both number fields and cyclic algebras with a suitable trace form. We give criteria for unimodularity. This yields integral and unimodular lattices with a multiplicative structure. Examples are provided.

    Submitted 3 April, 2020; originally announced April 2020.

  4. arXiv:1607.07163  [pdf, ps, other

    cs.IT

    Performance of Lattice Coset Codes on Universal Software Radio Peripherals

    Authors: Jinlong Lu, J. Harshan, Frédérique Oggier

    Abstract: We consider an experimental setup of three USRPs that implement a wiretap channel, two USRPs are the legitimate players Alice and Bob, while the third USRP is the eavesdropper, whose position we vary to evaluate information leakage. The experimented channels are close to slow fading channels, and coset coding of lattice constellations is used for transmission, allowing to introduce controlled rand… ▽ More

    Submitted 13 January, 2017; v1 submitted 25 July, 2016; originally announced July 2016.

    Comments: Revised version: title changed, some changes in the text, references added

  5. arXiv:1604.01583  [pdf, ps, other

    cs.IT math.NT

    Modular Lattices from a Variation of Construction A over Number Fields

    Authors: Xiaolu Hou, Frédérique Oggier

    Abstract: We consider a variation of Construction A of lattices from linear codes based on two classes of number fields, totally real and CM Galois number fields. We propose a generic construction with explicit generator and Gram matrices, then focus on modular and unimodular lattices, obtained in the particular cases of totally real, respectively, imaginary, quadratic fields. Our motivation comes from codi… ▽ More

    Submitted 6 April, 2016; originally announced April 2016.

  6. arXiv:1506.06079  [pdf, ps, other

    cs.IT math.RA

    On skew polynomial codes and lattices from quotients of cyclic division algebras

    Authors: Jérôme Ducoat, Frédérique Oggier

    Abstract: We propose a variation of Construction A of lattices from linear codes defined using the quotient $Λ/\mathfrak pΛ$ of some order $Λ$ inside a cyclic division $F$-algebra, for $\mathfrak p$ a prime ideal of a number field $F$. To obtain codes over this quotient, we first give an isomorphism between $Λ/\mathfrak pΛ$ and a ring of skew polynomials. We then discuss definitions and basic properties of… ▽ More

    Submitted 19 June, 2015; originally announced June 2015.

    Comments: 15 pages

  7. arXiv:1504.01359  [pdf, ps, other

    cs.IT

    On Group Violations of Inequalities in five Subgroups

    Authors: Nadya Markin, Eldho K. Thomas, Frederique Oggier

    Abstract: We consider ten linear rank inequalities, which always hold for ranks of vector subspaces, and look at them as group inequalities. We prove that groups of order pq, for p,q two distinct primes, always satisfy these ten group inequalities. We give partial results for groups of order $p^2q$, and find that the symmetric group $S_4$ is the smallest group that yield violations, for two among the ten gr… ▽ More

    Submitted 18 March, 2015; originally announced April 2015.

  8. arXiv:1503.05434  [pdf, other

    cs.IT cs.DC

    Compressed Differential Erasure Codes for Efficient Archival of Versioned Data

    Authors: J. Harshan, Anwitaman Datta, Frédérique Oggier

    Abstract: In this paper, we study the problem of storing an archive of versioned data in a reliable and efficient manner in distributed storage systems. We propose a new storage technique called differential erasure coding (DEC) where the differences (deltas) between subsequent versions are stored rather than the whole objects, akin to a typical delta encoding technique. However, unlike delta encoding techn… ▽ More

    Submitted 17 March, 2015; originally announced March 2015.

    Comments: 16 pages, 15 figures

  9. arXiv:1411.4762  [pdf, ps, other

    cs.IT cs.DC

    Sparsity Exploiting Erasure Coding for Resilient Storage and Efficient I/O Access in Delta based Versioning Systems

    Authors: J. Harshan, Frédérique Oggier, Anwitaman Datta

    Abstract: In this paper we study the problem of storing reliably an archive of versioned data. Specifically, we focus on systems where the differences (deltas) between subsequent versions rather than the whole objects are stored - a typical model for storing versioned data. For reliability, we propose erasure encoding techniques that exploit the sparsity of information in the deltas while storing them relia… ▽ More

    Submitted 18 November, 2014; originally announced November 2014.

    Comments: 10 pages, 8 figures

  10. arXiv:1407.3962  [pdf, ps, other

    cs.IT

    Rank weight hierarchy of some classes of cyclic codes

    Authors: Jérôme Ducoat, Frédérique Oggier

    Abstract: We study the rank weight hierarchy, thus in particular the rank metric, of cyclic codes over the finite field $\mathbb F_{q^m}$, $q$ a prime power, $m \geq 2$. We establish the rank weight hierarchy for $[n,n-1]$ cyclic codes and characterize $[n,k]$ cyclic codes of rank metric 1 when (1) $k=1$, (2) $n$ and $q$ are coprime, and (3) the characteristic $char(\mathbb F_q)$ divides $n$. Finally, for… ▽ More

    Submitted 15 July, 2014; originally announced July 2014.

  11. Construction A of Lattices over Number Fields and Block Fading Wiretap Coding

    Authors: Wittawat Kositwattanarerk, Soon Sheng Ong, Frédérique Oggier

    Abstract: We propose a lattice construction from totally real and CM fields, which naturally generalizes the Construction A of lattices from $p$-ary codes obtained from the cyclotomic field $\mathbb{Q}(ζ_p)$, $p$ a prime, which in turn contains the so-called Construction A of lattices from binary codes as a particular case. We focus on the maximal totally real subfield $\mathbb{Q}(ζ_{p^r}+ζ_{p}^{-r})$ of th… ▽ More

    Submitted 12 December, 2014; v1 submitted 10 April, 2014; originally announced April 2014.

    Comments: Submitted to IEEE Transactions on Information Theory

  12. arXiv:1308.6175  [pdf, ps, other

    cs.IT

    Connections Between Construction D and Related Constructions of Lattices

    Authors: Wittawat Kositwattanarerk, Frédérique Oggier

    Abstract: Most practical constructions of lattice codes with high coding gains are multilevel constructions where each level corresponds to an underlying code component. Construction D, Construction D$'$, and Forney's code formula are classical constructions that produce such lattices explicitly from a family of nested binary linear codes. In this paper, we investigate these three closely related constructi… ▽ More

    Submitted 2 January, 2014; v1 submitted 26 August, 2013; originally announced August 2013.

    Comments: Submitted to Designs, Codes and Cryptography

  13. Locally Repairable Codes with Multiple Repair Alternatives

    Authors: Lluis Pamies-Juarez, Henk D. L. Hollmann, Frédérique Oggier

    Abstract: Distributed storage systems need to store data redundantly in order to provide some fault-tolerance and guarantee system reliability. Different coding techniques have been proposed to provide the required redundancy more efficiently than traditional replication schemes. However, compared to replication, coding techniques are less efficient for repairing lost redundancy, as they require retrieval o… ▽ More

    Submitted 15 May, 2013; v1 submitted 22 February, 2013; originally announced February 2013.

    Comments: IEEE International Symposium on Information Theory (ISIT 2013)

  14. arXiv:1301.6328  [pdf, ps, other

    math.GR cs.IT

    Explicit Constructions of Quasi-Uniform Codes from Groups

    Authors: Eldho K. Thomas, Frederique Oggier

    Abstract: We address the question of constructing explicitly quasi-uniform codes from groups. We determine the size of the codebook, the alphabet and the minimum distance as a function of the corresponding group, both for abelian and some nonabelian groups. Potentials applications comprise the design of almost affine codes and non-linear network codes.

    Submitted 27 January, 2013; originally announced January 2013.

  15. arXiv:1212.1298  [pdf, ps, other

    math.GR cs.IT

    On Abelian Group Representability of Finite Groups

    Authors: Eldho K. Thomas, Nadya Markin, Frédérique Oggier

    Abstract: A set of quasi-uniform random variables $X_1,...,X_n$ may be generated from a finite group $G$ and $n$ of its subgroups, with the corresponding entropic vector depending on the subgroup structure of $G$. It is known that the set of entropic vectors obtained by considering arbitrary finite groups is much richer than the one provided just by abelian groups. In this paper, we start to investigate in… ▽ More

    Submitted 8 December, 2012; v1 submitted 6 December, 2012; originally announced December 2012.

    Comments: 14 pages

    MSC Class: 20D15; 94A17

  16. arXiv:1210.7044  [pdf, ps, other

    cs.IT

    Quotients of Orders in Cyclic Algebras and Space-Time Codes

    Authors: Frederique Oggier, B. A. Sethuraman

    Abstract: Let $F$ be a number field with ring of integers $\Oc_F$ and $\Dc$ a division $F$-algebra with a maximal cyclic subfield $K$. We study rings occurring as quotients of a natural $\Oc_F$-order $Λ$ in $\Dc$ by two-sided ideals. We reduce the problem to studying the ideal structure of $Λ/\qf^sΛ$, where $\qf$ is a prime ideal in $\Oc_F$, $s\geq 1$. We study the case where $\qf$ remains unramified in… ▽ More

    Submitted 25 October, 2012; originally announced October 2012.

    MSC Class: 11S45 (Primary) 11T71; 94B40 (Secondary)

  17. arXiv:1207.6744  [pdf, ps, other

    cs.DC

    RapidRAID: Pipelined Erasure Codes for Fast Data Archival in Distributed Storage Systems

    Authors: Lluis Pamies-Juarez, Anwitaman Datta, Frederique Oggier

    Abstract: To achieve reliability in distributed storage systems, data has usually been replicated across different nodes. However the increasing volume of data to be stored has motivated the introduction of erasure codes, a storage efficient alternative to replication, particularly suited for archival in data centers, where old datasets (rarely accessed) can be erasure encoded, while replicas are maintained… ▽ More

    Submitted 3 August, 2012; v1 submitted 29 July, 2012; originally announced July 2012.

  18. arXiv:1206.2187  [pdf, ps, other

    cs.DC

    An Empirical Study of the Repair Performance of Novel Coding Schemes for Networked Distributed Storage Systems

    Authors: Lluis Pamies-Juarez, Frédérique Oggier, Anwitaman Datta

    Abstract: Erasure coding techniques are getting integrated in networked distributed storage systems as a way to provide fault-tolerance at the cost of less storage overhead than traditional replication. Redundancy is maintained over time through repair mechanisms, which may entail large network resource overheads. In recent years, several novel codes tailor-made for distributed storage have been proposed to… ▽ More

    Submitted 11 June, 2012; originally announced June 2012.

  19. arXiv:1205.5134  [pdf, ps, other

    cs.IT math.RA

    Iterated Space-Time Code Constructions from Cyclic Algebras

    Authors: Nadya Markin, Frederique Oggier

    Abstract: We propose a full-rate iterated space-time code construction, to design 2n-dimensional codes from n-dimensional cyclic algebra based codes. We give a condition to determine whether the resulting codes satisfy the full-diversity property, and study their maximum likelihood decoding complexity with respect to sphere decoding. Particular emphasis is given to the cases n = 2, sometimes referred to as… ▽ More

    Submitted 11 March, 2013; v1 submitted 23 May, 2012; originally announced May 2012.

    Comments: 32 pages, 2 figures

    MSC Class: 16U99; 11T71

  20. arXiv:1201.3688  [pdf, ps, other

    math.NT cs.IT

    A Classification of Unimodular Lattice Wiretap Codes in Small Dimensions

    Authors: Fuchun Lin, Frédérique Oggier

    Abstract: Lattice coding over a Gaussian wiretap channel, where an eavesdropper listens to transmissions between a transmitter and a legitimate receiver, is considered. A new lattice invariant called the secrecy gain is used as a code design criterion for wiretap lattice codes since it was shown to characterize the confusion that a chosen lattice can cause at the eavesdropper: the higher the secrecy gain of… ▽ More

    Submitted 17 January, 2012; originally announced January 2012.

    Comments: 10 pages

  21. In-Network Redundancy Generation for Opportunistic Speedup of Backup

    Authors: Lluis Pamies-Juarez, Anwitaman Datta, Frédérique Oggier

    Abstract: Erasure coding is a storage-efficient alternative to replication for achieving reliable data backup in distributed storage systems. During the storage process, traditional erasure codes require a unique source node to create and upload all the redundant data to the different storage nodes. However, such a source node may have limited communication and computation capabilities, which constrain the… ▽ More

    Submitted 19 February, 2013; v1 submitted 18 November, 2011; originally announced November 2011.

    Journal ref: Future Generation Computer Systems (Volume 29, Issue 6, August 2013, Pages 1353-1362)

  22. arXiv:1109.6437  [pdf, ps, other

    cs.IT

    An Error Probability Approach to MIMO Wiretap Channels

    Authors: Jean-Claude Belfiore, Frédérique Oggier

    Abstract: We consider MIMO (Multiple Input Multiple Output) wiretap channels, where a legitimate transmitter Alice is communicating with a legitimate receiver Bob in the presence of an eavesdropper Eve, and communication is done via MIMO channels. We suppose that Alice's strategy is to use a codebook which has a lattice structure, which then allows her to perform coset encoding. We analyze Eve's probability… ▽ More

    Submitted 9 January, 2013; v1 submitted 29 September, 2011; originally announced September 2011.

    Comments: 27 pages, 4 figures

  23. arXiv:1109.2317  [pdf, other

    cs.DC cs.IT

    An Overview of Codes Tailor-made for Better Repairability in Networked Distributed Storage Systems

    Authors: Anwitaman Datta, Frederique Oggier

    Abstract: The continuously increasing amount of digital data generated by today's society asks for better storage solutions. This survey looks at a new generation of coding techniques designed specifically for the needs of distributed networked storage systems, trying to reach the best compromise among storage space efficiency, fault tolerance, and maintenance overheads. Four families of codes tailor-made f… ▽ More

    Submitted 29 January, 2013; v1 submitted 11 September, 2011; originally announced September 2011.

  24. arXiv:1107.3129  [pdf, ps, other

    cs.DC

    Homomorphic Self-repairing Codes for Agile Maintenance of Distributed Storage Systems

    Authors: Frederique Oggier, Anwitaman Datta

    Abstract: Distributed data storage systems are essential to deal with the need to store massive volumes of data. In order to make such a system fault-tolerant, some form of redundancy becomes crucial, incurring various overheads - most prominently in terms of storage space and maintenance bandwidth requirements. Erasure codes, originally designed for communication over lossy channels, provide a storage effi… ▽ More

    Submitted 15 July, 2011; originally announced July 2011.

    Comments: arXiv admin note: significant text overlap with arXiv:1008.0064

  25. arXiv:1106.2275  [pdf, ps, other

    cs.DC cs.CR

    Byzantine Fault Tolerance of Regenerating Codes

    Authors: Frédérique Oggier, Anwitaman Datta

    Abstract: Recent years have witnessed a slew of coding techniques custom designed for networked storage systems. Network coding inspired regenerating codes are the most prolifically studied among these new age storage centric codes. A lot of effort has been invested in understanding the fundamental achievable trade-offs of storage and bandwidth usage to maintain redundancy in presence of different models of… ▽ More

    Submitted 12 June, 2011; originally announced June 2011.

    Comments: In The 11th IEEE International Conference on Peer-to-Peer Computing (P2P 2011)

  26. arXiv:1105.0379  [pdf, ps, other

    cs.DC cs.IT

    Self-Repairing Codes for Distributed Storage - A Projective Geometric Construction

    Authors: Frederique Oggier, Anwitaman Datta

    Abstract: Self-Repairing Codes (SRC) are codes designed to suit the need of coding for distributed networked storage: they not only allow stored data to be recovered even in the presence of node failures, they also provide a repair mechanism where as little as two live nodes can be contacted to regenerate the data of a failed node. In this paper, we propose a new instance of self-repairing codes, based on c… ▽ More

    Submitted 2 May, 2011; originally announced May 2011.

    Comments: 5 pages, 2 figures

  27. Lattice Codes for the Wiretap Gaussian Channel: Construction and Analysis

    Authors: Frédérique Oggier, Patrick Solé, Jean-Claude Belfiore

    Abstract: We consider the Gaussian wiretap channel, where two legitimate players Alice and Bob communicate over an additive white Gaussian noise (AWGN) channel, while Eve is eavesdropping, also through an AWGN channel. We propose a coding strategy based on lattice coset encoding. We analyze Eve's probability of decoding, from which we define the secrecy gain as a design criterion for wiretap lattice codes,… ▽ More

    Submitted 9 January, 2013; v1 submitted 21 March, 2011; originally announced March 2011.

    Comments: 43 pages, 16 figures, submitted to IEEE Trans. on Inform. Theory

  28. arXiv:1102.3298  [pdf, other

    cs.IT math.RA

    A family of fast-decodable MIDO codes from crossed-product algebras over Q

    Authors: Laura Luzzi, Frédérique Oggier

    Abstract: Multiple Input Double Output (MIDO) asymmetric space-time codes for 4 transmit antennas and 2 receive antennas can be employed in the downlink from base stations to portable devices. Previous MIDO code constructions with low Maximum Likelihood (ML) decoding complexity, full diversity and the non-vanishing determinant (NVD) property are mostly based on cyclic division algebras. In this paper, a new… ▽ More

    Submitted 16 February, 2011; originally announced February 2011.

    Comments: 5 pages, 1 figure, conference

  29. arXiv:1012.5895  [pdf, ps, other

    cs.CR

    Homophonic Coding Design for Communication Systems Employing the Encoding-Encryption Paradigm

    Authors: Miodrag J. Mihaljevic, Frederique Oggier, Hideki Imai

    Abstract: This paper addresses the design of a dedicated homophonic coding for a class of communication systems which, in order to provide both reliability and security, first encode the data before encrypting it, which is referred to as the encoding-encryption paradigm. The considered systems employ error-correction coding for reliability, a stream cipher for encryption, and homophonic coding to enhance th… ▽ More

    Submitted 29 December, 2010; originally announced December 2010.

    Comments: 16 pages, 1 figure

  30. arXiv:1012.4161  [pdf, ps, other

    cs.IT

    Lattice Code Design for the Rayleigh Fading Wiretap Channel

    Authors: Jean-Claude Belfiore, Frederique Oggier

    Abstract: It has been shown recently that coding for the Gaussian Wiretap Channel can be done with nested lattices. A fine lattice intended to the legitimate user must be designed as a usual lattice code for the Gaussian Channel, while a coarse lattice is added to introduce confusion at the eavesdropper, whose theta series must be minimized. We present a design criterion for both the fine and coarse lattice… ▽ More

    Submitted 19 December, 2010; originally announced December 2010.

  31. Fast-Decodable Asymmetric Space-Time Codes from Division Algebras

    Authors: Roope Vehkalahti, Camilla Hollanti, Frédérique Oggier

    Abstract: Multiple-input double-output (MIDO) codes are important in the near-future wireless communications, where the portable end-user device is physically small and will typically contain at most two receive antennas. Especially tempting is the 4 x 2 channel due to its immediate applicability in the digital video broadcasting (DVB). Such channels optimally employ rate-two space-time (ST) codes consistin… ▽ More

    Submitted 27 October, 2010; originally announced October 2010.

    Comments: 26 pages, 1 figure, submitted to IEEE Trans. Inf. Theory, October 2010

  32. arXiv:1008.1387  [pdf, ps, other

    cs.IT

    Codes over Matrix Rings for Space-Time Coded Modulations

    Authors: Frederique Oggier, Patrick Sole, Jean-Claude Belfiore

    Abstract: It is known that, for transmission over quasi-static MIMO fading channels with n transmit antennas, diversity can be obtained by using an inner fully diverse space-time block code while coding gain, derived from the determinant criterion, comes from an appropriate outer code. When the inner code has a cyclic algebra structure over a number field, as for perfect space-time codes, an outer code can… ▽ More

    Submitted 8 August, 2010; originally announced August 2010.

  33. arXiv:1008.0968  [pdf, ps, other

    cs.CR

    An Information-Theoretic Analysis of the Security of Communication Systems Employing the Encoding-Encryption Paradigm

    Authors: Frederique Oggier, Miodrag J. Mihaljevic

    Abstract: This paper proposes a generic approach for providing enhanced security to communication systems which encode their data for reliability before encrypting it through a stream cipher for security. We call this counter-intuitive technique the {\em encoding-encryption} paradigm, and use as motivating example the standard for mobile telephony GSM. The enhanced security is based on a dedicated homophoni… ▽ More

    Submitted 5 August, 2010; originally announced August 2010.

  34. arXiv:1008.0064  [pdf, ps, other

    cs.DC

    Self-repairing Homomorphic Codes for Distributed Storage Systems

    Authors: Frederique Oggier, Anwitaman Datta

    Abstract: Erasure codes provide a storage efficient alternative to replication based redundancy in (networked) storage systems. They however entail high communication overhead for maintenance, when some of the encoded fragments are lost and need to be replenished. Such overheads arise from the fundamental need to recreate (or keep separately) first a copy of the whole object before any individual encoded fr… ▽ More

    Submitted 31 July, 2010; originally announced August 2010.

    Journal ref: Infocom 2011, The 30th IEEE International Conference on Computer Communications

  35. arXiv:1004.4075  [pdf, ps, other

    cs.IT cs.CR

    Secrecy Gain: a Wiretap Lattice Code Design

    Authors: Jean-Claude Belfiore, Frédérique Oggier

    Abstract: We propose the notion of secrecy gain as a code design criterion for wiretap lattice codes to be used over an additive white Gaussian noise channel. Our analysis relies on the error probabilites of both the legitimate user and the eavesdropper. We focus on geometrical properties of lattices, described by their theta series, to characterize good wiretap codes.

    Submitted 8 July, 2010; v1 submitted 23 April, 2010; originally announced April 2010.

    Comments: 5 pages, 2 figures, proceedings of ISITA 2010

  36. arXiv:0909.3146  [pdf, ps, other

    cs.IT cs.CR

    An Authentication Code against Pollution Attacks in Network Coding

    Authors: Frederique Oggier, Hanane Fathi

    Abstract: Systems exploiting network coding to increase their throughput suffer greatly from pollution attacks which consist of injecting malicious packets in the network. The pollution attacks are amplified by the network coding process, resulting in a greater damage than under traditional routing. In this paper, we address this issue by designing an unconditionally secure authentication code suitable fo… ▽ More

    Submitted 17 September, 2009; originally announced September 2009.

  37. arXiv:0907.2759  [pdf, ps, other

    cs.MA cs.RO

    On Cyclic and Nearly Cyclic Multiagent Interactions in the Plane

    Authors: Frederique Oggier, Alfred Bruckstein

    Abstract: We discuss certain types of cyclic and nearly cyclic interactions among N "point"-agents in the plane, leading to formations of interesting limiting geometric configurations. Cyclic pursuit and local averaging interactions have been analyzed in the context of multi-agent gathering. In this paper, we consider some nearly cyclic interactions that break symmetry leading to factor circulants rather… ▽ More

    Submitted 16 July, 2009; originally announced July 2009.

  38. arXiv:0710.1920  [pdf, ps, other

    cs.IT cs.CR

    The Secrecy Capacity of the MIMO Wiretap Channel

    Authors: Frédérique Oggier, Babak Hassibi

    Abstract: We consider the MIMO wiretap channel, that is a MIMO broadcast channel where the transmitter sends some confidential information to one user which is a legitimate receiver, while the other user is an eavesdropper. Perfect secrecy is achieved when the the transmitter and the legitimate receiver can communicate at some positive rate, while insuring that the eavesdropper gets zero bits of informati… ▽ More

    Submitted 9 October, 2007; originally announced October 2007.

  39. arXiv:cs/0604093  [pdf, ps, other

    cs.IT

    Perfect Space Time Block Codes

    Authors: F. Oggier, G. Rekaya-Ben Othman, J. -C. Belfiore, E. Viterbo

    Abstract: In this paper, we introduce the notion of perfect space-time block codes (STBC). These codes have full rate, full diversity, non-vanishing constant minimum determinant for increasing spectral efficiency, uniform average transmitted energy per antenna and good shaping. We present algebraic constructions of perfect STBCs for 2, 3, 4 and 6 antennas.

    Submitted 24 April, 2006; originally announced April 2006.

    Comments: 39 pages, 7 figures, submitted to IEEE Trans. on Inform. Theory Sep. 2004, revised version

    ACM Class: H.1.1

  40. Families of unitary matrices achieving full diversity

    Authors: Frederique Oggier, Emmanuel Lequeu

    Abstract: This paper presents an algebraic construction of families of unitary matrices that achieve full diversity. They are obtained as subsets of cyclic division algebras.

    Submitted 17 August, 2005; originally announced August 2005.

    Comments: To appear in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005