Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring
|
|
- Mitchell Hines
- 5 years ago
- Views:
Transcription
1 Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring Antonio Aparecido de Andrade Department of Mathematics, IBILCE, UNESP, , São José do Rio Preto, SP, Brazil Tariq Shah and Atlas Khan Department of Mathematics, Quaid-i- Azam University Islamabad, Pakistan and Abstract: In this paper we present a decoding principle for BCH, Alternant and Goppa codes constructed through a semigroup ring, which is based on modified Berlekamp-Massey algorithm This algorithm corrects all errors up to the Hamming weight t r, ie, whose minimum Hamming distance is 2r + 1 Key-word: Semigroup rings, BCH codes, Alternant codes, Goppa codes, modified Berlekamp- Massey algorithm 1 Introduction In this work we address the problem of decoding BCH, alternant and Goppa codes constructed through a semigroup ring, as defined by Shah et all [9], by using the modified Berlekamp- Massey algorithm [6] The decoding procedure for these codes consists of four major steps: (1) calculation of the syndromes, (2) calculation of the error-locator polynomial, (3) calculation of the error-location numbers, and (4) calculation of the error magnitudes This paper is organized as follows In section 2, we present basic facts of semigroups and semigroup rings In the section 3, we review the constructions of BCH and alternant codes through semigroup rings and the construction of Goppa codes through semigroup rings instead of polynomial rings and quoted results already established in [9] In section 4, we present an efficient decoding procedure for BCH, alternant and Goppa codes which makes use of the modified Berlekamp-Massey algorithm 2 Basic Results In this section, we review the key properties of commutative semigroup and semigroup ring [5] Let (S, ) be a commutative semigroup and (B, +, ) is a commutative associative ring Let J be the set of all finitely nonzero functions f from S into B Suppose J is a ring with respect to binary operations addition and multiplication defined as; (f + g)(s) = f(s) + g(s) and (fg)(s) = f(t)g(u), where the symbol indicates that the sum is taken over all t u=s pairs (t, u) of elements of S such that t u = s and it is understood that in the situation where s is not expressible in the form t u for any t, u S, then (fg)(s) = 0 J is known as semigroup ring of S over B If S is a monoid, then J is called monoid ring This ring J is represented as B[S] whenever S is a multiplicative semigroup and elements of J are written t u=s 8
2 either as f(s)s or as s S n f(s i )s i The representation of J will be B[X; S] whenever S is an additive semigroup As there is an isomorphism between additive semigroup S and multiplicative semigroup {X s : s S}, so a nonzero element f of B[X; S] is uniquely represented in the canonical form n f(s i )X s i = n f i X s i, where f i 0 and s i s j for i j The concepts of degree and order are not generally defined in semigroup rings but if we consider S to be a totally ordered semigroup, we can define the degree and order of an element of semigroup ring B[X; S] in the following manner; if f = n f i X s i is the canonical form of the nonzero element f R[X; S], where s 1 < s 2 < < s n, then s n is called the degree of f and we write deg(f) = s n and similarly the order of f is written as ord(f) = s 1 Now, if R is an integral domain, then for f, g B[X; S], the deg(fg) =deg(f)+deg(g) and ord(fg) =ord(f)+ord(g) The polynomial ring B[X] = B[X; Z 0 ] is the particular case of semigroup ring Obviously B[X; Z 0 ] B[X; 1 2 Z 0] Furthermore it is noticed that in B[X; 1 2 Z 0] we can define the degree of a pseudo polynomial as the monoid 1 2 Z 0 is totally ordered Goppa codes are the famous subclass of Alternant codes and they can be expressed in terms of polynomials called Goppa Polynomials [4] In [9] we have introduced the construction technique of BCH, Alternant and Goppa codes through a semigroup ring B[X; 1 2 Z 0] instead of a polynomial ring and by this new way we adopted the same lines as in [2] and improved the several results of [2] That is, we considered B as a finite commutative ring with unity and in the same spirit of [2], we fixed a cyclic subgroup of group of units of the factor ring B[X; 1 2 Z 0]/(X n 1) The factorization of X 2s 1 over the group of units of B[X; 1 2 Z 0]/(X n 1) was the main problem as for B[X]/(X n 1), the X s 1 has in [2] 3 BCH, Alternant and Goppa Codes In this section we review the constructs of BCH, alternant and Goppa codes through a semigroup ring instead of a polynomial ring First we discuss the basic properties of Galois extension rings, which is used in the construction of these codes In this section we assume that (B, N) denotes a finite local commutative ring with unity and residue field K = B N = GF (p m ), where p is a prime, m a positive integer The natural projection π : B[X; 1 2 Z 0] K[X; 1 2 Z 0] is defined by π(a(x 1 2 )) = a(x 1 2 ), ie, π( n i=0 a i X 1 2 i ) = n i=0 a i X 1 2 i, where a i = a i + N) Let f(x 1 2 ) be a monic pseudo polynomial of degree t in B[X; 1 2 Z 0] such that π(f(x 1 2 )) is irreducible in K[X; 1 2 Z 0] Since [5, Theorem 72] accommodate B[X; 1 2 Z 0] as B[Z 0 ], therefore f(x 1 2 ) also is irreducible in B[X; 1 2 Z 0], by [7, Theorem XIII7] Take R = B[X; 1 2 Z 0] (f(x 1 2 )) Then R is a finite commutative local factor semigroup ring with unity and again [5, Theorem 72] accommodate our notions to say that it is a Galois ring extension of B with extension degree t Its residue field is K 1 = R = GF (p mt ), where N N 1 is the maximal ideal of R, and K 1 1 is the multiplicative group of K 1 whose order is p mt 1 Let F denotes the multiplicative group of units of R It follows that F is an abelian group, and therefore it can be expressed as a direct product of cyclic groups We are interested in the maximal cyclic group of F, hereafter denoted by G 2s, whose elements are the roots of X 2s 1 for some positive integer s There is only one maximal cyclic subgroup of F having order 2s = 2 ( p mt 1 ) Definition 31 [9] A shortened BCH code C(2n, η) of length 2n 2s is a code over B that has 9
3 parity check matrix α 1 α 2 α 2n α1 2 α2 2 α2n 2 α1 2r α2 2r α2n 2r for some r = 2(n k) 1, where η = (α 1, α 2,, α 2n ) = (α k 1, n ) is the locator vector, consisting of distinct elements of G 2s The code C(2n, η), with 2n = 2s, will be called a BCH code Theorem 31 [9] The minimum Hamming distance of a BCH code C(2n, η) satisfies d 2r+1 Example 31 Let B = GF (2)[i] and R = B[X; ( 1Z 2 ) 0], where f(x 1 2 ) = f(x 1 2 ) (1) ( ) X 1 6 ( ) 2 + X is irreducible over B Let X 1 2 = Y, we have f(y ) = Y 6 + Y If α 1 2 is a root of f(y ), then α 1 2 generates a cyclic group G 2s of order 2s = 2 ( ) = 14 Let η = (1, α, α 3 2, α 2, α 5 2, α 3, α 7 2, α 4, α 9 2, α 5, α 11 2, α 6 ) (2) be the locator vector of distinct elements of G 2s If r = 2, then the following matrix 1 α α 3 2 α 2 α 5 2 α 3 α 7 2 α 4 α 9 2 α 5 α 11 2 α 6 1 α 2 α 3 α 4 α 5 α 6 1 α α 2 α 3 α 4 α 5 1 α 3 α 9 2 α 6 α 1 2 α 2 α 7 2 α 5 α 13 2 α α 5 2 α 4 1 α 4 α 6 α α 3 α 5 1 α 2 α 4 α 6 α α 3 is the parity-check matrix of a BCH code C(12, η) of length 12 and, by Theorem 31, the minimum Hamming distance is at least 5 Definition 32 A shortened alternant code C(2n, η, ω) of length 2n 2s is a code over B that has parity check matrix ω 1 ω 2 ω 2n ω 1 α 1 ω 2 α 2 ω 2n α 2n ω 1 α1 2 ω 2 α2 2 ω 2n α2n 2 (4) ω 1 α1 2r 1 ω 2 α2 2r 1 ω 2n α2n 2r 1 where r is a positive integer, η = (α 1, α 2,, α 2n ) = (α k 1, n ) is the locator vector, consisting of distinct elements of G 2s, and ω = (ω 1, ω 2,, ω 2n ) is an arbitrary vector consisting of elements of G 2s Theorem 32 [9] The alternant code C(2n, η, ω) has minimum Hamming distance d 2r + 1 Example 32 Let B = GF (2)[i] and R = B[X; 1 2 Z 0] (3) (f(x 1 2 )), where f(x 1 2 ) = (X 1 2 ) 6 + (X 1 2 ) is irreducible over B Let X 1 2 = Y, we have f(y ) = Y 6 + Y If α 1 2 is a root of f(y ), then α 1 2 generates a cyclic group G 2s of order 2s = 2 ( ) = 14 Let η = (α 13 2, α 6, 1, α 11 2, α 5, α 9 2, α 4, α 7 2, α 3, α 5 2 ) (5) be the locator vector and ω = (α 5, α 9 2, 1, α 4, α 7 2, α 3, α 5 2, α 2, α 3 2, α) If r = 2 then the following matrix α 5 α α 4 α 7 2 α 3 α 5 2 α 2 α 3 2 α α 1 1 α 5 2 α 3 2 α 1 2 α 5 2 α 2 α 1 α 4 α α α 3 α 5 1 α 2 α 1 2 α 6 (6) 1 α α 3 α α 5 2 α 1 2 α 2 1 α
4 is the parity-check matrix of an alternant code C(10, η, ω) of length 10 and, by Theorem 32, the minimum Hamming distance at least 5 Goppa codes are described in terms of polynomials, known as Goppa polynomials In contrast to cyclic codes, where it is difficult to estimate the minimum Hamming distance d from the generator polynomial Goppa codes have the property that d deg(h(x)) + 1, where h(x) is a Goppa polynomial Let α 1 2 be a primitive element of the cyclic group G 2s, where 2s = 2 ( p mt 1 ) Let h(x) = h 0 + h 1 X + h 2 X h 2r X 2r be a polynomial with coefficients in R and h 2r 0 Let T = {α 1, α 2,, α 2n } be a subset of distinct elements of G 2s such that h(α i ) are units from R for i = 1, 2,, 2n Definition 33 [9] A shortened Goppa code C(T, h) of length 2n 2s is a code over B that has parity-check matrix of the form h(α 1 ) 1 h(α 2n ) 1 α 1 h(α 1 ) 1 α 2n h(α 2n ), (7) α1 2r 1 h(α 1 ) 1 α2n 2r 1 h(α 2n) where r is a positive integer, η = (α 1, α 2,, α 2n ) = (α k 1, n ) is the locator vector, consisting of distinct elements of G 2s and ω = ( h(α 1 ) 1,, h(α 2n ) 1) is a vector consisting of elements of G 2s Theorem 33 [9] The Goppa code C(T, h) has minimum Hamming distance d 2r + 1 Example 33 Let B = GF (2)[i] and R = B[X; 1 2 Z 0] (f(x 1 2 )) where f(x 1 2 ) = (X 1 2 ) 6 + (X 1 2 ) is irreducible over B Let X 1 2 = Y, we have f(y ) = Y 6 + Y If α 1 2 is a root of f(y ), then α 1 2 generates a cyclic group G 2s of order 2s = 2 ( ) { = 14 Let h(x) = X 4 + X 3 + 1, T = α, α 5, α 2, 1, α 3, α 7 2, α 4, α 6} and ω = { α 5, α 3, α 3, 1, α 6, 1, α 6, α 5} If r = 2 then the following matrix α 5 α 3 α 3 1 α 6 1 α 6 α 5 α 6 α α 5 1 α 2 α 7 2 α 4 α 4 1 α α α 3 (8) α α 4 α 2 1 α 1 α 4 α 2 is the parity check matrix of a Goppa code over B of length 8 and, by Theorem 33, the minimum Hamming distance at least 5 4 Decoding Procedure In this section we present a decoding algorithm for BCH, alternant and Goppa codes This algorithm is based on the modified Berlekamp-Massey algorithm [6] which corrects all errors up to the Hamming weight t r, ie, whose minimum Hamming distance is 2r +1 The complexity of the proposed decoding algorithm is essentially the same as that these codes are defined over finite fields Let B, R and G 2s as defined in previous section Let α 1 2 be a primitive element of the cyclic group G 2s, where s = 2(p mt 1) Let c = (c 1, c 2,, c 2n ) be a transmitted codeword and b = (b 1, b 2,, b 2n ) be the received vector Thus the error vector is given by e = (e 1, e 2,, e 2n ) = b c Let η = (α 1, α 2,, α 2n ) = (α k 1, n ) be a vector over G 2s Suppose that ν t is the number of errors which occurred at locations x 1 = α i1, x 2 = α i2,, x ν = α iν with values y 1 = e i1, y 2 = e i2,, y ν = e iν 11
5 1 BCH code C(2n, η) The syndrome values s l of an error vector e = (e 1, e 2,, e 2n ) is defined as 2n e j α l j, l 1 Since s = (s 1, s 2,, s 2r ) = bh t = eh t, then the first 2r syndrome values s l can be calculated from the received vector b as 2n e j α l j = 2n b j α l j, l = 1, 2,, 2r 2 Alternant code C(η, ω) The syndrome values s l of an error vector e = (e 1, e 2,, e 2n ) is defined as 2n e j w j α l j, l 0 Since s = (s 0, s 1,, s 2r 1 ) = bh t = eh t, then the first 2r syndrome values s l can be calculated from the received vector b as 2n e j w j α l j = 2n b j w j α l j, l = 0, 1, 2,, 2r 1 3 Goppa code C(T, h) The syndrome values s l of an error vector e = (e 1, e 2,, e 2n ) is defined as 2n e j h(α j ) 1 α l j, l 0 Since s = (s 0, s 1,, s 2r 1 ) = bh t = eh t, then the first 2r syndrome values s l can be calculated from the received vector b as 2n e j h(α j ) 1 α l j = 2n b j h(α j ) 1 α l j, l = 0, 1, 2,, 2r 1 The elementary symmetric functions σ 1, σ 2,, σ ν of the error-location numbers x 1, x 2,, x ν are defined as the coefficients of the polynomial ν ν σ(x) = (x x i ) = σ i x ν i, i=0 where σ 0 = 1 Thus, the decoding algorithm being proposed consists of four major steps: Step 1 - Calculation of the syndrome vector s from the received vector Step 2 - Calculation of the elementary symmetric functions σ 1, σ 2,, σ ν from s, using the modified Berlekamp-Massey algorithm [6] Step 3 - Calculation of the error-location numbers x 1, x 2,, x ν from σ 1, σ 2,, σ ν, that are roots of σ(x) Step 4 - Calculation of the error magnitudes y 1, y 2,, y ν from x i and s, using Forney s procedure [3] 12
6 Now, each step of the decoding algorithm is analyzed There is no need to comment on Step 1 since the calculation of the vector syndrome is straightforward The set of possible errorlocation numbers is a subset of {α 0, α 1,, α 2s 1 } In Step 2, the calculation of the elementary symmetric functions is equivalent to finding a solution σ 1, σ 2,, σ ν, with minimum possible ν, to the following set of linear recurrent equations over R s j+ν + s j+ν 1 σ s j+1 σ ν 1 + s j σ ν = 0, j = 0, 1, 2,, (2r 1) ν, (9) where s 0, s 1,, s 2r 1 are the components of the syndrome vector We make use of the modified Berlekamp-Massey algorithm to find the solutions of Equation (9) The algorithm is iterative, in the sense that the following n equations (called power sums) s n σ (n) 0 + s n 1 σ (n) s n ln σ (n) = 0 s n 1 σ (n) 0 + s n 2 σ (n) s n ln 1σ (n) = 0 s ln+1σ (n) 0 + s ln σ (n) s 1 σ (n) = 0 are satisfied with as small as possible and σ (0) 0 = 1 The polynomial σ (n) (x) = σ (n) 0 + σ (n) 1 x + + σ(n) x n represents the solution at the n-th stage The n-th discrepancy is denoted by d n and defined by d n = s n σ (n) 0 + s n 1 σ (n) s n ln σ (n) The modified Berlekamp- Massey algorithm for commutative rings with identity is formulated as follows The inputs to the algorithm are the syndromes s 0, s 1,, s 2r 1 which belong to R The output of the algorithm is a set of values σ i, i = 1, 2,, ν, such that Equation (9) holds with minimum ν Let σ ( 1) (x) = 1, l 1 = 0, d 1 = 1, σ (0) (x) = 1, l 0 = 0 and d 0 = s 0 be the a set of initial conditions to start the algorithm as in Peterson [8] The steps of the algorithm are: 1 n 0 2 If d n = 0, then σ (n+1) (x) σ (n) (x) and +1 and to go 5) 3 If d n 0, then find m n 1 such that d n yd m = 0 has a solution y and m l m has the largest value Then, σ (n+1) (x) σ (n) (x) yx n m σ (m) (x) and +1 max{, l m +n m} 4 If +1 = max{, n + 1 } then go to step 5, else search for a solution D (n+1) (x) with minimum degree l in the range max{, n + 1 } l < +1 such that σ (m) (x) defined by D (n+1) (x) σ (n) (x) = x n m σ (m) (x) is a solution for the first m power sums, d m = d n, with σ (m) 0 a zero divisor in R If such a solution is found, σ (n+1) (x) D (n+1) (x) and +1 l 5 If n < 2r 1, then d n = s n + s n 1 σ (n) s n ln σ (n) 6 n n + 1; if n < 2r 1 go to 2); else stop The coefficients σ (2r) 1, σ (2r) 2,, σ ν (2r) satisfy Equation (9) At Step 3, the solution to Equation (9) is generally not unique and the reciprocal polynomial ρ(z) of the polynomial σ (2r) (z) (output by the modified Berlekamp-Massey algorithm), may not be the correct error-locator polynomial (z x 1 )(z x 2 ) (z x ν ), where x j = α k i, for j = 1, 2,, ν and i = 1, 2,, 2n, are the correct error-location numbers Thus, the procedure for the calculation of the correct error-location numbers is the following: compute the roots z 1, z 2,, z ν of ρ(z); 13
7 among the x i = α k j, j = 1, 2, 2n, select those x i s such that x i z i are zero divisors in R The selected x i s will be the correct error-location numbers and each k j, for j = 1, 2,, 2n, indicates the position j of the error in the codeword At Step 4, the calculation of the error magnitude is based on Forney s procedure [3] The error magnitude is given by ν 1 l=0 y j = σ jls ν 1 l E ν 1 j l=0 σ jlx ν 1 l, (10) j for j = 1, 2,, ν, where the coefficients σ jl are recursively defined by σ j,i = σ i + x j σ j,i 1, i = 0, 1,, ν 1, starting with σ 0 = σ j,0 = 1 The E i = 1 for BCH code, E j = w ij for alternant code and E j = h(x i ) 1 for Goppa code, for i = 1, 2,, ν, are the corresponding location of errors in the vector w It follows from [1, Theorem 7] that the denominator in Equation (10) is always a unit in R Example 41 As in Example 4, if the received vector is given by b = (0, i, 0, 0, 0, 0, 0, 0), then the syndrome vector is given by s = bh t = (iα 3, iα, iα 6, iα 4 ) Applying the modified Berlekamp- Massey algorithm, we obtain that σ (4) (z) = 1 + α 5 z The root of ρ(z) = z + α 5 (the reciprocal of σ (4) (z)) is z 1 = α 5 Among the elements of G 2s we have x 1 = α 5 is such that x 1 z 1 = 0 is a zero divisor in R Therefore, x 1 is the correct error-location number, and k 2 = 5 indicates that one error has occurred in the second coordinate of the codeword The correct elementary symmetric function σ 1 = α 4 is obtained from x x 1 = x σ 1 = x α 4 Finally, applying Forney s method to s and σ 1, gives y 1 = i Therefore, the error pattern is given by e = (0, i, 0, 0, 0, 0, 0, 0) Referências [1] AA Andrade and R Palazzo Jr, A note on units of a local finite rings, Revista de Matemática e Estatística, 18 (2000) [2] AA Andrade, R Palazzo Jr, Linear codes over finite rings, Tema - Tend Mat Apl Comput, 6, No 2 (2005) [3] GD Forney Jr, On decoding BCH codes, IEEE Trans Inform Theory, IT-11 (1965) [4] VD Goppa, A new class of linear error-correcting codes, Probl Peredach Inform, 6, No 3 (1970) [5] R Gilmer, Commutative semigroup rings, University Chicago Press, Chicago and London, 1984 [6] JC Interlando, R Palazzo Jr and M Elia, On the decoding of Reed-Solomon and BCH codes over integer residue rings, IEEE Trans Inform Theory, IT-43 (1997) [7] B R McDonald, Finite rings with identity, Marcel Dekker, New York, 1974 [8] WW Peterson and EJ Weldon Jr, Error Correcting Codes, MIT Press, Cambridge, Mass, 1972 [9] Tariq Shah, Atlas Khan and A A Andrade, Encoding through generalized polynomial codes, (Sumitted) 14
Alternant and BCH codes over certain rings
Computational and Applied Mathematics Vol. 22, N. 2, pp. 233 247, 2003 Copyright 2003 SBMAC Alternant and BCH codes over certain rings A.A. ANDRADE 1, J.C. INTERLANDO 1 and R. PALAZZO JR. 2 1 Department
More informationA decoding method of an n length binary BCH code through (n + 1)n length binary cyclic code
Anais da Academia Brasileira de Ciências (03) 85(3): 863-87 (Annals of the Brazilian Academy of Sciences) Printed version ISSN 000-3765 / Online version ISSN 678-690 wwwscielobr/aabc A decoding method
More informationChapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding
Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols
More informationBinary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction
BCH Codes Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Preface The
More informationBerlekamp-Massey decoding of RS code
IERG60 Coding for Distributed Storage Systems Lecture - 05//06 Berlekamp-Massey decoding of RS code Lecturer: Kenneth Shum Scribe: Bowen Zhang Berlekamp-Massey algorithm We recall some notations from lecture
More informationInformation Theory. Lecture 7
Information Theory Lecture 7 Finite fields continued: R3 and R7 the field GF(p m ),... Cyclic Codes Intro. to cyclic codes: R8.1 3 Mikael Skoglund, Information Theory 1/17 The Field GF(p m ) π(x) irreducible
More informationFast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm
Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm MARC A. ARMAND WEE SIEW YEN Department of Electrical & Computer Engineering National University
More informationON SOME GENERALIZED VALUATION MONOIDS
Novi Sad J. Math. Vol. 41, No. 2, 2011, 111-116 ON SOME GENERALIZED VALUATION MONOIDS Tariq Shah 1, Waheed Ahmad Khan 2 Abstract. The valuation monoids and pseudo-valuation monoids have been established
More informationSkew Cyclic Codes Of Arbitrary Length
Skew Cyclic Codes Of Arbitrary Length Irfan Siap Department of Mathematics, Adıyaman University, Adıyaman, TURKEY, isiap@adiyaman.edu.tr Taher Abualrub Department of Mathematics and Statistics, American
More informationThe BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes
S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding
More informationChapter 6 Lagrange Codes
Chapter 6 Lagrange Codes 6. Introduction Joseph Louis Lagrange was a famous eighteenth century Italian mathematician [] credited with minimum degree polynomial interpolation amongst his many other achievements.
More informationGeneral error locator polynomials for binary cyclic codes with t 2 and n < 63
General error locator polynomials for binary cyclic codes with t 2 and n < 63 April 22, 2005 Teo Mora (theomora@disi.unige.it) Department of Mathematics, University of Genoa, Italy. Emmanuela Orsini (orsini@posso.dm.unipi.it)
More informationFinite Fields. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay
1 / 25 Finite Fields Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay September 25, 2014 2 / 25 Fields Definition A set F together
More informationError Correction Methods
Technologies and Services on igital Broadcasting (7) Error Correction Methods "Technologies and Services of igital Broadcasting" (in Japanese, ISBN4-339-06-) is published by CORONA publishing co., Ltd.
More informationError Correction Review
Error Correction Review A single overall parity-check equation detects single errors. Hamming codes used m equations to correct one error in 2 m 1 bits. We can use nonbinary equations if we create symbols
More informationOutline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials
Outline MSRI-UP 2009 Coding Theory Seminar, Week 2 John B. Little Department of Mathematics and Computer Science College of the Holy Cross Cyclic Codes Polynomial Algebra More on cyclic codes Finite fields
More informationChapter 6. BCH Codes
Chapter 6 BCH Codes Description of the Codes Decoding of the BCH Codes Outline Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Weight
More informationThe Golay codes. Mario de Boer and Ruud Pellikaan
The Golay codes Mario de Boer and Ruud Pellikaan Appeared in Some tapas of computer algebra (A.M. Cohen, H. Cuypers and H. Sterk eds.), Project 7, The Golay codes, pp. 338-347, Springer, Berlin 1999, after
More informationCoding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013
Coding Theory and Applications Solved Exercises and Problems of Cyclic Codes Enes Pasalic University of Primorska Koper, 2013 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a collection of solved
More informationG Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows.
EE 387 October 28, 2015 Algebraic Error-Control Codes Homework #4 Solutions Handout #24 1. LBC over GF(5). Let G be a nonsystematic generator matrix for a linear block code over GF(5). 2 4 2 2 4 4 G =
More information5.0 BCH and Reed-Solomon Codes 5.1 Introduction
5.0 BCH and Reed-Solomon Codes 5.1 Introduction A. Hocquenghem (1959), Codes correcteur d erreurs; Bose and Ray-Chaudhuri (1960), Error Correcting Binary Group Codes; First general family of algebraic
More informationAlgebra Homework, Edition 2 9 September 2010
Algebra Homework, Edition 2 9 September 2010 Problem 6. (1) Let I and J be ideals of a commutative ring R with I + J = R. Prove that IJ = I J. (2) Let I, J, and K be ideals of a principal ideal domain.
More informationQUALIFYING EXAM IN ALGEBRA August 2011
QUALIFYING EXAM IN ALGEBRA August 2011 1. There are 18 problems on the exam. Work and turn in 10 problems, in the following categories. I. Linear Algebra 1 problem II. Group Theory 3 problems III. Ring
More informationImplementation of Galois Field Arithmetic. Nonbinary BCH Codes and Reed-Solomon Codes
BCH Codes Wireless Information Transmission System Lab Institute of Communications Engineering g National Sun Yat-sen University Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation
More informationOn the Hamming distance of linear codes over a finite chain ring
Loughborough University Institutional Repository On the Hamming distance of linear codes over a finite chain ring This item was submitted to Loughborough University's Institutional Repository by the/an
More informationNew algebraic decoding method for the (41, 21,9) quadratic residue code
New algebraic decoding method for the (41, 21,9) quadratic residue code Mohammed M. Al-Ashker a, Ramez Al.Shorbassi b a Department of Mathematics Islamic University of Gaza, Palestine b Ministry of education,
More informationPAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes
359 PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes Ching-Lung CHR a),szu-linsu, Members, and Shao-Wei WU, Nonmember SUMMARY A low-complexity step-by-step decoding algorithm
More informationCoding Theory. Ruud Pellikaan MasterMath 2MMC30. Lecture 11.1 May
Coding Theory Ruud Pellikaan g.r.pellikaan@tue.nl MasterMath 2MMC30 /k Lecture 11.1 May 12-2016 Content lecture 11 2/31 In Lecture 8.2 we introduced the Key equation Now we introduce two algorithms which
More informationOn Irreducible Polynomial Remainder Codes
2011 IEEE International Symposium on Information Theory Proceedings On Irreducible Polynomial Remainder Codes Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering
More informationIntroduction to finite fields
Chapter 7 Introduction to finite fields This chapter provides an introduction to several kinds of abstract algebraic structures, particularly groups, fields, and polynomials. Our primary interest is in
More informationAn Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission
An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission P.Mozhiarasi, C.Gayathri, V.Deepan Master of Engineering, VLSI design, Sri Eshwar College of Engineering, Coimbatore- 641 202,
More informationCoding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014
Anna Dovzhik 1 Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Sharing data across channels, such as satellite, television, or compact disc, often
More informationNew Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM)
International Journal of Computational Intelligence Research (IJCIR). ISSN: 097-87 Volume, Number 8 (207), pp. 205 2027 Research India Publications http://www.ripublication.com/ijcir.htm New Algebraic
More informationSection VI.33. Finite Fields
VI.33 Finite Fields 1 Section VI.33. Finite Fields Note. In this section, finite fields are completely classified. For every prime p and n N, there is exactly one (up to isomorphism) field of order p n,
More informationECEN 604: Channel Coding for Communications
ECEN 604: Channel Coding for Communications Lecture: Introduction to Cyclic Codes Henry D. Pfister Department of Electrical and Computer Engineering Texas A&M University ECEN 604: Channel Coding for Communications
More informationDecoding Algorithm and Architecture for BCH Codes under the Lee Metric
Decoding Algorithm and Architecture for BCH Codes under the Lee Metric Yingquan Wu and Christoforos N. Hadjicostis Coordinated Science Laboratory and Department of Electrical and Computer Engineering University
More information1. Group Theory Permutations.
1.1. Permutations. 1. Group Theory Problem 1.1. Let G be a subgroup of S n of index 2. Show that G = A n. Problem 1.2. Find two elements of S 7 that have the same order but are not conjugate. Let π S 7
More informationSolutions or answers to Final exam in Error Control Coding, October 24, G eqv = ( 1+D, 1+D + D 2)
Solutions or answers to Final exam in Error Control Coding, October, Solution to Problem a) G(D) = ( +D, +D + D ) b) The rate R =/ and ν i = ν = m =. c) Yes, since gcd ( +D, +D + D ) =+D + D D j. d) An
More informationReverse Berlekamp-Massey Decoding
Reverse Berlekamp-Massey Decoding Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering ETH Zurich, Switzerland Email: {yu, loeliger}@isi.ee.ethz.ch arxiv:1301.736v
More informationEE512: Error Control Coding
EE51: Error Control Coding Solution for Assignment on BCH and RS Codes March, 007 1. To determine the dimension and generator polynomial of all narrow sense binary BCH codes of length n = 31, we have to
More information7.1 Definitions and Generator Polynomials
Chapter 7 Cyclic Codes Lecture 21, March 29, 2011 7.1 Definitions and Generator Polynomials Cyclic codes are an important class of linear codes for which the encoding and decoding can be efficiently implemented
More informationVLSI Architecture of Euclideanized BM Algorithm for Reed-Solomon Code
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 2, 4-4 (29) VLSI Architecture of Euclideanized BM Algorithm for Reed-Solomon Code HUANG-CHI CHEN,2, YU-WEN CHANG 3 AND REY-CHUE HWANG Deaprtment of Electrical
More informationChapter 3. Rings. The basic commutative rings in mathematics are the integers Z, the. Examples
Chapter 3 Rings Rings are additive abelian groups with a second operation called multiplication. The connection between the two operations is provided by the distributive law. Assuming the results of Chapter
More informationSolutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16
Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the
More informationMATH 101A: ALGEBRA I, PART D: GALOIS THEORY 11
MATH 101A: ALGEBRA I, PART D: GALOIS THEORY 11 3. Examples I did some examples and explained the theory at the same time. 3.1. roots of unity. Let L = Q(ζ) where ζ = e 2πi/5 is a primitive 5th root of
More informationEE 229B ERROR CONTROL CODING Spring 2005
EE 9B ERROR CONTROL CODING Spring 005 Solutions for Homework 1. (Weights of codewords in a cyclic code) Let g(x) be the generator polynomial of a binary cyclic code of length n. (a) Show that if g(x) has
More informationRON M. ROTH * GADIEL SEROUSSI **
ENCODING AND DECODING OF BCH CODES USING LIGHT AND SHORT CODEWORDS RON M. ROTH * AND GADIEL SEROUSSI ** ABSTRACT It is shown that every q-ary primitive BCH code of designed distance δ and sufficiently
More informationALGEBRA QUALIFYING EXAM SPRING 2012
ALGEBRA QUALIFYING EXAM SPRING 2012 Work all of the problems. Justify the statements in your solutions by reference to specific results, as appropriate. Partial credit is awarded for partial solutions.
More informationMATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.
MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. Binary codes Let us assume that a message to be transmitted is in binary form. That is, it is a word in the alphabet
More informationQuasi-reducible Polynomials
Quasi-reducible Polynomials Jacques Willekens 06-Dec-2008 Abstract In this article, we investigate polynomials that are irreducible over Q, but are reducible modulo any prime number. 1 Introduction Let
More informationAn Interpolation Algorithm for List Decoding of Reed-Solomon Codes
An Interpolation Algorithm for List Decoding of Reed-Solomon Codes Kwankyu Lee Department of Mathematics San Diego State University San Diego, USA Email: kwankyu@sogangackr Michael E O Sullivan Department
More informationPractice problems for first midterm, Spring 98
Practice problems for first midterm, Spring 98 midterm to be held Wednesday, February 25, 1998, in class Dave Bayer, Modern Algebra All rings are assumed to be commutative with identity, as in our text.
More informationFinite fields: some applications Michel Waldschmidt 1
Ho Chi Minh University of Science HCMUS Update: 16/09/2013 Finite fields: some applications Michel Waldschmidt 1 Exercises We fix an algebraic closure F p of the prime field F p of characteristic p. When
More informationx n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1)
Cyclic codes: review EE 387, Notes 15, Handout #26 A cyclic code is a LBC such that every cyclic shift of a codeword is a codeword. A cyclic code has generator polynomial g(x) that is a divisor of every
More informationSimplification of Procedure for Decoding Reed- Solomon Codes Using Various Algorithms: An Introductory Survey
2014 IJEDR Volume 2, Issue 1 ISSN: 2321-9939 Simplification of Procedure for Decoding Reed- Solomon Codes Using Various Algorithms: An Introductory Survey 1 Vivek Tilavat, 2 Dr.Yagnesh Shukla 1 PG Student,
More informationOn Permutation Polynomials over Local Finite Commutative Rings
International Journal of Algebra, Vol. 12, 2018, no. 7, 285-295 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ija.2018.8935 On Permutation Polynomials over Local Finite Commutative Rings Javier
More informationRINGS: SUMMARY OF MATERIAL
RINGS: SUMMARY OF MATERIAL BRIAN OSSERMAN This is a summary of terms used and main results proved in the subject of rings, from Chapters 11-13 of Artin. Definitions not included here may be considered
More informationDecoding of the Five-Error-Correcting Binary Quadratic Residue Codes
American Journal of Mathematical and Computer Modelling 2017; 2(1): 6-12 http://www.sciencepublishinggroup.com//amcm doi: 10.1168/.amcm.20170201.12 Decoding of the Five-Error-Correcting Binary Quadratic
More informationCongruences and Residue Class Rings
Congruences and Residue Class Rings (Chapter 2 of J. A. Buchmann, Introduction to Cryptography, 2nd Ed., 2004) Shoichi Hirose Faculty of Engineering, University of Fukui S. Hirose (U. Fukui) Congruences
More informationPart III. Cyclic codes
Part III Cyclic codes CHAPTER 3: CYCLIC CODES, CHANNEL CODING, LIST DECODING Cyclic codes are very special linear codes. They are of large interest and importance for several reasons: They posses a rich
More informationOn the BMS Algorithm
On the BMS Algorithm Shojiro Sakata The University of Electro-Communications Department of Information and Communication Engineering Chofu-shi, Tokyo 182-8585, JAPAN Abstract I will present a sketch of
More informationCyclic Codes and Self-Dual Codes Over
1250 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 4, MAY 1999 Cyclic Codes and Self-Dual Codes Over A. Bonnecaze and P. Udaya TABLE I MULTIPLICATION AND ADDITION TABLES FOR THE RING F 2 + uf 2
More informationAlgebra for error control codes
Algebra for error control codes EE 387, Notes 5, Handout #7 EE 387 concentrates on block codes that are linear: Codewords components are linear combinations of message symbols. g 11 g 12 g 1n g 21 g 22
More informationCyclic codes: overview
Cyclic codes: overview EE 387, Notes 14, Handout #22 A linear block code is cyclic if the cyclic shift of a codeword is a codeword. Cyclic codes have many advantages. Elegant algebraic descriptions: c(x)
More informationLECTURE NOTES IN CRYPTOGRAPHY
1 LECTURE NOTES IN CRYPTOGRAPHY Thomas Johansson 2005/2006 c Thomas Johansson 2006 2 Chapter 1 Abstract algebra and Number theory Before we start the treatment of cryptography we need to review some basic
More informationThe number of message symbols encoded into a
L.R.Welch THE ORIGINAL VIEW OF REED-SOLOMON CODES THE ORIGINAL VIEW [Polynomial Codes over Certain Finite Fields, I.S.Reed and G. Solomon, Journal of SIAM, June 1960] Parameters: Let GF(2 n ) be the eld
More informationGalois fields/1. (M3) There is an element 1 (not equal to 0) such that a 1 = a for all a.
Galois fields 1 Fields A field is an algebraic structure in which the operations of addition, subtraction, multiplication, and division (except by zero) can be performed, and satisfy the usual rules. More
More informationB. Cyclic Codes. Primitive polynomials are the generator polynomials of cyclic codes.
B. Cyclic Codes A cyclic code is a linear block code with the further property that a shift of a codeword results in another codeword. These are based on polynomials whose elements are coefficients from
More information2 ALGEBRA II. Contents
ALGEBRA II 1 2 ALGEBRA II Contents 1. Results from elementary number theory 3 2. Groups 4 2.1. Denition, Subgroup, Order of an element 4 2.2. Equivalence relation, Lagrange's theorem, Cyclic group 9 2.3.
More informationReed-Solomon codes. Chapter Linear codes over finite fields
Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime
More informationALGEBRA PH.D. QUALIFYING EXAM September 27, 2008
ALGEBRA PH.D. QUALIFYING EXAM September 27, 2008 A passing paper consists of four problems solved completely plus significant progress on two other problems; moreover, the set of problems solved completely
More informationATOMIC AND AP SEMIGROUP RINGS F [X; M], WHERE M IS A SUBMONOID OF THE ADDITIVE MONOID OF NONNEGATIVE RATIONAL NUMBERS. Ryan Gipson and Hamid Kulosman
International Electronic Journal of Algebra Volume 22 (2017) 133-146 DOI: 10.24330/ieja.325939 ATOMIC AND AP SEMIGROUP RINGS F [X; M], WHERE M IS A SUBMONOID OF THE ADDITIVE MONOID OF NONNEGATIVE RATIONAL
More informationWritten Homework # 5 Solution
Math 516 Fall 2006 Radford Written Homework # 5 Solution 12/12/06 Throughout R is a ring with unity. Comment: It will become apparent that the module properties 0 m = 0, (r m) = ( r) m, and (r r ) m =
More informationTEST CODE: PMB SYLLABUS
TEST CODE: PMB SYLLABUS Convergence and divergence of sequence and series; Cauchy sequence and completeness; Bolzano-Weierstrass theorem; continuity, uniform continuity, differentiability; directional
More informationOn the NP-Hardness of Bounded Distance Decoding of Reed-Solomon Codes
On the NP-Hardness of Bounded Distance Decoding of Reed-Solomon Codes Venkata Gandikota Purdue University vgandiko@purdue.edu Badih Ghazi MIT badih@mit.edu Elena Grigorescu Purdue University elena-g@purdue.edu
More informationCodes used in Cryptography
Prasad Krishnan Signal Processing and Communications Research Center, International Institute of Information Technology, Hyderabad March 29, 2016 Outline Coding Theory and Cryptography Linear Codes Codes
More informationOn the Primitivity of some Trinomials over Finite Fields
On the Primitivity of some Trinomials over Finite Fields LI Yujuan & WANG Huaifu & ZHAO Jinhua Science and Technology on Information Assurance Laboratory, Beijing, 100072, P.R. China email: liyj@amss.ac.cn,
More informationMath 547, Exam 2 Information.
Math 547, Exam 2 Information. 3/19/10, LC 303B, 10:10-11:00. Exam 2 will be based on: Homework and textbook sections covered by lectures 2/3-3/5. (see http://www.math.sc.edu/ boylan/sccourses/547sp10/547.html)
More informationAlgebra Qualifying Exam August 2001 Do all 5 problems. 1. Let G be afinite group of order 504 = 23 32 7. a. Show that G cannot be isomorphic to a subgroup of the alternating group Alt 7. (5 points) b.
More informationAbstract Algebra: Chapters 16 and 17
Study polynomials, their factorization, and the construction of fields. Chapter 16 Polynomial Rings Notation Let R be a commutative ring. The ring of polynomials over R in the indeterminate x is the set
More informationOn PGZ decoding of alternant codes
On PGZ decoding of alternant codes R Farré, N Sayols, and S Xambó-Descamps Universitat Politècnica de Catalunya rafelfarre@upcedu, narcissb@gmailcom, sebastiaxambo@upcedu Abstract In this note we first
More informationREED-SOLOMON codes are powerful techniques for
1 Efficient algorithms for decoding Reed-Solomon codes with erasures Todd Mateer Abstract In this paper, we present a new algorithm for decoding Reed-Solomon codes with both errors and erasures. The algorithm
More informationImplementation of Galois Field Arithmetic. Nonbinary BCH Codes and Reed-Solomon Codes
BCH Codes Wireless Information Transmission System La. Institute of Communications Engineering g National Sun Yat-sen University Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation
More informationGeneral error locator polynomials for nth-root codes
General error locator polynomials for nth-root codes Marta Giorgetti 1 and Massimiliano Sala 2 1 Department of Mathematics, University of Milano, Italy 2 Boole Centre for Research in Informatics, UCC Cork,
More informationAbstract Algebra, Second Edition, by John A. Beachy and William D. Blair. Corrections and clarifications
1 Abstract Algebra, Second Edition, by John A. Beachy and William D. Blair Corrections and clarifications Note: Some corrections were made after the first printing of the text. page 9, line 8 For of the
More informationMATH 291T CODING THEORY
California State University, Fresno MATH 291T CODING THEORY Spring 2009 Instructor : Stefaan Delcroix Chapter 1 Introduction to Error-Correcting Codes It happens quite often that a message becomes corrupt
More informationarxiv: v1 [cs.it] 26 Apr 2007
EVALUATION CODES DEFINED BY PLANE VALUATIONS AT INFINITY C. GALINDO AND F. MONSERRAT arxiv:0704.3536v1 [cs.it] 26 Apr 2007 Abstract. We introduce the concept of δ-sequence. A δ-sequence generates a wellordered
More informationError-Correcting Codes
Error-Correcting Codes HMC Algebraic Geometry Final Project Dmitri Skjorshammer December 14, 2010 1 Introduction Transmission of information takes place over noisy signals. This is the case in satellite
More information1 Rings 1 RINGS 1. Theorem 1.1 (Substitution Principle). Let ϕ : R R be a ring homomorphism
1 RINGS 1 1 Rings Theorem 1.1 (Substitution Principle). Let ϕ : R R be a ring homomorphism (a) Given an element α R there is a unique homomorphism Φ : R[x] R which agrees with the map ϕ on constant polynomials
More informationIntegral Extensions. Chapter Integral Elements Definitions and Comments Lemma
Chapter 2 Integral Extensions 2.1 Integral Elements 2.1.1 Definitions and Comments Let R be a subring of the ring S, and let α S. We say that α is integral over R if α isarootofamonic polynomial with coefficients
More informationECEN 5682 Theory and Practice of Error Control Codes
ECEN 5682 Theory and Practice of Error Control Codes Introduction to Algebra University of Colorado Spring 2007 Motivation and For convolutional codes it was convenient to express the datawords and the
More informationA 2-error Correcting Code
A 2-error Correcting Code Basic Idea We will now try to generalize the idea used in Hamming decoding to obtain a linear code that is 2-error correcting. In the Hamming decoding scheme, the parity check
More informationMATH 291T CODING THEORY
California State University, Fresno MATH 291T CODING THEORY Fall 2011 Instructor : Stefaan Delcroix Contents 1 Introduction to Error-Correcting Codes 3 2 Basic Concepts and Properties 6 2.1 Definitions....................................
More informationWEIGHT DISTRIBUTIONS OF SOME CLASSES OF BINARY CYCLIC CODES
Syracuse University SURFACE Electrical Engineering and Computer Science Technical Reports College of Engineering and Computer Science 3-1974 WEIGHT DISTRIBUTIONS OF SOME CLASSES OF BINARY CYCLIC CODES
More informationCyclic codes. Vahid Meghdadi Reference: Error Correction Coding by Todd K. Moon. February 2008
Cyclic codes Vahid Meghdadi Reference: Error Correction Coding by Todd K. Moon February 2008 1 Definitions Definition 1. A ring < R, +,. > is a set R with two binary operation + (addition) and. (multiplication)
More informationGroup Theory. 1. Show that Φ maps a conjugacy class of G into a conjugacy class of G.
Group Theory Jan 2012 #6 Prove that if G is a nonabelian group, then G/Z(G) is not cyclic. Aug 2011 #9 (Jan 2010 #5) Prove that any group of order p 2 is an abelian group. Jan 2012 #7 G is nonabelian nite
More informationCHAPTER I. Rings. Definition A ring R is a set with two binary operations, addition + and
CHAPTER I Rings 1.1 Definitions and Examples Definition 1.1.1. A ring R is a set with two binary operations, addition + and multiplication satisfying the following conditions for all a, b, c in R : (i)
More informationCode-Based Cryptography Error-Correcting Codes and Cryptography
Code-Based Cryptography Error-Correcting Codes and Cryptography I. Márquez-Corbella 0 1. Error-Correcting Codes and Cryptography 1. Introduction I - Cryptography 2. Introduction II - Coding Theory 3. Encoding
More informationOn the minimum distance of LDPC codes based on repetition codes and permutation matrices 1
Fifteenth International Workshop on Algebraic and Combinatorial Coding Theory June 18-24, 216, Albena, Bulgaria pp. 168 173 On the minimum distance of LDPC codes based on repetition codes and permutation
More informationMATH 3030, Abstract Algebra Winter 2012 Toby Kenney Sample Midterm Examination Model Solutions
MATH 3030, Abstract Algebra Winter 2012 Toby Kenney Sample Midterm Examination Model Solutions Basic Questions 1. Give an example of a prime ideal which is not maximal. In the ring Z Z, the ideal {(0,
More information