Topic 3. Design of Sequences with Low Correlation
|
|
- Ezra Charles
- 5 years ago
- Views:
Transcription
1 Topic 3. Design of Sequences with Low Correlation M-sequences and Quadratic Residue Sequences 2 Multiple Trace Term Sequences and WG Sequences 3 Gold-pair, Kasami Sequences, and Interleaved Sequences 4 Case Study: Examples of Orthogonal Codes 5 Applications in CDMA G. Gong
2 M-sequences and Quadratic Residue Sequences A. M-sequence Generator: Input: - A finite field F = GF(q); n n" - f ( x) = x " cn" x " L" cx " c, ci F, a primitive polynomial over F. Output: a = a, a, a2,l an m-sequence over F of period q n -. Procedure (F, f(x), a): Compute : a quit i n- + n = c ja j+ i, i j= =,, G. Gong 2
3 B. Profile of Randomsess of Binary M-sequences of Degree n Period 2 n Balance Run property 2 n- s and 2 n- - s () For k n-2 runs of s ( s) of length k occurs 2 n-2-k times (2) Zero run of length n- occurs once; no runs of s of length n- (3) Runs of s of length n occurs once As good as it could be Span n property or ideal n-tuple distribution Autocorrelation Linear span and ρ Each nonzero n-tuple occurs once 2-level n, the normalized linear span n " = 2 n Only need to know 2n bits to reconstruct the entire G. Gong 3
4 Property (Binary m-sequences). Let an LFSR have a primitive characteristic polynomial f(x). Then there exists an initial state for the LFSR such that the corresponding output sequence a = {a i }, i.e., an m-sequence, satisfies a i = a 2i, i =,,. In other words, there exists an initial state of the LFSR such that the output sequence is identical to its 2-decimation G. Gong 4
5 C. Quadratic Residue (or Legendre) Sequences Note. Starting from now, we only consider binary sequences. Some concepts in number theory: Quadratic Residue: Let p be an odd prime number. A number i: < i < p is called a quadratic residue modulo p if there is an integer x for which x 2 i mod p. Fact. A set defined by QR = {i 2 mod p < i (p-)/2} contains all quadratic residue modulo p. The Legendre symbol: The Legendre symbol (i/p) is defined as follows: * ( ) i p ' % & # if i is a quadratic residue modulo p = " $ G. Gong 5
6 Quadratic Sequence Generator: Input: A prime number p with p 3 mod 4 Output: a = a, a,... a binary sequence of period p Procedure(p, a): + i ( Compute :) & and set a * p ' a i = and set $ + i (, ) & = * p = ' # + i (, ) & = % " * p ' Return: a G. Gong 6
7 @ G. Gong 7 Example 8. Let p =. Then 2,, = " # $ % & ' = " # $ % & ' = " # $ % & ' p p p 5, 4, 3 = " # $ % & = " # $ % & = " # $ % & p p p 8, 7, 6 = " # $ % & ' = " # $ % & ' = " # $ % & ' p p p, 9 = " # $ % & ' = " # $ % & ' p p So, a has period and a = (). For p = 3, then a = () which has period 3. Verify it for the autocorrelation
8 Profile of Quadratic Residue (or Legendre) Sequences:. Period: p 2. Balance: (p+)/2 's and (p-)/2 's One should know entire 3. 2-level autocorrelation bits to reconstruct the 4. Linear span: (p-)/2 sequence 5. N(QR,p), the number of shift distinct quadratic sequences modulo p, N(QR, p) = 2. Sound randomness However, it cannot be implemented efficiently Compare it with G. Gong 8
9 2 Multiple Trace Term Sequences and WG Sequences A. Three-Term Sequences Construction A: For odd n 5, and n = 2m+ with period N = 2 n, let b = {b i } be an m-sequence of period N with the constant-on-coset property. Assume q = 2 m + and q 2 =2 m + 2 m- +. Define a i = b i + b q i +b q 2 i, i =,, L Then a = {a i } is a binary sequence with 2-level G. Gong 9
10 LFSR LFSR 2 + Output LFSR 3 Architecture for Implementation of the 3-Term G. Gong
11 Profile of 3-term sequences. Period: 2 n 2. Balance: 2 n- 's and 2 n- 's 3. 2-level autocorrelation 4. Linear span: 3n 5. N(T3, n), the number of shift distinct 3-term sequences, n N( T3, n) = "(2 ) / G. Gong
12 LFSR + LFSR 2 + Output + LFSR3 + Implementation of 3-term sequences of n = 5: (, 5, G. Gong 2
13 LFSR + LFSR 2 + Output + LFSR3 + Implementation of 3-term sequences of n = 7: (, 9, G. Gong 3
14 5-Term Sequences and WG Transformation Sequences Some property of finite fields Some property of finite G. Gong 4
15 B. 5-Term Sequences and WG Transformation Sequences Some property of finite fields Trace Functions Definition. A trace function Tr (x) of GF(pn ) is a function from GF(p n ) to GF(p) defined as follows Tr( x) = x + x p + L+ x p n n Tr( x) : GF( p ) GF( p) Property. (a) The trace function is a linear function. (b) p p p n ( x + y) = x + y," x, y GF( p ). Primitive Elements of Finite Fields Let the finite field GF(p n ) be defined by a primitive polynomial over GF(p) with degree n. Then the defining element is called a primitive element in GF(p n G. Gong 5
16 5-Term Sequences and WG Transformation G. Gong 6
17 @ G. Gong 7
18 f 2 (x) = f 3 (x) = f 5 (x) = Remark. The initial states of the LFSRs should satisfy the constan-on-coset G. Gong 8
19 There are two methods to implement a WG sequence. For small n, a WG sequence can be implemented by Method, as shown G. Gong 9
20 Remark: WG sequences have important applications in generating key streams in stream ciphers because their good randomness G. Gong 2
21 3. Gold-pair, Kasami Sequences, and Interleaved Sequences Signal Set Let s j = ( s j,, s j,, L, s j, v" ), j < r be r shift-distinct p-ary sequences of period v, S = r { s, s, L, s } Let # = max C, (" ) for any " < v, i, j r, s < i s j " v where if i= j. If " c where c > is a constant, then we say that the set S has low cross-correlation. In this case, we call S a ( v, r, ) signal set. When we consider the cross correlation of two sequences s i, s j in S, we simply write C i, j (τ) for ( ). C si, s G. Gong 2
22 A. Gold-pair Sequences Construction: Let a = {a i } be an m-sequence of degree n odd. Select d as one of the following values: - d =2 k + (Gold exponents), (k, n) =, k < (n + )/2. - d = 2 2k - 2 k + (Kasami Large Set Exponents), (k, n) =, k < (n + )/2. n - d = (the Welch Conjecture Exponent) n For " j < 2, let s j = {s j, i } be a binary sequence whose elements are given by Then s j is called a Gold-pair sequence. s j,i = a i + a j +di, i =,,L,2 n " 2 Let s 2 n " = a and s 2 n = a (d ). Set S = { s j j 2 n }. Then S is called a Gold-pair (signal) set.
23 Note that we can also write s j as a sum of a shift of a and b = a (d), i.e., s j = L j n a + b, " j < 2. Remark. A useful formula for the relationship between the cross correlation and the Hamming weight. Let a and b be two binary sequences with period 2 n -, then the cross correlation between these two sequences can be determined by the Hamming weight of a + L τ b as follows: C a,b n ( ) = 2 " " 2w( a + L ( b)) where w(.) denotes the Hamming weight of the G. Gong 23
24 Profile of the Gold-pair Signal Set: n n ( n+)/ 2. S is a (2, 2 +, + 2 ) -signal set. 2. The cross correlation C i, j (τ) of any two sequences s i and s j in S is three-valued and it takes values: ( n+ )/ 2, ± 2 3. In S, there are 2 n- +2 sequences are balanced, i.e., each has 2 n- 's. Moreover, each sequence in S has its Hamming weight taking one of the three values: n n ( )/ 2 2, 2 ± 2 n 4. b is also an m-sequence, i.e., (d, 2 n - )=. 5. Linear span is either 2n or G. Gong 24
25 LFSR Implementation:. Select n odd, f(x), a primitive polynomial of degree n over GF(2), as a characteristic polynomial of LFSR. 2. Select d and compute the characteristic polynomial of the LFSR2, which is the minimal polynomial of d-decimation of a sequence generated by LFSR. 3. We obtain all sequences in S by varying different initial states of the LFSR. LFSR: varying initial state LFSR2: a fixed initial state LFSR implementation of Gold pair G. Gong 25
26 Example. Design of a (3, 33, 9) Gold-pair signal set. Method : LFSR Implementation: 5 3. Select f ( x) = x + x +, a primitive polynomial over GF(2) of degree 5 as the characteristic polynomial of LFSR. 2. Select d = = 5 and compute the minimal polynomial of in GF( 2 5 ), defined by f(α) =. This gives g( x) = x + x + x + x + Use g(x) as the characteristic polynomial of LFSR2. 3. Fixing an initial state of one these two LFSRs and varying another, we get all 33 shift distinct sequences in G. Gong 26
27 Method 2: Software Implementation 5 3. Select f ( x) = x + x +, a primitive polynomial over GF(2) of degree 5 to generate a sequence a: 2. Select d = = 5 and perform 5-desimation on a, we obtain (5), i 5i b = a b = a, i =,,L 3. Generate L i ( a) + b, i < 3 Together with a and b, this gives all 33 sequences in G. Gong 27
28 : : 2: 3: 4: 5: 6: 7: 8: 9: : : 2: 3: 4: G. Gong 28
29 6: 7: 8: 9: 2: 2: 22: 23: 24: 25: 26: 27: 28: 29: G. Gong 29
30 Profile of S Period 3. There are 33 shift distinct sequences in S. The cross correlation of any two sequences in S only takes three values: -, -9, 7. S is a (3, 33, 9)-signal set. There 8 sequences in S are balanced, i.e. each has weight 6. The rest 5 has their weights either 2 or 2. Linear span or G. Gong 3
31 B. Kasami Sequences Construction: Let n = 2m and and a = {a i } be an m-sequence of degree n. Let s j = {s j, i } be a binary sequence whose elements are given by s j,i = a i + a j +di, i =,, L where d = 2 m +. Let s 2 m " = a and S = {s j " j " 2 m #}. Then S is called a Kasami small signal set. In other words, if we write then b = a (d ) s j = a + L j b, " j < 2 m G. Gong 3
32 Profile of the Kasami small signal set. The Kasami small signal set S is a signal set. (2 n, 2,+ 2 n / 2 n / 2 ) 2. The cross correlation C i, j (τ) of any two sequences s i and s j in S is three-valued and it takes values: n / 2, ± 2 3. b is an m-sequence of period 2 n/ Linear span: 3n/2 or G. Gong 32
33 Example 2. Design a (63, 8, 9) Kasami signal set. LFSR Implementation: - Select n = 6 and f(x) = x 6 + x + ; set α be a root of f(x) in GF(2 6 ). - Compute the minimal polynomial of α 9 which gives g(x) = x 3 + x 2 +. c b a a, b, and c are taken as or The correlation values are: -, 7, - G. Gong 33
34 b = a = a + b = Complement the columns corresponding to s in b: Write it row by row from the most left upper corner: s G. Gong 34
35 C. Interleaved Sequences Definition of Interleaved Sequences Constructions of Signal Sets from Interleaved Sequences Profiles of the Interleaved Signal Sets G. Gong 35
36 @ G. Gong 36 Definition of Interleaved Sequences Let be a binary sequence of period st. We can write the elements of the sequence A into a s by t array as follows: ),,, ( = st u u u L u " # $ $ $ $ $ $ % & ' + ' + ' ' ' + + ' + + ' ) ( ) ( ) ( t t s t s t s t t t t t t t t t u u u u u u u u u u u u L M L L L If all these column sequences are phase shifts of a binary sequence, say a, of period s, then we say that u is an (s, t)-interleaved sequence. Let u j denote the jth column of the above array. Then we have where L is the left shift operator and the e j are nonnegative integers with e j <s. t j L i e j < = (a), u
37 Example 3. Let e = (3, 6, 5, 5, 2, 3, 5) and a = (,,,,,, ), a binary m-sequence of period 7. Then a (7, 7) array is as follows: A (7, 7) interleaved sequence u G. Gong 37
38 Procedure : Constructions of (v 2, v+, 2v+3) signal sets. Choose a = (a, a,..., a v- ) and b = (b, b,..., b v- ), two binary sequence of period v with 2-level auto-correlation. 2. Choose e =(e, e,..., e v- ), an integer sequence whose elements taken from Z v, a set consisting of integers modulo v. 3. Construct u = ( u, u, L, u ) v 2, a (v, v) interleaved sequence whose e jth column sequence is given Lby j (a). 4. Set = ( s, s, L, s ), j v whose elements are defined by " s j j, j, 2 < j, v j s j, i = ui + bj+ i, or s = u + L ( b), j < v 5. A signal set S is defined by S = {u, s j : j =,,..., G. Gong 38
39 Example 4. Let v = 7.. Choose a = ( ) and b = ( ), m-sequences of period Choose e = (3, 6, 5, 5, 2, 3, 5). 3. Construct the interleaved sequence u: 4. Construct s j : j =,,..., 6. The column sequences of s can be obtained from the sequence u by complement of columns of u whose indexes correspond to 's in the sequence b; the column sequences of s obtained from u by complement of those in the sequence b with a phase shift, and so on. u = b = s = u + b: s = u + Lb G. Gong 39
40 s = u + b = s = u + b = s 2 = u + L 2 b = s 3 = u +L 3 b = s 4 = u +L 4 b = s 5 = u +L 5 b = s 6 = u +L 6 b = 5. Set S = {u, s, s,..., s 6 G. Gong 4
41 Constructions for (v 2, v+, 2v+3) signal sets (Cont.) Theorem. If the shift sequence e satisfies the following condition, (*) { e j " e j + s j < v " s} = v " s, for all s < v then S is a (v 2, v+, 2v+3) signal set. Moreover, the cross-correlation and out of phase auto-correlation values of any two sequences in S belong to the set {, -v, v+2, 2v+3, -2v-}. * Gong (995) introduced the idea of Procedure for constructing ((2 n -) 2, 2 n, +2 n ) signal sets where v = 2 n - and both a and b are m-sequences of period 2 n -, and proved Theorem. We can verify that the exponent sequence in Example 4 satisfies (*). From Theorem, it is a (49, 8, 7) signal G. Gong 4
42 Shortened M-sequence Construction Procedures for constructing the exponent sequence e which satisfies the condition (*). Construction ( Shortened M-sequence Construction) ((2 n -) 2, 2 n, +2 n+ ) signal set:. Choose a primitive polynomial f(x) over GF(2) of degree 2n as the characteristic polynomial of an LFSR and generate GF(2 2n ) by f(α)=. 2. Generate an m-sequence {w i } of period 2 2n - by the LFSR which satisfies the constant-on-coset property. 3. Arrange {w i } into an (r, v) array where r = 2 n + and v = 2 n -: # w w 2 L w s"2 w s" & % ( w s+ w s+2 L w s+s"2 w 2s" W = % ( % M ( % ( $ w (v")s+ w (v")s+2 L w (v")s+s"2 w vs" G. Gong 42
43 Let U be a matrix obtained from W by deleting the first and the last columns, then U gives an interleaved sequence u of period (2 n -) 2 which has the base sequence a which is r-decimation of b and the exponent sequence satisfied (*). 4. Select b a binary 2-level sequence of period 2 n -. Continue the Procedure, we get the signal set G. Gong 43
44 Example 5. Interleaved Generator (49, 8, 7):. Choose a primitive polynomial f(x) = x 6 +x + for generating m- sequence {w i } with the initial state (,,,,, ) and arrange it into a 9 by 7 array W: Cut Cut 2. By deleting the first and the last columns of W, we have which is the sequence u given in Example G. Gong 44
45 Profile of Randomness of (49, 8, 7). Period: shift distinct sequences 3. The maximal magnitude of the cross correlation: 7 4. The cross correlation takes five values: {, -7, 9, 7, -5} 5. Balance: 25 's and 24 's 6. Linear span: 24 except for u where u has linear span 2. Compare it with the Kasami set with parameters (63, 8, 9) (An example of scarified the correlation for linear G. Gong 45
46 4. Case Study: Examples of Orthogonal Code Design Review for Inner Product Hadamard Matrices Orthogonal Code Design from 2-Level Autocorrelation Sequences G. Gong 46
47 Review for Inner Product: let C be the complex field; F = C (r), contains vectors of dimension r whose elements are taken from C. The inner product of any two vectors in F, say and b c = r is defined by b ( b, b, L, b ) = r ( c, c, L, c ) " c = b c + bc + L+ b r cr If b.c =, then b and c are said to be orthogonal. Example. Let b = (, -, -, ) and c = (-, -,, ). Since b c = (" ) + (" )( " ) + (" ) + = then b and c are orthogonal. Definition. A finite subset M of F is said to be an orthogonal code if any two vectors in M, called codewords, are orthogonal. How to construct a binary orthogonal G. Gong 47
48 Hadamard Matrices: Let H be a m by m matrix whose elements are taken from {, -}. If T HH = mim where I m is the m by m identity matrix, then H is called a Hadamard matrix. The following matrix is a Hadamard matrix: H & $ $ = $ $ % ' ' ' ' # ' ' " Existence of Hadamar matrices: m is a multiple of 4 A set consisting of row vectors of a Hadamard matrix constitutes an orthogonal code, i.e., orthogonal code Hadamard matrix (it is also called a Walsh code in G. Gong 48
49 Orthogonal Code Design from 2-Level Autocorrelation Sequences Construction: Let a = {a i } be a binary 2-level autocorrelation sequence of period m = 2 n and Then is a Hadamard matrix.,,,, ) ( = = m i b i a i L " # $ $ $ $ $ $ % & = ' ' ' 2 2 m m m b b b b b b b b b H L M L L L Question: Which construction of 2-level autocorrelation sequence has a simple implementation? Example. Let a = (), an m-sequence of period 7. Then the following matrix is a Hadamard matrix, so we obtain an orthogonal code from the m- sequence of degree 3.
50 5 Applications to DS-CDMA System System Basics Physical Layer of Forward and Reverse Links Use of Hadamard matrices for orthogonality Forward: Orthogonal CDMA Channels Reverse: Orthogonal Coding Use of cyclic Hadamard matrices for 2-level auto-correlation function property PN Long Code and Short Code Unique Identification Data Scrambling and Authentication Spectrum Spreading
51 The CDMA Cocktail Party This is great stuff Where is she Who called How long will this take Who knows Where is the meeting You know that How can I get there Can I go home? Where is the office
52 Multiple Access Methods
53 CDMA System Design Voice Coding Forward Link Generation CODEC 96 bps 48 bps 24 bps 2 bps R = /2 Convolutional Encoder and Repetition User Address Mask (ESN) Block Interleaver Long Code PN Generator 9.2 ksps.2288 Mcps Decimator 9.2 ksps Power Control Bit Decimator MUX 4 8 Hz Wt.2288 Mcps I PN Q PN Cell VOCODER Power Control Voice Coding Reverse Link Generation I PN CODEC 96 bps 48 bps 24 bps 2 bps R = /3 Convolutional Encoder and Repetition 28.8 ksps Block Interleaver User Address Mask 28.8 ksps Walsh Cover Long Code PN Generator 37.2 khz.2288 Mcps Data Burst Randomizer.2288 Mcps QPN /2 PN Chip Delay D Mobile
54 The CDMA Rate Families IS-95 defines the 96 bps family of rates (Rate Set ) 96, 48, 24, and 2 bps Can select one of the four rates every 2 ms frame 44 bps family of rates (Rate Set 2) 44, 72, 36, and 8 bps Can select one of the four rates every 2 ms frame Extended rates (extended Rate Set ) Adds 92, 384, and 768 bps At most four rates can be active Can select one of the four active rates every 2 ms frame
55 Link Waveform CDMA Forward Link Waveform Pilot Channel Sync Channel Paging Channel Traffic Channel QTSO CDMA REVERSE Link Waveform Access Channel Traffic Channel QTSO
56 Forward CDMA Channel A 64 x 64 Hadamard matrix is used to produce 64 orthogonal channels. Each row of a Hadamard matrix is used to uniquely identify channels from to 63. This is possible since each row (as a binary vector of length 64) of the 64 x 64 Hadamard matrix is orthogonal to any other row. If we call 64 row vectors as W,W,...,W 63, then the waveform for Channel #k is obtained by multiplying W k to the input signal.
57 Forward CDMA Channel FORWARD CDMA CHANNEL (.23 MHz channel transmitted by base station) Pilot Chan W Sync Paging Paging Traffic Ch Chan Up Ch 7 Ch W32 W to W7 W8 Traffic Ch N Traffic Traffic Traffic Ch 25 Up Ch 24 Up Ch 55 to W3 W33 to W63 W = Code Channel Traffic Data Personal Station Power Control Sub-Channel
58 Reverse CDMA Channel A Reverse Channel is uniquely identified by an initial phase of a binary PN sequence (so called, the long code) of length Different initial phases correspond to different shift of the PN sequence, hence they are orthogonal. Only /256 positions of the length are used to address all the users in the system.
59 Reverse Traffic Channel Structure for Rate Set Reverse Traffic Channel Information Bits (72, 8, 4, or 6 bits/frame) 8.6 kbps 4. kbps 2. kbps.8 kbps Add Frame Quality Indicators (2, 8,, or bits/frame) Add 8 bit Encoder Tail 9.6 kbps 4.8 kbps 2.4 kbps.2 kbps Convolutional Encoder r=/3, K=9 Code Symbol 28.8 ksps 4.4 ksps 7.2 ksps 3.6 ksps Symbol Repetition Code Symbol 28.8 ksps Block Interleaver Code Symbol 28.8 ksps I-channel Sequence.2288 Mcps 64-ary Orthogonal Modulator Modulation Symbol (Walsh chip) 4.8 ksps (37.2 kcps) Frame Data Rate Data Burst Randomizer Long Code Generator PN chip.2288 Mcps Q-channel Sequence.2288 Mcps /2 PN chip Delay = 46.9 ns D I Q Baseband Filter Baseband Filter I(t) cos(2"f c t) Q(t) sin(2"f c t) s(t) Long Code Mask
60 Orthogonal Modulation (R. Link) chip pattern of Walsh Code # 35 Symbols Walsh Lookup Table... For every 6 symbols in, 64 Walsh chips are out. Here, 64 Walsh chips are 64 components of a row of the 64 x 64 Hadamard matrix. Note the different role of the same 64 x 64 Hadamard matrix in Reverse Link.
61 PN Long Code Spreading 64 chip pattern of Walsh Code # k... (37.2 khz).2288 Mcps Channel Mask Long Code (2 42 -) PN Generator.2288 Mcps
62 PN Long Code Long Code Maximal Linear Feedback Shift Register Sequence Length (Period) is Unique identifier for: Access and Traffic Channel (R. Link) Paging and Traffic Channel (F. Link) Functions Access, Paging, Traffic Channel spreading DBR on the Reverse Traffic Channel Power Control Bit randomization Data Scrambling (encryption) and Authentication
63 PN Short Codes of length 2 5 I PN.2288 Mcps To Tx Q PN
64 Short Code Short Code (2 5 ) Unique identifier for a Cell or a Sector Repeats every ms Consists of I and Q codes (different polynomials) It is called a Modified Maximal Length Sequence or de bruijn sequence or span-n sequence. It is obtained by adjoining one extra bit after the unique run of of length 4 in the PN sequence of length
65 Summary of Application to DS-CDMA systems Orthogonality -- Channelizing and Coding Scrambling and Authentication Spectrum G. Gong 65
Design of Signal Sets with Low Intraference for CDMA Applications in Networking Environment
Design of Signal Sets with Low Intraference for CDMA Applications in Networking Environment Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1,
More informationOutline. Criteria of good signal sets. Interleaved structure. The main results. Applications of our results. Current work.
Outline Criteria of good signal sets Interleaved structure The main results Applications of our results Current work Future work 2 He Panario Wang Interleaved sequences Criteria of a good signal set We
More informationAperiodic correlation and the merit factor
Aperiodic correlation and the merit factor Aina Johansen 02.11.2009 Correlation The periodic correlation between two binary sequences {x t } and {y t } of length n at shift τ is defined as n 1 θ x,y (τ)
More informationCyclic codes: overview
Cyclic codes: overview EE 387, Notes 14, Handout #22 A linear block code is cyclic if the cyclic shift of a codeword is a codeword. Cyclic codes have many advantages. Elegant algebraic descriptions: c(x)
More informationB. Cyclic Codes. Primitive polynomials are the generator polynomials of cyclic codes.
B. Cyclic Codes A cyclic code is a linear block code with the further property that a shift of a codeword results in another codeword. These are based on polynomials whose elements are coefficients from
More informationLecture 12. Block Diagram
Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data
More informationError Detection & Correction
Error Detection & Correction Error detection & correction noisy channels techniques in networking error detection error detection capability retransmition error correction reconstruction checksums redundancy
More informationOn the Binary Sequences of Period 2047 with Ideal Autocorrelation Seok-Yong Jin
On the Binary Sequences of Period 2047 with Ideal Autocorrelation Seok-Yong Jin The Graduate School Yonsei University Department of Electrical and Electronic Engineering On the Binary Sequences of Period
More informationDesign of Pseudo-Random Spreading Sequences for CDMA Systems
Design of Pseudo-Random Spreading Sequences for CDMA Systems Jian Ren and Tongtong Li Department of Electrical and Computer Engineering Michigan State University, 2120 Engineering Building East Lansing,
More informationInformation redundancy
Information redundancy Information redundancy add information to date to tolerate faults error detecting codes error correcting codes data applications communication memory p. 2 - Design of Fault Tolerant
More informationELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes
ELEC 519A Selected Topics in Digital Communications: Information Theory Hamming Codes and Bounds on Codes Single Error Correcting Codes 2 Hamming Codes (7,4,3) Hamming code 1 0 0 0 0 1 1 0 1 0 0 1 0 1
More informationSequences, DFT and Resistance against Fast Algebraic Attacks
Sequences, DFT and Resistance against Fast Algebraic Attacks Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1, CANADA Email. ggong@calliope.uwaterloo.ca
More informationOn Welch-Gong Transformation Sequence Generators
On Welch-Gong Transformation Sequence Generators G. Gong and A.M. Youssef Center for Applied Cryptographic Research, Department of Combinatorics and Optimization, University of Waterloo, Waterloo, Ontario
More informationThe BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes
S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding
More informationChapter 5. Cyclic Codes
Wireless Information Transmission System Lab. Chapter 5 Cyclic Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Description of Cyclic Codes Generator and Parity-Check
More informationReed-Solomon codes. Chapter Linear codes over finite fields
Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime
More informationLow Correlation Sequences for CDMA
Indian Institute of Science, Bangalore International Networking and Communications Conference Lahore University of Management Sciences Acknowledgement Prof. Zartash Afzal Uzmi, Lahore University of Management
More informationFPGA Implementation of Pseudo Noise Sequences based on Quadratic Residue Theory
FPGA Implementation of Pseudo Noise Sequences based on Quadratic Residue Theory A. Rajagopal Dept. of E&C, K.L. Sudha Dept.of E&C, Dundi Ajay Dept. of E&C, ABSTRACT Pseudo Noise (PN) sequences are defined
More informationSolutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16
Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the
More informationA SHORT SURVEY OF P-ARY PSEUDO-RANDOM SEQUENCES. Zhaneta Tasheva
JOURNAL SCIENCE EDUCATION INNOVATION, VOL. 2. 2014 Association Scientific and Applied Research International Journal Original Contribution ISSN 1314-9784 A SHORT SURVEY OF P-ARY PSEUDO-RANDOM SEQUENCES
More informationx n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1)
Cyclic codes: review EE 387, Notes 15, Handout #26 A cyclic code is a LBC such that every cyclic shift of a codeword is a codeword. A cyclic code has generator polynomial g(x) that is a divisor of every
More informationCoding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013
Coding Theory and Applications Solved Exercises and Problems of Cyclic Codes Enes Pasalic University of Primorska Koper, 2013 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a collection of solved
More informationNew algebraic decoding method for the (41, 21,9) quadratic residue code
New algebraic decoding method for the (41, 21,9) quadratic residue code Mohammed M. Al-Ashker a, Ramez Al.Shorbassi b a Department of Mathematics Islamic University of Gaza, Palestine b Ministry of education,
More informationECS455: Chapter 4 Multiple Access
ECS455: Chapter 4 Multiple Access 4.4 m-sequence Binary Random Sequence X -4 X -3 X -2 X - X -0 X X 2 X 3 X 4 Coin-flipping sequence H H T H H T H T T Bernoullitrials/sequence 0 0 0 0 Binary (indp.) random
More informationOptimum Soft Decision Decoding of Linear Block Codes
Optimum Soft Decision Decoding of Linear Block Codes {m i } Channel encoder C=(C n-1,,c 0 ) BPSK S(t) (n,k,d) linear modulator block code Optimal receiver AWGN Assume that [n,k,d] linear block code C is
More informationBinary Sequences with Optimal Autocorrelation
Cunsheng DING, HKUST, Kowloon, HONG KONG, CHINA July 2004 The Autocorrelation Function The autocorrelation of a binary sequence {s(t)} of period N at shift w is C s (w) = ( 1) s(t+w) s(t). N 1 t=0 The
More informationInteger Valued Sequences with 2-Level Autocorrelation from Iterative Decimation Hadamard Transform
Integer Valued Sequences with 2-Level Autocorrelation from Iterative Decimation Hadamard Transform Guang Gong Department of Electrical and Computer Engineering University of Waterloo CANADA
More informationChapter 3 Linear Block Codes
Wireless Information Transmission System Lab. Chapter 3 Linear Block Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Introduction to linear block codes Syndrome and
More informationPhysical Layer and Coding
Physical Layer and Coding Muriel Médard Professor EECS Overview A variety of physical media: copper, free space, optical fiber Unified way of addressing signals at the input and the output of these media:
More information3. Coding theory 3.1. Basic concepts
3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,
More informationCryptographic D-morphic Analysis and Fast Implementations of Composited De Bruijn Sequences
Cryptographic D-morphic Analysis and Fast Implementations of Composited De Bruijn Sequences Kalikinkar Mandal, and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo,
More information50 Years of Crosscorrelation of m-sequences
50 Years of Crosscorrelation of m-sequences Tor Helleseth Selmer Center Department of Informatics University of Bergen Bergen, Norway August 29, 2017 Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation
More informationInformation Theory. Lecture 7
Information Theory Lecture 7 Finite fields continued: R3 and R7 the field GF(p m ),... Cyclic Codes Intro. to cyclic codes: R8.1 3 Mikael Skoglund, Information Theory 1/17 The Field GF(p m ) π(x) irreducible
More informationNew Implementations of the WG Stream Cipher
New Implementations of the WG Stream Cipher Hayssam El-Razouk, Arash Reyhani-Masoleh, and Guang Gong Abstract This paper presents two new hardware designs of the WG-28 cipher, one for the multiple output
More informationError Correction Review
Error Correction Review A single overall parity-check equation detects single errors. Hamming codes used m equations to correct one error in 2 m 1 bits. We can use nonbinary equations if we create symbols
More information16.36 Communication Systems Engineering
MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication
More informationCorrecting Codes in Cryptography
EWSCS 06 Palmse, Estonia 5-10 March 2006 Lecture 2: Orthogonal Arrays and Error- Correcting Codes in Cryptography James L. Massey Prof.-em. ETH Zürich, Adjunct Prof., Lund Univ., Sweden, and Tech. Univ.
More informationECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes
Kevin Buckley - 2010 109 ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes m GF(2 ) adder m GF(2 ) multiplier
More informationSection VI.33. Finite Fields
VI.33 Finite Fields 1 Section VI.33. Finite Fields Note. In this section, finite fields are completely classified. For every prime p and n N, there is exactly one (up to isomorphism) field of order p n,
More informationCryptography Lecture 3. Pseudorandom generators LFSRs
Cryptography Lecture 3 Pseudorandom generators LFSRs Remember One Time Pad is ideal With OTP you need the same transmission capacity via an already secure channel for the key as you can then secure via
More informationwith Good Cross Correlation for Communications and Cryptography
m-sequences with Good Cross Correlation for Communications and Cryptography Tor Helleseth and Alexander Kholosha 9th Central European Conference on Cryptography: Trebíc, June 26, 2009 1/25 Outline m-sequences
More informationStructured Low-Density Parity-Check Codes: Algebraic Constructions
Structured Low-Density Parity-Check Codes: Algebraic Constructions Shu Lin Department of Electrical and Computer Engineering University of California, Davis Davis, California 95616 Email:shulin@ece.ucdavis.edu
More information: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane
2301532 : Coding Theory Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, 2006 http://pioneer.chula.ac.th/ upattane Chapter 1 Error detection, correction and decoding 1.1 Basic definitions and
More informationEECS Components and Design Techniques for Digital Systems. Lec 26 CRCs, LFSRs (and a little power)
EECS 150 - Components and esign Techniques for igital Systems Lec 26 CRCs, LFSRs (and a little power) avid Culler Electrical Engineering and Computer Sciences University of California, Berkeley http://www.eecs.berkeley.edu/~culler
More informationCS6304 / Analog and Digital Communication UNIT IV - SOURCE AND ERROR CONTROL CODING PART A 1. What is the use of error control coding? The main use of error control coding is to reduce the overall probability
More informationStatistical Properties of the Arithmetic Correlation of Sequences. Mark Goresky School of Mathematics Institute for Advanced Study
International Journal of Foundations of Computer Science c World Scientific Publishing Company Statistical Properties of the Arithmetic Correlation of Sequences Mark Goresky School of Mathematics Institute
More informationObjective: To become acquainted with the basic concepts of cyclic codes and some aspects of encoder implementations for them.
ECE 7670 Lecture 5 Cyclic codes Objective: To become acquainted with the basic concepts of cyclic codes and some aspects of encoder implementations for them. Reading: Chapter 5. 1 Cyclic codes Definition
More informationLinear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x f(x) = q(x)h(x) + r(x),
Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 + + a n 1 x n 1 + a n x n, where the coefficients a 1, a 2,, a n are
More informationThe Array Structure of Modified Jacobi Sequences
Journal of Mathematics Research; Vol. 6, No. 1; 2014 ISSN 1916-9795 E-ISSN 1916-9809 Published by Canadian Center of Science and Education The Array Structure of Modified Jacobi Sequences Shenghua Li 1,
More informationG Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows.
EE 387 October 28, 2015 Algebraic Error-Control Codes Homework #4 Solutions Handout #24 1. LBC over GF(5). Let G be a nonsystematic generator matrix for a linear block code over GF(5). 2 4 2 2 4 4 G =
More informationOptical Storage Technology. Error Correction
Optical Storage Technology Error Correction Introduction With analog audio, there is no opportunity for error correction. With digital audio, the nature of binary data lends itself to recovery in the event
More information5.0 BCH and Reed-Solomon Codes 5.1 Introduction
5.0 BCH and Reed-Solomon Codes 5.1 Introduction A. Hocquenghem (1959), Codes correcteur d erreurs; Bose and Ray-Chaudhuri (1960), Error Correcting Binary Group Codes; First general family of algebraic
More informationLinear Block Codes. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay
1 / 26 Linear Block Codes Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay July 28, 2014 Binary Block Codes 3 / 26 Let F 2 be the set
More informationCyclic Codes from the Two-Prime Sequences
Cunsheng Ding Department of Computer Science and Engineering The Hong Kong University of Science and Technology Kowloon, Hong Kong, CHINA May 2012 Outline of this Talk A brief introduction to cyclic codes
More informationVector spaces. EE 387, Notes 8, Handout #12
Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is
More informationCommunications II Lecture 9: Error Correction Coding. Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved
Communications II Lecture 9: Error Correction Coding Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved Outline Introduction Linear block codes Decoding Hamming
More information7.1 Definitions and Generator Polynomials
Chapter 7 Cyclic Codes Lecture 21, March 29, 2011 7.1 Definitions and Generator Polynomials Cyclic codes are an important class of linear codes for which the encoding and decoding can be efficiently implemented
More informationClock-Controlled Shift Registers for Key-Stream Generation
Clock-Controlled Shift Registers for Key-Stream Generation Alexander Kholosha Department of athematics and Computer Science Technische Universiteit Eindhoven, PO Box 513, 5600 B Eindhoven, The Netherlands
More informationBinary Sequence Pairs with Ideal Correlation and Cyclic Difference Pairs
Binary Sequence Pairs with Ideal Correlation and Cyclic Difference Pairs Seok-Yong Jin The Graduate School Yonsei University Department of Electrical and Electronic Engineering Binary Sequence Pairs with
More informationECEN 5022 Cryptography
Elementary Algebra and Number Theory University of Colorado Spring 2008 Divisibility, Primes Definition. N denotes the set {1, 2, 3,...} of natural numbers and Z denotes the set of integers {..., 2, 1,
More informationFunctions on Finite Fields, Boolean Functions, and S-Boxes
Functions on Finite Fields, Boolean Functions, and S-Boxes Claude Shannon Institute www.shannoninstitute.ie and School of Mathematical Sciences University College Dublin Ireland 1 July, 2013 Boolean Function
More informationDesign of Filter Functions for Key Stream Generators using Boolean Power Functions Jong-Min Baek
Design of Filter Functions for Key Stream Generators using Boolean Power Functions Jong-Min Baek The Graduate School Yonsei University Department of Electrical and Electronic Engineering Design of Filter
More informationCyclic Codes. Saravanan Vijayakumaran August 26, Department of Electrical Engineering Indian Institute of Technology Bombay
1 / 25 Cyclic Codes Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay August 26, 2014 2 / 25 Cyclic Codes Definition A cyclic shift
More informationL9: Galois Fields. Reading material
L9: Galois Fields Reading material Muzio & Wesselkamper Multiple-valued switching theory, p. 3-5, - 4 Sasao, Switching theory for logic synthesis, pp. 43-44 p. 2 - Advanced Logic Design L9 - Elena Dubrova
More informationExtended Binary Linear Codes from Legendre Sequences
Extended Binary Linear Codes from Legendre Sequences T. Aaron Gulliver and Matthew G. Parker Abstract A construction based on Legendre sequences is presented for a doubly-extended binary linear code of
More informationOn The Nonlinearity of Maximum-length NFSR Feedbacks
On The Nonlinearity of Maximum-length NFSR Feedbacks Meltem Sönmez Turan National Institute of Standards and Technology meltem.turan@nist.gov Abstract. Linear Feedback Shift Registers (LFSRs) are the main
More informationConstruction X for quantum error-correcting codes
Simon Fraser University Burnaby, BC, Canada joint work with Vijaykumar Singh International Workshop on Coding and Cryptography WCC 2013 Bergen, Norway 15 April 2013 Overview Construction X is known from
More informationLarge Zero Autocorrelation Zone of Golay Sequences and 4 q -QAM Golay Complementary Sequences
Large Zero Autocorrelation Zone of Golay Sequences and 4 q -QAM Golay Complementary Sequences Guang Gong 1 Fei Huo 1 and Yang Yang 2,3 1 Department of Electrical and Computer Engineering University of
More informationLinear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x
Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 x + + a n 1 x n 1 + a n x n, where the coefficients a 0, a 1, a 2,,
More informationMATH 291T CODING THEORY
California State University, Fresno MATH 291T CODING THEORY Spring 2009 Instructor : Stefaan Delcroix Chapter 1 Introduction to Error-Correcting Codes It happens quite often that a message becomes corrupt
More informationFault Tolerance & Reliability CDA Chapter 2 Cyclic Polynomial Codes
Fault Tolerance & Reliability CDA 5140 Chapter 2 Cyclic Polynomial Codes - cylic code: special type of parity check code such that every cyclic shift of codeword is a codeword - for example, if (c n-1,
More informationREED-SOLOMON CODE SYMBOL AVOIDANCE
Vol105(1) March 2014 SOUTH AFRICAN INSTITUTE OF ELECTRICAL ENGINEERS 13 REED-SOLOMON CODE SYMBOL AVOIDANCE T Shongwe and A J Han Vinck Department of Electrical and Electronic Engineering Science, University
More informationTrace Representation of Legendre Sequences
C Designs, Codes and Cryptography, 24, 343 348, 2001 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. Trace Representation of Legendre Sequences JEONG-HEON KIM School of Electrical and
More informationCONSTRUCTION OF SLICED SPACE-FILLING DESIGNS BASED ON BALANCED SLICED ORTHOGONAL ARRAYS
Statistica Sinica 24 (2014), 1685-1702 doi:http://dx.doi.org/10.5705/ss.2013.239 CONSTRUCTION OF SLICED SPACE-FILLING DESIGNS BASED ON BALANCED SLICED ORTHOGONAL ARRAYS Mingyao Ai 1, Bochuan Jiang 1,2
More informationGF(2 m ) arithmetic: summary
GF(2 m ) arithmetic: summary EE 387, Notes 18, Handout #32 Addition/subtraction: bitwise XOR (m gates/ops) Multiplication: bit serial (shift and add) bit parallel (combinational) subfield representation
More information4F5: Advanced Communications and Coding
4F5: Advanced Communications and Coding Coding Handout 4: Reed Solomon Codes Jossy Sayir Signal Processing and Communications Lab Department of Engineering University of Cambridge jossy.sayir@eng.cam.ac.uk
More informationRings. EE 387, Notes 7, Handout #10
Rings EE 387, Notes 7, Handout #10 Definition: A ring is a set R with binary operations, + and, that satisfy the following axioms: 1. (R, +) is a commutative group (five axioms) 2. Associative law for
More informationBinary Sequences with Optimal Autocorrelation
Cunsheng DING, HKUST, Kowloon, HONG KONG, CHINA September 2008 Outline of this talk Difference sets and almost difference sets Cyclotomic classes Introduction of binary sequences with optimal autocorrelation
More informationCharacter Sums and Polyphase Sequence Families with Low Correlation, DFT and Ambiguity
Character Sums and Polyphase Sequence Families with Low Correlation, DFT and Ambiguity Guang Gong Department of Electrical and Computer Engineering University of Waterloo, Waterloo, Ontario, Canada Email:
More informationMathematics for Cryptography
Mathematics for Cryptography Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada March 15, 2016 1 Groups and Modular Arithmetic 1.1
More informationSome Results on the Arithmetic Correlation of Sequences
Some Results on the Arithmetic Correlation of Sequences Mark Goresky Andrew Klapper Abstract In this paper we study various properties of arithmetic correlations of sequences. Arithmetic correlations are
More informationSinger and GMW constructions (or generalized GMW constructions), little else is known about p-ary two-level autocorrelation sequences. Recently, a few
New Families of Ideal -level Autocorrelation Ternary Sequences From Second Order DHT Michael Ludkovski 1 and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo,
More informationChapter 6. BCH Codes
Chapter 6 BCH Codes Description of the Codes Decoding of the BCH Codes Outline Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Weight
More informationFundamental Theorem of Algebra
EE 387, Notes 13, Handout #20 Fundamental Theorem of Algebra Lemma: If f(x) is a polynomial over GF(q) GF(Q), then β is a zero of f(x) if and only if x β is a divisor of f(x). Proof: By the division algorithm,
More informationSome error-correcting codes and their applications
Chapter 14 Some error-correcting codes and their applications J. D. Key 1 14.1 Introduction In this chapter we describe three types of error-correcting linear codes that have been used in major applications,
More informationLinear Cellular Automata as Discrete Models for Generating Cryptographic Sequences
Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences A Fúster-Sabater P Caballero-Gil 2 Institute of Applied Physics, CSIC Serrano 44, 286 Madrid, Spain Email: amparo@ieccsices
More informationMa/CS 6b Class 25: Error Correcting Codes 2
Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets
More informationSNR i = 2E b 6N 3. Where
Correlation Properties Of Binary Sequences Generated By The Logistic Map-Application To DS-CDMA *ZOUHAIR BEN JEMAA, **SAFYA BELGHITH *EPFL DSC LANOS ELE 5, 05 LAUSANNE **LABORATOIRE SYSCOM ENIT, 002 TUNIS
More informationHMMT February 2018 February 10, 2018
HMMT February 018 February 10, 018 Algebra and Number Theory 1. For some real number c, the graphs of the equation y = x 0 + x + 18 and the line y = x + c intersect at exactly one point. What is c? 18
More informationHow does the computer generate observations from various distributions specified after input analysis?
1 How does the computer generate observations from various distributions specified after input analysis? There are two main components to the generation of observations from probability distributions.
More informationMATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q
MATH-315201 This question paper consists of 6 printed pages, each of which is identified by the reference MATH-3152 Only approved basic scientific calculators may be used. c UNIVERSITY OF LEEDS Examination
More informationMATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9
Problem Set 1 These questions are based on the material in Section 1: Introduction to coding theory. You do not need to submit your answers to any of these questions. 1. The following ISBN was received
More informationCombinatorics of p-ary Bent Functions
Combinatorics of p-ary Bent Functions MIDN 1/C Steven Walsh United States Naval Academy 25 April 2014 Objectives Introduction/Motivation Definitions Important Theorems Main Results: Connecting Bent Functions
More informationDuadic Codes over Finite Commutative Rings
The Islamic University of Gaza Faculty of Science Department of Mathematics Duadic Codes over Finite Commutative Rings PRESENTED BY Ikhlas Ibraheem Diab Al-Awar SUPERVISED BY Prof. Mohammed Mahmoud AL-Ashker
More information17 Galois Fields Introduction Primitive Elements Roots of Polynomials... 8
Contents 17 Galois Fields 2 17.1 Introduction............................... 2 17.2 Irreducible Polynomials, Construction of GF(q m )... 3 17.3 Primitive Elements... 6 17.4 Roots of Polynomials..........................
More informationECEN 604: Channel Coding for Communications
ECEN 604: Channel Coding for Communications Lecture: Introduction to Cyclic Codes Henry D. Pfister Department of Electrical and Computer Engineering Texas A&M University ECEN 604: Channel Coding for Communications
More informationMinimal polynomials of the modified de Bruijn sequences
Discrete Applied Mathematics 156 (2008) 1549 1553 www.elsevier.com/locate/dam Minimal polynomials of the modified de Bruijn sequences Gohar M. Kyureghyan Department of Mathematics, Otto-von-Guericke University
More informationUniv.-Prof. Dr. rer. nat. Rudolf Mathar. Written Examination. Cryptography. Tuesday, August 29, 2017, 01:30 p.m.
Cryptography Univ.-Prof. Dr. rer. nat. Rudolf Mathar 1 2 3 4 15 15 15 15 60 Written Examination Cryptography Tuesday, August 29, 2017, 01:30 p.m. Name: Matr.-No.: Field of study: Please pay attention to
More informationQuasi-reducible Polynomials
Quasi-reducible Polynomials Jacques Willekens 06-Dec-2008 Abstract In this article, we investigate polynomials that are irreducible over Q, but are reducible modulo any prime number. 1 Introduction Let
More informationECEN 5682 Theory and Practice of Error Control Codes
ECEN 5682 Theory and Practice of Error Control Codes Introduction to Algebra University of Colorado Spring 2007 Motivation and For convolutional codes it was convenient to express the datawords and the
More information