Probability Bounds for Two-Dimensional Algebraic Lattice Codes

Size: px
Start display at page:

Download "Probability Bounds for Two-Dimensional Algebraic Lattice Codes"

Transcription

1 Noname manuscript No. (will be inserted by the editor) Probability Bounds for Two-Dimensional Algebraic Lattice Codes David A. Karpuk, Member, IEEE Camilla Hollanti, Member, IEEE Emanuele Viterbo, Fellow, IEEE the date of receipt and acceptance should be inserted later Abstract In this paper we provide easily computable probability bounds for the correct decision for an eavesdropper, over a fast fading channel, when coset coding using two-dimensional algebraic lattices is employed. These bounds are stated in terms of the group of units and Dedekind zeta function of the underlying number field. Keywords fading channel wiretap channel number fields lattices unit group Dedekind zeta function 1 Introduction Lattices and lattice codes provide an efficient and robust means for many applications in wireless communications [11]. In particular, number field lattice codes have been applied to Gaussian and fading wiretap channels [7, 9, 10, 4, 3], where number theoretic invariants allow one to perform analysis using algebraic data. In addition, lattice codes from totally real number fields exhibit full diversity. In [7], the authors estimate the probability of the correct decision of an eavesdropper, for lattice codes coming from number fields whose ring of integers is a principal ideal domain (PID). We improve on and generalize these The research of D. Karpuk and C. Hollanti is supported by the Emil Aaltonen Foundation s Young Researcher s Project, and by the Academy of Finland grant # Part of this work was performed at the Monash Software Defined Telecommunications Lab and was supported by the Monash Professional Fellowship and the Australian Research Council under Discovery grants ARC DP D. Karpuk and C. Hollanti are with the Department of Mathematics and System Analysis, P.O. Box 11100, FI Aalto University, Finland. davekarpuk@aalto.fi, camilla.hollanti@aalto.fi E. Viterbo is with the Department of Electrical and Computer System Engineering, Monash University, Clayton, VIC 3800, Australia. emanuele.viterbo@monash.edu

2 2 David A. Karpuk, Member, IEEE et al. results for two-dimensional number field lattice codes. In particular, we provide easily computable estimates for this probability for lattices coming from arbitrary degree two number fields, and compare these new estimates with those of [7], where the new estimates are shown to perform better. Similar purely number theoretic work has also been carried out in [6] and [5] on estimating the number of algebraic integers of bounded height. In the realm of information theory, related work has been done by Vehkalahti and Lu in [12 14], where a connection is demonstrated between the unit group and the diversity-multiplexing gain trade-off of division algebra-based spacetime codes via inverse determinant sums. Subsequent work in [15] explores this relation further, showing that the density of unit group completely determines the growth of the inverse determinant sum. Our estimates are similarly based on the growth of the unit group, but our goal is to make such estimates as explicit as possible, while providing theoretical tools which can ideally be used to generalize these results to higher dimensions. Lastly, we provide asymptotic analysis of the estimates of [7], and show that the estimates remain accurate as the size of the underlying constellation increases. Numerical data is provided for examples of number field lattice codes coming from number fields whose ring of integers is not a PID, for which the results of [7] do not apply. The reader can see the performance of our new bounds explicitly from the experimental results. 2 Lattices and Coset Coding A lattice Λ is a discrete abelian subgroup of a real vector space, and can be described as the set M Z n, where M M n (R) is the generator matrix for the lattice. The rank of the lattice is the rank of the matrix M. Lattices and lattice codes are ubiquitous in the study of fading channels; see [11]. In a wiretap channel, Alice is transmitting confidential data to the intended receiver Bob over a fading channel, while an eavesdropper Eve tries to intercept the data received over another fading channel. Following [2], we model this channel by the equations y b = H b x + z b, y e = H e x + z e (1) where y b R n is Bob s received vector, and z b is Bob s noise vector, assumed to be zero-mean Gaussian with variance σb 2. Bob s channel matrix is of the form H b = diag( h b,i ) for h b C n whose entries h b,i are complex zero-mean Gaussian random variables, so that the non-zero entries of H b are Rayleigh distributed fading coefficients. The quantities in the second equation are the corresponding variables for Eve s channel. The intended signal is x R n. We assume that both Bob and Eve have perfect channel state information, while Alice has none. The security of the fading wiretap channel is based on the assumption that Bob s SNR is sufficiently large compared to Eve s SNR, that is, that σb 2 >> σ2 e. Alice exploits these physical conditions by using a coset coding strategy [16] in order to confuse Eve. Alice s coding strategy begins by

3 Probability Bounds for Two-Dimensional Algebraic Lattice Codes 3 choosing a lattice Λ b containing information symbols intended for Bob, and a sublattice Λ e containing random information intended to confuse Eve. Alice s codebook consists cosets of Λ e in Λ b. To transmit, Alice chooses a codeword c and a random vector r Λ e and then sends the signal x = c + r c + Λ e, (2) where c contains the data bits and r embeds the random bits. Eve s SNR is assumed sufficiently large so that she can decode r perfectly. However, the codewords c belong to a finer lattice, and thus it is much more unlikely that Eve can correctly decode c. By [2] the expression P c,e for the average probability of Eve correctly decoding c over a fast fading channel is approximately ( ) n/2 1 P c,e Vol(Λ b ) 4γ 2 e n x Λ e i=1 x i 0 1 x i 3, (3) where γ e is Eve s average SNR over the n channels. Our goal is to approximate n 1 x Λ e i=1,x i 0 x i for algebraic lattices when n = Number Theoretic Background We assume the reader is familiar with basic algebraic structures such as fields, rings, and ideals. The definitions presented here generalize to arbitrary number fields, but for the purpose of eliminating unnecessary theoretical machinery we have simplified them for real quadratic number fields. We recommend [8] as a blanket reference for all necessary number theoretic results. A real quadratic number field is a field K = Q( d) = {a + b d : a, b Q} for a square-free positive integer d. The ring of integers O K of K is the set {a + bω : a, b Z}, where { (1 + d)/2 if d 1 mod 4 ω = (4) d otherwise. One can easily verify that O K has rank 2 as an abelian group. The discriminant D K of K is { d if d 1 mod 4 D = D K = (5) 4d otherwise. Given an ideal a of O K, it can be factored uniquely into prime ideals p i, in much the same way one factors integers: a = p e1 1 peg g. The ideal (p) of O K may no longer be prime, but it can be factored into prime ideals, and the possibilities for the factorization of (p) in O K are: (p) is prime iff (p, D) = 1, D y 2 (mod p), for any y Z (p) = pq, p q iff (p, D) = 1, D y 2 (mod p), for some y Z (6) iff p D. p 2

4 4 David A. Karpuk, Member, IEEE et al. In the first case we say that p is inert in K, in the second that p splits in K, and in the third that p ramifies in K. If a prime ideal p of O K appears in the factorization of (p), we say that p divides p, which we denote by p p. Example 1 Let K = Q( 10). The discriminant of K Is D = 40, thus the primes that ramify in K are p = 2, 5. In fact, we have the prime factorizations (2) = p 2 2, p 2 = (2, 10), and (7) (5) = p 2 5, p 5 = (5, 10). (8) If p = 13 we have (mod 13), hence the prime 13 splits in O K : (13) = pq, p = (13, ), q = (13, 6 10). (9) We can describe the structure of the group of units O K of the ring O K explicitly as follows. There is a unit ɛ O K such that O K = ±ɛ Z 2 Z, which is called a fundamental unit for K. The fundamental unit can be chosen (up to multiplication by ±1) such that among all u O K with the property that u > 1, ɛ is minimal. The regulator of K is defined to be ρ K = log ɛ. The regulator of K measures the density of the units of O K in R. Let σ : K K be the function σ(a + b d) = a b d. We use σ to define the field norm N : K Q, by N(x) = x σ(x). If x O K, then N(x) Z. One can use the field norm to classify units in O K, in that for x O K, we have N(x) = ±1 if and only if x O K. Example 2 Let us continue with the example of K = Q( 10). If ɛ = a + b 10 is a fundamental unit for K, we see by taking norms that a and b must satisfy ±1 = ɛ σ(ɛ) = (a + b 10)(a b 10) = a 2 b (10) From this equation, one can show that ɛ = is a fundamental unit for K. Therefore ρ K = log ɛ = Suppose that p is a prime ideal of O K such that p p for a prime number p Z. The ideal norm of p is { p N(p) = 2 if p is inert in K p otherwise (11) One can extend this definition to any ideal a of O K by using prime factorization. If a = p e1 1 peg g, then N(a) = N(p 1 ) e1 N(p g ) eg (12) The two definitions of norm coincide for principal ideals, in the sense that if a = (x) is principal, then N(a) = N(x). The Dedekind zeta function of a number field K is defined by ζ K (s) = a O K 1 N(a) s = k 1 a k k s, (13)

5 Probability Bounds for Two-Dimensional Algebraic Lattice Codes 5 where a runs over the nonzero ideals of O K, and a k denotes the number of ideals of O K of norm k. We will only be interested in values of ζ K (s) for s R, s > 1, where classical results guarantee convergence. The partial Dedekind zeta function of a number field K is defined by ζ 1 K(s) = 1 N(a ) s = a 1 k k s (14) a O K k 1 where a runs over the nonzero principal ideals of O K, and a 1 k denotes the number of principal ideals of O K of norm k. Again, classical results guarantee that this series converges for s R, s > 1. 4 Algebraic Lattice Codes Let K = Q( d) be a real quadratic field. The canonical embedding ψ : K R 2 is defined by ψ(x) = (x, σ(x)). The set ψ(o K ) is a lattice in R 2, which we call an algebraic lattice. We apply algebraic lattices to wiretap channels by setting Eve s lattice to be Λ = Λ e = ψ(o K ). We will carve a square constellation centered at the origin of R 2 from the lattice Λ, by using a bounding box B of side length 2R for some R > 0. In order to classify algebraic integers in B, we define the height of x O K to be H(x) = max{ x, σ(x) }. (15) Our constellation is then the set {ψ(x) Λ : H(x) R}. When using an algebraic lattice, one sees by (3) that the corresponding probability of Eve s correct decision is proportional to the inverse norm sum S K,R (s) = 0<H(x) R 1 N(x) s = k 1 b k,r k s (16) when s = 3, where we have truncated the inverse norm sum to reflect the fact that we are using a finite constellation. In the above expression b k,r denotes the number of algebraic integers with norm ±k and height bounded above by R. Note that for k > R 2, we have b k,r = 0 as N(x) = x σ(x) (max{ x, σ(x) }) 2 = H(x) 2. 5 Lower and Upper Bounds for S K,R (s) We present bounds for S K,R (s) when s > 1. These apply to the wiretap channel when s = 3, and to the pairwise error probability when s = 2 [11]. To obtain a lower bound for the value of S K,R (s), we truncate it after the first term. From (16) we see that S K,R (s) b 1,R, where b 1,R is the number of units of O K with height bounded above by R. As the main contribution to S K,R (s) comes from the units, it is beneficial to have a closed-form expression for b 1,R.

6 6 David A. Karpuk, Member, IEEE et al. Fig. 1 On the left, the points of the lattice ψ(o K ) for K = Q( 5) with a bounding box of side length 10, lying on the hyperbolas xy = ±k. On the right, the same lattice points after applying the transformation X = log x, Y = log y, lying on the lines X + Y = log k. To establish an explicit formula for b 1,R, we apply the 2-to-1 mapping X = log x, Y = log y to our lattice Λ. The image of O K is a 1-dimensional lattice in R 2 living on the line X + Y = 0, which we will call Λ log (see Fig. 1). The volume of the lattice Λ log is 2ρ K. We will denote by log B = (, log(r)] 2 the image of the bounding box under the log transformation. Proposition 1 For all s we have the lower bound log(r) b 1,R = S K,R (s). (17) ρ K Proof First, note that b 1,R /2 is the number of points of Λ log inside log B. By projecting Λ log onto the horizontal axis, one can see that b 1,R /2 is the number of multiples of ρ K in the interval [ log(r), log(r)]. Including the origin, this is equal to 2 log(r)/ρ K + 1, and the result follows. Proposition 2 For all s we have the upper bound b 1,R ζ 1 K(s) > S K,R (s). (18) Proof We have the trivial bound b k,r a 1 k b 1,R, hence S K,R (s) = k 1 b k,r k s b 1,R k 1 a 1 k k s = b 1,Rζ 1 K(s). (19) Note that the only term in b 1,R and b 1,R ζ 1 K (s) that depends on R is log(r), thus it is easy to measure how these bounds vary as the size of the constellation changes. In [7], bounds on S K,R (s) were presented in terms of bounded-height Dedekind zeta functions for number fields whose rings of integers are PIDs. However, the above bounds apply to all real quadratic number fields.

7 Probability Bounds for Two-Dimensional Algebraic Lattice Codes 7 6 Approximating the Inverse Norm Power Sum In this section we recall the method of [7] for approximating the sum S K,R (s). Two elements of O K generate the same principal ideal if and only if they differ multiplicatively by a unit. It follows that the intersection of log ψ(o K ) and the line X + Y = log k is the union of a 1 k translates of Λ log. We also have vol (log B (X + Y = log k)) = 2 log(r 2 /k) (20) Following [7], we arrive at the approximation of b k,r by a quantity n k,r obtained by dividing this volume by the volume of Λ log (and multiplying by 2a 1 k ), as well as an approximation of the inverse norm sum by a quantity N K,R (s): b k,r n k,r := 2a 1 log(r 2 /k) k, S K,R (s) N K,R (s) := ρ K R 2 n k,r k s. (21) The main difficulty in computing n k,r lies in calculating a 1 k. Here we present an algorithm for listing all ideals of O K which have norm k, from which one can compute a 1 k by using a known algorithm to check whether these ideals are principal (such algorithms are implemented in SAGE [1]). Fix an integer k > 1 and factor it into primes as k = p e1 1 pen n. Suppose that a O K is an ideal such that N(a) = k, with unique factorization a = p f1 1 pfm m into prime ideals. Taking norms, we have p e1 1 pen n = k = N(p 1 ) f1 N(p m ) fm. (22) By unique factorization of integers, we see that every p appearing in the factorization of a divides some p appearing in the factorization of k. Suppose that p k and that p is inert in K, so that for p p we have N(p) = p 2. For a to exist, we must then have that p divides k an even number of times. If this condition holds, then p = (p) is obviously principal, hence it can be ignored in determining whether or not a is principal. Let us assume that all inert primes dividing k do so an even number of times. We now make a list of all possible ideals of O K which have norm k, by selecting from each split prime p si (counting multiplicities) one of the two prime ideals p si dividing it, and for each ramified prime p rj (counting multiplicities), the unique prime ideal p rj dividing it. We then compute whether or not the ideal p s1 p sn p r1 p rm is principal. The total number of principal ideals we obtain this way is a 1 k. Example 3 Let K = Q( 229), and let k = 225 = In K the ideals (3) and (5) both split, and we have factorizations ( ) ( ) (3) = p 3 q 3, p 3 = 3, (1 229)/2, q 3 = ( (5) = p 5 q 5, p 5 = 5, (7 ) 229)/2, q 5 = 3, ( )/2 ( 5, (7 + ) 229)/2 (23) (24)

8 8 David A. Karpuk, Member, IEEE et al. thus the list of all ideals of norm k is p 2 3p 2 5, p 3 q 3 p 2 5, q 2 3p 2 5, p 2 3p 5 q 5, p 3 q 3 p 5 q 5, q 2 3p 5 q 5, p 2 3q 2 5, p 3 q 3 q 2 5, q 2 3q 2 5. (25) Exactly three of these ideals are principal, so that a = 3. Specifically, p 2 3q 2 5 = (2 229), p 3 q 3 q 2 5 = ( ), p 3 q 3 p 5 q 5 = (15). (26) 7 Bounding the Error and Asymptotic Behavior In this section, we bound the absolute error of the estimate of the previous section, by providing a bound b k,r n k,r for all k. We then combine these estimates to provide a bound on S K,R (s) N K,R (s) independent of R. Proposition 3 We have the bound b k,r n k,r < 2a 1 k for all k and all R. Proof Let L k be the intersection of the line X + Y = log k and the image of the bounding box under the log transformation. Then we can find ε such that 0 < ε < vol(λ log ) and vol(l k ) (b k,r /2 a 1 k)vol(λ log ) + 2a 1 kε. (27) That is, L k can be written of a union of at most (b k,r a 1 k ) translates of the fundamental region of Λ log, and 2a 1 k smaller regions which appear at the boundary. Therefore n k,r = 2a 1 vol(l k ) k vol(λ log ) 2(b k,r/2 a 1 k )vol(λ log) + 2a 1 k ε vol(λ log ) (28) = b k,r 2a 1 k + 4a 1 kε/vol(λ log ) < b k,r + 2a 1 k (29) which implies that n k,r b k,r < 2a 1 k. Now, note that ( ) b k,r a 1 vol(lk ) k 2 vol(λ log ) + 1 = n k,r + a 1 2 k, (30) which one can see by counting how many lattice points can fit inside L k. Therefore b k,r n k,r < 2a 1 k, which implies that b k,r n k,r < 2a 1 k. Proposition 4 We have S K,R (s) N K,R (s) < 2ζ 1 K (s). Proof Using the previous proposition, we have R 2 R S K,R (s) N K,R (s) = b 2 k,r n k,r k s k s < 2 R 2 a 1 k k s < 2 R 2 b k,r n k,r k s (31) a 1 k k s = 2ζ1 K(s). (32)

9 Probability Bounds for Two-Dimensional Algebraic Lattice Codes 9 As the quantity ζk 1 (s) is independent of R, we see that S K,R (s) N K,R (s) S K,R (s) < 2ζ1 K (s) S K,R (s) 0 (33) as R. That is, the relative error of the approximation of [7] goes to zero as the size of the bounding box (i.e. constellation) increases. From the bounds b 1,R S K,R (s) b 1,R ζk 1 (s) one can conclude that S K,R (s) C ρ K log(r) + O(1) (34) as R, where C is an absolute constant, and the O(1) term depends only on K and s. In [14], it is shown that inverse determinant sums exhibit similar behavior, in that they are bounded above and below by terms of the form C log(r). However, we have made our constants explicit. 8 Experimental Results We now present examples to demonstrate the accuracy of the bounds b 1,R and b 1,R ζ 1 K (s), and the approximation N K,R(s) for s = 3 (the wiretap case), for the fields Q( 5), Q( 10), and Q( 229). As we have seen, the second and third fields both have the property that their rings of integers are not PIDs. K = Q( 5) : K = Q( 10) : K = Q( 229) : log(r) b 1,R S K,R (3) b 1,R ζk 1 (3) N K,R(3) log(r) b 1,R S K,R (3) b 1,R ζk 1 (3) N K,R(3) log(r) b 1,R S K,R (3) b 1,R ζk 1 (3) N K,R(3)

10 10 David A. Karpuk, Member, IEEE et al. If u O K and u ±1, then the four distinct elements ±u, ±σ(u) all have the same height. As the main contribution to the sum S K,R (s) comes from the group O K, this explains why the value of S K,R(s) jumps by approximately 4 as R increases. 9 Conclusions and Future Work We have provided probability bounds for the correct decision of an eavesdropper over a fast fading channel, when two-dimensional number field lattice codes are used. We have shown via experiment that these bounds outperform the previous estimate of [7]. Furthermore, we have generalized this approximation to arbitrary two-dimensional algebraic lattice codes, by providing an algorithm for calculating the number of principal ideals of a fixed norm. Lastly, we have provided asymptotic analysis of the estimate of the inverse norm sum presented in [7]. Future work will involve generalizing the calculation of a 1 k and providing analogous estimates for higher-dimensional totally real number fields. We also hope to generalize these results to fading MIMO wiretap channels, where a similar analysis of the group of units in a central simple algebra will be necessary. References 1. Sage open source mathematics software system. URL 2. Belfiore, J.C., Oggier, F.: Lattice code design for the rayleigh fading wiretap channel. In: ICC 2011 (2011). Arxiv.org/pdf/ Belfiore, J.C., Oggier, F.E.: Secrecy gain: A wiretap lattice code design. In: ISITA, pp (2010) 4. Belfiore, J.C., Solé, P.: Unimodular lattices for the gaussian wiretap channel. CoRR, abs/ , Everest, G., Loxton, J.: Counting algebraic units with bounded height. J. Number Theory 44, (1993) 6. Everest, G.R.: On the solution of the norm-form equation. Amer. J. Math. 114(3), (1992) 7. Hollanti, C., Viterbo, E., Karpuk, D.: Nonasymptotic Probability Bounds for Fading Channels Exploiting Dedekind Zeta Functions (2012). Submitted 8. Lang, S.: Algebraic number theory. Springer-Verlag New York Inc. (1986) 9. Leung-Yan-Cheong, S., Hellman, M.: The gaussian wire-tap channel. Information Theory, IEEE Transactions on 24(4), (1978). DOI /TIT Oggier, F., Solé, P., Belfiore, J.C.: Lattice codes for the wiretap gaussian channel: Construction and analysis Submitted to IEEE Trans. Inf. Theory, 2011, arxiv.org/abs/ Oggier, F., Viterbo, E.: Algebraic number theory and code design for rayleigh fading channels. Commun. Inf. Theory 1(3), (2004). DOI Vehkalahti, R., Lu, H.F.F.: An algebraic look into MAC-DMT of lattice space-time codes. In: Proc. IEEE ISIT Vehkalahti, R., Lu, H.F.F.: Diversity-multiplexing gain tradeoff: a tool in algebra? In: IEEE ITW (2011) 14. Vehkalahti, R., Lu, H.F.F.: Inverse determinant sums and connections between fading channel information theory and algebra. IEEE Trans. Inf. Theory (2011). Submitted

11 Probability Bounds for Two-Dimensional Algebraic Lattice Codes Vehkalahti, R., Luzzi, L.: Connecting dmt of division algebra space-time codes and point counting in lie groups. In: Proc. IEEE ISIT 2011 (2012) 16. Wyner, A.: The wire-tap channel. Bell. Syst. Tech. Journal 54 (1975)

Probability Bounds for Two-Dimensional Algebraic Lattice Codes

Probability Bounds for Two-Dimensional Algebraic Lattice Codes Probability Bounds for Two-Dimensional Algebraic Lattice Codes David Karpuk Aalto University April 16, 2013 (Joint work with C. Hollanti and E. Viterbo) David Karpuk (Aalto University) Probability Bounds

More information

FULL rate and full diversity codes for the coherent

FULL rate and full diversity codes for the coherent 1432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 4, APRIL 2005 The Golden Code: A 2 2 Full-Rate Space Time Code With Nonvanishing Determinants Jean-Claude Belfiore, Member, IEEE, Ghaya Rekaya,

More information

Lattices for Communication Engineers

Lattices for Communication Engineers Lattices for Communication Engineers Jean-Claude Belfiore Télécom ParisTech CNRS, LTCI UMR 5141 February, 22 2011 Nanyang Technological University - SPMS Part I Introduction Signal Space The transmission

More information

Lattices and Lattice Codes

Lattices and Lattice Codes Lattices and Lattice Codes Trivandrum School on Communication, Coding & Networking January 27 30, 2017 Lakshmi Prasad Natarajan Dept. of Electrical Engineering Indian Institute of Technology Hyderabad

More information

On the Robustness of Algebraic STBCs to Coefficient Quantization

On the Robustness of Algebraic STBCs to Coefficient Quantization 212 Australian Communications Theory Workshop (AusCTW) On the Robustness of Algebraic STBCs to Coefficient Quantization J. Harshan Dept. of Electrical and Computer Systems Engg., Monash University Clayton,

More information

Construction of Barnes-Wall Lattices from Linear Codes over Rings

Construction of Barnes-Wall Lattices from Linear Codes over Rings 01 IEEE International Symposium on Information Theory Proceedings Construction of Barnes-Wall Lattices from Linear Codes over Rings J Harshan Dept of ECSE, Monh University Clayton, Australia Email:harshanjagadeesh@monhedu

More information

Fuchsian codes with arbitrary rates. Iván Blanco Chacón, Aalto University

Fuchsian codes with arbitrary rates. Iván Blanco Chacón, Aalto University 20-09-2013 Summary Basic concepts in wireless channels Arithmetic Fuchsian groups: the rational case Arithmetic Fuchsian groups: the general case Fundamental domains and point reduction Fuchsian codes

More information

Algebraic Methods for Wireless Coding

Algebraic Methods for Wireless Coding Algebraic Methods for Wireless Coding Frédérique Oggier frederique@systems.caltech.edu California Institute of Technology UC Davis, Mathematics Department, January 31st 2007 Outline The Rayleigh fading

More information

Applications of Lattices in Telecommunications

Applications of Lattices in Telecommunications Applications of Lattices in Telecommunications Dept of Electrical and Computer Systems Engineering Monash University amin.sakzad@monash.edu Oct. 2013 1 Sphere Decoder Algorithm Rotated Signal Constellations

More information

On the Performance of. Golden Space-Time Trellis Coded Modulation over MIMO Block Fading Channels

On the Performance of. Golden Space-Time Trellis Coded Modulation over MIMO Block Fading Channels On the Performance of 1 Golden Space-Time Trellis Coded Modulation over MIMO Block Fading Channels arxiv:0711.1295v1 [cs.it] 8 Nov 2007 Emanuele Viterbo and Yi Hong Abstract The Golden space-time trellis

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

Error control of line codes generated by finite Coxeter groups

Error control of line codes generated by finite Coxeter groups Error control of line codes generated by finite Coxeter groups Ezio Biglieri Universitat Pompeu Fabra, Barcelona, Spain Email: e.biglieri@ieee.org Emanuele Viterbo Monash University, Melbourne, Australia

More information

On the Use of Division Algebras for Wireless Communication

On the Use of Division Algebras for Wireless Communication On the Use of Division Algebras for Wireless Communication frederique@systems.caltech.edu California Institute of Technology AMS meeting, Davidson, March 3rd 2007 Outline A few wireless coding problems

More information

Inverse Determinant Sums and Connections. Between Fading Channel Information Theory and Algebra

Inverse Determinant Sums and Connections. Between Fading Channel Information Theory and Algebra Inverse Determinant Sums and Connections Between Fading Channel Information Theory and Algebra Roope Vehkalahti, Hsiao-feng (Francis) Lu, Member, IEEE, Laura Luzzi, Member, IEEE arxiv:.6289v4 [cs.it] 0

More information

Algebraic Multiuser Space Time Block Codes for 2 2 MIMO

Algebraic Multiuser Space Time Block Codes for 2 2 MIMO Algebraic Multiuser Space Time Bloc Codes for 2 2 MIMO Yi Hong Institute of Advanced Telecom. University of Wales, Swansea, UK y.hong@swansea.ac.u Emanuele Viterbo DEIS - Università della Calabria via

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title A family of fast-decodable MIDO codes from crossedproduct algebras over Authors Luzzi, Laura; Oggier,

More information

AN INTRODUCTION TO SECRECY CAPACITY. 1. Overview

AN INTRODUCTION TO SECRECY CAPACITY. 1. Overview AN INTRODUCTION TO SECRECY CAPACITY BRIAN DUNN. Overview This paper introduces the reader to several information theoretic aspects of covert communications. In particular, it discusses fundamental limits

More information

On the diversity of the Naive Lattice Decoder

On the diversity of the Naive Lattice Decoder On the diversity of the Naive Lattice Decoder Asma Mejri, Laura Luzzi, Ghaya Rekaya-Ben Othman To cite this version: Asma Mejri, Laura Luzzi, Ghaya Rekaya-Ben Othman. On the diversity of the Naive Lattice

More information

Construction of MIMO MAC Codes Achieving the Pigeon Hole Bound

Construction of MIMO MAC Codes Achieving the Pigeon Hole Bound Construction of MIMO MAC Codes Achieving the Pigeon Hole Bound Toni Ernvall and Roope Vehkalahti Turku Center for Computer Science and Department of Mathematics, University of Turku, Finland e-mails: {tmernv,

More information

Soft Covering with High Probability

Soft Covering with High Probability Soft Covering with High Probability Paul Cuff Princeton University arxiv:605.06396v [cs.it] 20 May 206 Abstract Wyner s soft-covering lemma is the central analysis step for achievability proofs of information

More information

Achieving the Full MIMO Diversity-Multiplexing Frontier with Rotation-Based Space-Time Codes

Achieving the Full MIMO Diversity-Multiplexing Frontier with Rotation-Based Space-Time Codes Achieving the Full MIMO Diversity-Multiplexing Frontier with Rotation-Based Space-Time Codes Huan Yao Lincoln Laboratory Massachusetts Institute of Technology Lexington, MA 02420 yaohuan@ll.mit.edu Gregory

More information

On the Secrecy Capacity of Fading Channels

On the Secrecy Capacity of Fading Channels On the Secrecy Capacity of Fading Channels arxiv:cs/63v [cs.it] 7 Oct 26 Praveen Kumar Gopala, Lifeng Lai and Hesham El Gamal Department of Electrical and Computer Engineering The Ohio State University

More information

Phase Precoded Compute-and-Forward with Partial Feedback

Phase Precoded Compute-and-Forward with Partial Feedback Phase Precoded Compute-and-Forward with Partial Feedback Amin Sakzad, Emanuele Viterbo Dept. Elec. & Comp. Sys. Monash University, Australia amin.sakzad,emanuele.viterbo@monash.edu Joseph Boutros, Dept.

More information

FORMAL GROUPS OF CERTAIN Q-CURVES OVER QUADRATIC FIELDS

FORMAL GROUPS OF CERTAIN Q-CURVES OVER QUADRATIC FIELDS Sairaiji, F. Osaka J. Math. 39 (00), 3 43 FORMAL GROUPS OF CERTAIN Q-CURVES OVER QUADRATIC FIELDS FUMIO SAIRAIJI (Received March 4, 000) 1. Introduction Let be an elliptic curve over Q. We denote by ˆ

More information

arxiv: v1 [cs.it] 11 Apr 2017

arxiv: v1 [cs.it] 11 Apr 2017 Noname manuscript No. (will be inserted by the editor) Enhancement of Physical Layer Security Using Destination Artificial Noise Based on Outage Probability Ali Rahmanpour Vahid T. Vakili S. Mohammad Razavizadeh

More information

Some algebraic number theory and the reciprocity map

Some algebraic number theory and the reciprocity map Some algebraic number theory and the reciprocity map Ervin Thiagalingam September 28, 2015 Motivation In Weinstein s paper, the main problem is to find a rule (reciprocity law) for when an irreducible

More information

Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel

Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Shahid Mehraj Shah and Vinod Sharma Department of Electrical Communication Engineering, Indian Institute of

More information

Understanding hard cases in the general class group algorithm

Understanding hard cases in the general class group algorithm Understanding hard cases in the general class group algorithm Makoto Suwama Supervisor: Dr. Steve Donnelly The University of Sydney February 2014 1 Introduction This report has studied the general class

More information

TOTALLY RAMIFIED PRIMES AND EISENSTEIN POLYNOMIALS. 1. Introduction

TOTALLY RAMIFIED PRIMES AND EISENSTEIN POLYNOMIALS. 1. Introduction TOTALLY RAMIFIED PRIMES AND EISENSTEIN POLYNOMIALS KEITH CONRAD A (monic) polynomial in Z[T ], 1. Introduction f(t ) = T n + c n 1 T n 1 + + c 1 T + c 0, is Eisenstein at a prime p when each coefficient

More information

Golden Space-Time Block Coded Modulation

Golden Space-Time Block Coded Modulation Golden Space-Time Block Coded Modulation Laura Luzzi Ghaya Rekaya-Ben Othman Jean-Claude Belfiore and Emanuele Viterbo Télécom ParisTech- École Nationale Supérieure des Télécommunications 46 Rue Barrault

More information

Efficient Bounded Distance Decoders for Barnes-Wall Lattices

Efficient Bounded Distance Decoders for Barnes-Wall Lattices Efficient Bounded Distance Decoders for Barnes-Wall Lattices Daniele Micciancio Antonio Nicolosi April 30, 2008 Abstract We describe a new family of parallelizable bounded distance decoding algorithms

More information

(1) A frac = b : a, b A, b 0. We can define addition and multiplication of fractions as we normally would. a b + c d

(1) A frac = b : a, b A, b 0. We can define addition and multiplication of fractions as we normally would. a b + c d The Algebraic Method 0.1. Integral Domains. Emmy Noether and others quickly realized that the classical algebraic number theory of Dedekind could be abstracted completely. In particular, rings of integers

More information

MINKOWSKI THEORY AND THE CLASS NUMBER

MINKOWSKI THEORY AND THE CLASS NUMBER MINKOWSKI THEORY AND THE CLASS NUMBER BROOKE ULLERY Abstract. This paper gives a basic introduction to Minkowski Theory and the class group, leading up to a proof that the class number (the order of the

More information

Perfect Space Time Block Codes

Perfect Space Time Block Codes Perfect Space Time Block Codes Frédérique Oggier, Ghaya Rekaya, Student Member IEEE, Jean-Claude Belfiore, Member IEEE and Emanuele Viterbo, Member IEEE Abstract arxiv:cs/0604093v1 [cs.it] 24 Apr 2006

More information

On the Secrecy Capacity of the Z-Interference Channel

On the Secrecy Capacity of the Z-Interference Channel On the Secrecy Capacity of the Z-Interference Channel Ronit Bustin Tel Aviv University Email: ronitbustin@post.tau.ac.il Mojtaba Vaezi Princeton University Email: mvaezi@princeton.edu Rafael F. Schaefer

More information

These warmup exercises do not need to be written up or turned in.

These warmup exercises do not need to be written up or turned in. 18.785 Number Theory Fall 2017 Problem Set #3 Description These problems are related to the material in Lectures 5 7. Your solutions should be written up in latex and submitted as a pdf-file via e-mail

More information

15 Dirichlet s unit theorem

15 Dirichlet s unit theorem 18.785 Number theory I Fall 2017 Lecture #15 10/30/2017 15 Dirichlet s unit theorem Let K be a number field. The two main theorems of classical algebraic number theory are: The class group cl O K is finite.

More information

Cover Page. The handle holds various files of this Leiden University dissertation.

Cover Page. The handle   holds various files of this Leiden University dissertation. Cover Page The handle http://hdl.handle.net/1887/20310 holds various files of this Leiden University dissertation. Author: Jansen, Bas Title: Mersenne primes and class field theory Date: 2012-12-18 Chapter

More information

DISCRETE SUBGROUPS, LATTICES, AND UNITS.

DISCRETE SUBGROUPS, LATTICES, AND UNITS. DISCRETE SUBGROUPS, LATTICES, AND UNITS. IAN KIMING 1. Discrete subgroups of real vector spaces and lattices. Definitions: A lattice in a real vector space V of dimension d is a subgroup of form: Zv 1

More information

Lemma 1.1. The field K embeds as a subfield of Q(ζ D ).

Lemma 1.1. The field K embeds as a subfield of Q(ζ D ). Math 248A. Quadratic characters associated to quadratic fields The aim of this handout is to describe the quadratic Dirichlet character naturally associated to a quadratic field, and to express it in terms

More information

Precoded Integer-Forcing Universally Achieves the MIMO Capacity to Within a Constant Gap

Precoded Integer-Forcing Universally Achieves the MIMO Capacity to Within a Constant Gap Precoded Integer-Forcing Universally Achieves the MIMO Capacity to Within a Constant Gap Or Ordentlich Dept EE-Systems, TAU Tel Aviv, Israel Email: ordent@engtauacil Uri Erez Dept EE-Systems, TAU Tel Aviv,

More information

RINGS: SUMMARY OF MATERIAL

RINGS: SUMMARY OF MATERIAL RINGS: SUMMARY OF MATERIAL BRIAN OSSERMAN This is a summary of terms used and main results proved in the subject of rings, from Chapters 11-13 of Artin. Definitions not included here may be considered

More information

Secret Key Agreement Using Asymmetry in Channel State Knowledge

Secret Key Agreement Using Asymmetry in Channel State Knowledge Secret Key Agreement Using Asymmetry in Channel State Knowledge Ashish Khisti Deutsche Telekom Inc. R&D Lab USA Los Altos, CA, 94040 Email: ashish.khisti@telekom.com Suhas Diggavi LICOS, EFL Lausanne,

More information

Lecture 7 MIMO Communica2ons

Lecture 7 MIMO Communica2ons Wireless Communications Lecture 7 MIMO Communica2ons Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 1 Outline MIMO Communications (Chapter 10

More information

Math 259: Introduction to Analytic Number Theory How small can disc(k) be for a number field K of degree n = r 1 + 2r 2?

Math 259: Introduction to Analytic Number Theory How small can disc(k) be for a number field K of degree n = r 1 + 2r 2? Math 59: Introduction to Analytic Number Theory How small can disck be for a number field K of degree n = r + r? Let K be a number field of degree n = r + r, where as usual r and r are respectively the

More information

A BRIEF INTRODUCTION TO LOCAL FIELDS

A BRIEF INTRODUCTION TO LOCAL FIELDS A BRIEF INTRODUCTION TO LOCAL FIELDS TOM WESTON The purpose of these notes is to give a survey of the basic Galois theory of local fields and number fields. We cover much of the same material as [2, Chapters

More information

On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise

On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise Ya-Lan Liang, Yung-Shun Wang, Tsung-Hui Chang, Y.-W. Peter Hong, and Chong-Yung Chi Institute of Communications

More information

Algebraic number theory

Algebraic number theory Algebraic number theory F.Beukers February 2011 1 Algebraic Number Theory, a crash course 1.1 Number fields Let K be a field which contains Q. Then K is a Q-vector space. We call K a number field if dim

More information

PERFECTLY secure key agreement has been studied recently

PERFECTLY secure key agreement has been studied recently IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 2, MARCH 1999 499 Unconditionally Secure Key Agreement the Intrinsic Conditional Information Ueli M. Maurer, Senior Member, IEEE, Stefan Wolf Abstract

More information

Number Theory Fall 2016 Problem Set #6

Number Theory Fall 2016 Problem Set #6 18.785 Number Theory Fall 2016 Problem Set #6 Description These problems are related to the material covered in Lectures 10-12. Your solutions are to be written up in latex (you can use the latex source

More information

4184 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER Pranav Dayal, Member, IEEE, and Mahesh K. Varanasi, Senior Member, IEEE

4184 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER Pranav Dayal, Member, IEEE, and Mahesh K. Varanasi, Senior Member, IEEE 4184 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER 2005 An Algebraic Family of Complex Lattices for Fading Channels With Application to Space Time Codes Pranav Dayal, Member, IEEE,

More information

Secrecy Outage Performance of Cooperative Relay Network With Diversity Combining

Secrecy Outage Performance of Cooperative Relay Network With Diversity Combining Secrecy Outage erformance of Cooperative Relay Network With Diversity Combining Khyati Chopra Dept. of lectrical ngineering Indian Institute of Technology, Delhi New Delhi-110016, India mail: eez148071@ee.iitd.ac.in

More information

Number Theory Fall 2016 Problem Set #3

Number Theory Fall 2016 Problem Set #3 18.785 Number Theory Fall 2016 Problem Set #3 Description These problems are related to the material covered in Lectures 5-7. Your solutions are to be written up in latex and submitted as a pdf-file via

More information

GALOIS GROUPS AS PERMUTATION GROUPS

GALOIS GROUPS AS PERMUTATION GROUPS GALOIS GROUPS AS PERMUTATION GROUPS KEITH CONRAD 1. Introduction A Galois group is a group of field automorphisms under composition. By looking at the effect of a Galois group on field generators we can

More information

Upper Bounds on the Capacity of Binary Intermittent Communication

Upper Bounds on the Capacity of Binary Intermittent Communication Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,

More information

Spectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy

Spectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy Spectrum Leasing via Cooperation for Enhanced 1 Physical-Layer Secrecy Keonkook Lee, Member, IEEE, Chan-Byoung Chae, Senior Member, IEEE, Joonhyuk Kang, Member, IEEE arxiv:1205.0085v1 [cs.it] 1 May 2012

More information

Algebraic Number Theory

Algebraic Number Theory TIFR VSRP Programme Project Report Algebraic Number Theory Milind Hegde Under the guidance of Prof. Sandeep Varma July 4, 2015 A C K N O W L E D G M E N T S I would like to express my thanks to TIFR for

More information

Lecture 7.5: Euclidean domains and algebraic integers

Lecture 7.5: Euclidean domains and algebraic integers Lecture 7.5: Euclidean domains and algebraic integers Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4120, Modern Algebra M. Macauley

More information

Interference Alignment at Finite SNR for TI channels

Interference Alignment at Finite SNR for TI channels Interference Alignment at Finite SNR for Time-Invariant channels Or Ordentlich Joint work with Uri Erez EE-Systems, Tel Aviv University ITW 20, Paraty Background and previous work The 2-user Gaussian interference

More information

A Coding Strategy for Wireless Networks with no Channel Information

A Coding Strategy for Wireless Networks with no Channel Information A Coding Strategy for Wireless Networks with no Channel Information Frédérique Oggier and Babak Hassibi Abstract In this paper, we present a coding strategy for wireless relay networks, where we assume

More information

Secure Computation in a Bidirectional Relay

Secure Computation in a Bidirectional Relay Secure Computation in a Bidirectional Relay Navin Kashyap and Shashank V Dept. of Electrical Communication Engineering Indian Institute of Science, Bangalore, India Email: nkashyap,shashank}@ece.iisc.ernet.in

More information

Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT. ECE 559 Presentation Hoa Pham Dec 3, 2007

Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT. ECE 559 Presentation Hoa Pham Dec 3, 2007 Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT ECE 559 Presentation Hoa Pham Dec 3, 2007 Introduction MIMO systems provide two types of gains Diversity Gain: each path from a transmitter

More information

w d : Y 0 (N) Y 0 (N)

w d : Y 0 (N) Y 0 (N) Upper half-plane formulas We want to explain the derivation of formulas for two types of objects on the upper half plane: the Atkin- Lehner involutions and Heegner points Both of these are treated somewhat

More information

Chapter 14: Divisibility and factorization

Chapter 14: Divisibility and factorization Chapter 14: Divisibility and factorization Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4120, Summer I 2014 M. Macauley (Clemson) Chapter

More information

THE HALF-FACTORIAL PROPERTY IN INTEGRAL EXTENSIONS. Jim Coykendall Department of Mathematics North Dakota State University Fargo, ND.

THE HALF-FACTORIAL PROPERTY IN INTEGRAL EXTENSIONS. Jim Coykendall Department of Mathematics North Dakota State University Fargo, ND. THE HALF-FACTORIAL PROPERTY IN INTEGRAL EXTENSIONS Jim Coykendall Department of Mathematics North Dakota State University Fargo, ND. 58105-5075 ABSTRACT. In this paper, the integral closure of a half-factorial

More information

Information Hiding and Covert Communication

Information Hiding and Covert Communication Information Hiding and Covert Communication Andrew Ker adk @ comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory Foundations of Security Analysis and Design

More information

Reverse Edge Cut-Set Bounds for Secure Network Coding

Reverse Edge Cut-Set Bounds for Secure Network Coding Reverse Edge Cut-Set Bounds for Secure Network Coding Wentao Huang and Tracey Ho California Institute of Technology Michael Langberg University at Buffalo, SUNY Joerg Kliewer New Jersey Institute of Technology

More information

Leech Constellations of Construction-A Lattices

Leech Constellations of Construction-A Lattices Leech Constellations of Construction-A Lattices Joseph J. Boutros Talk at Nokia Bell Labs, Stuttgart Texas A&M University at Qatar In collaboration with Nicola di Pietro. March 7, 2017 Thanks Many Thanks

More information

Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems

Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User

More information

THE UNIT GROUP OF A REAL QUADRATIC FIELD

THE UNIT GROUP OF A REAL QUADRATIC FIELD THE UNIT GROUP OF A REAL QUADRATIC FIELD While the unit group of an imaginary quadratic field is very simple the unit group of a real quadratic field has nontrivial structure Its study involves some geometry

More information

2. The center of G, denoted by Z(G), is the abelian subgroup which commutes with every elements of G. The center always contains the unit element e.

2. The center of G, denoted by Z(G), is the abelian subgroup which commutes with every elements of G. The center always contains the unit element e. Chapter 2 Group Structure To be able to use groups in physics, or mathematics, we need to know what are the important features distinguishing one group from another. This is under the heading of group

More information

Diversity-Fidelity Tradeoff in Transmission of Analog Sources over MIMO Fading Channels

Diversity-Fidelity Tradeoff in Transmission of Analog Sources over MIMO Fading Channels Diversity-Fidelity Tradeo in Transmission o Analog Sources over MIMO Fading Channels Mahmoud Taherzadeh, Kamyar Moshksar and Amir K. Khandani Coding & Signal Transmission Laboratory www.cst.uwaterloo.ca

More information

Higher Ramification Groups

Higher Ramification Groups COLORADO STATE UNIVERSITY MATHEMATICS Higher Ramification Groups Dean Bisogno May 24, 2016 1 ABSTRACT Studying higher ramification groups immediately depends on some key ideas from valuation theory. With

More information

Implementation of Automatic Invertible Matrix Mechanism in NTRU Matrix Formulation Algorithm

Implementation of Automatic Invertible Matrix Mechanism in NTRU Matrix Formulation Algorithm Implementation of Automatic Invertible Matrix Mechanism in NTRU Matrix Formulation Algorithm Mohan Rao Mamdikar, Vinay Kumar & D. Ghosh National Institute of Technology, Durgapur E-mail : Mohanrao.mamdikar@gmail.com,

More information

ON 3-CLASS GROUPS OF CERTAIN PURE CUBIC FIELDS. Frank Gerth III

ON 3-CLASS GROUPS OF CERTAIN PURE CUBIC FIELDS. Frank Gerth III Bull. Austral. ath. Soc. Vol. 72 (2005) [471 476] 11r16, 11r29 ON 3-CLASS GROUPS OF CERTAIN PURE CUBIC FIELDS Frank Gerth III Recently Calegari and Emerton made a conjecture about the 3-class groups of

More information

Copyrighted Material. Type A Weyl Group Multiple Dirichlet Series

Copyrighted Material. Type A Weyl Group Multiple Dirichlet Series Chapter One Type A Weyl Group Multiple Dirichlet Series We begin by defining the basic shape of the class of Weyl group multiple Dirichlet series. To do so, we choose the following parameters. Φ, a reduced

More information

CODING schemes for overloaded synchronous Code Division

CODING schemes for overloaded synchronous Code Division IEEE TRANSACTIONS ON COMMUNICATIONS, VOL 60, NO, NOVEM 0 345 Transactions Letters Uniquely Decodable Codes with Fast Decoder for Overloaded Synchronous CDMA Systems Omid Mashayekhi, Student Member, IEEE,

More information

x mv = 1, v v M K IxI v = 1,

x mv = 1, v v M K IxI v = 1, 18.785 Number Theory I Fall 2017 Problem Set #7 Description These problems are related to the material covered in Lectures 13 15. Your solutions are to be written up in latex (you can use the latex source

More information

GALOIS GROUPS OF CUBICS AND QUARTICS (NOT IN CHARACTERISTIC 2)

GALOIS GROUPS OF CUBICS AND QUARTICS (NOT IN CHARACTERISTIC 2) GALOIS GROUPS OF CUBICS AND QUARTICS (NOT IN CHARACTERISTIC 2) KEITH CONRAD We will describe a procedure for figuring out the Galois groups of separable irreducible polynomials in degrees 3 and 4 over

More information

ARITHMETIC IN PURE CUBIC FIELDS AFTER DEDEKIND.

ARITHMETIC IN PURE CUBIC FIELDS AFTER DEDEKIND. ARITHMETIC IN PURE CUBIC FIELDS AFTER DEDEKIND. IAN KIMING We will study the rings of integers and the decomposition of primes in cubic number fields K of type K = Q( 3 d) where d Z. Cubic number fields

More information

Some Goodness Properties of LDA Lattices

Some Goodness Properties of LDA Lattices Some Goodness Properties of LDA Lattices Shashank Vatedka and Navin Kashyap {shashank,nkashyap}@eceiiscernetin Department of ECE Indian Institute of Science Bangalore, India Information Theory Workshop

More information

Improved Perfect Space-Time Block Codes

Improved Perfect Space-Time Block Codes Improved Perfect Space-Time Block Codes K. Pavan Srinath and B. Sundar Rajan, Senior Member, IEEE Dept of ECE, The Indian Institute of Science, Bangalore-500, India Email:pavan,bsrajan}@ece.iisc.ernet.in

More information

THE SPLITTING FIELD OF X 3 7 OVER Q

THE SPLITTING FIELD OF X 3 7 OVER Q THE SPLITTING FIELD OF X 3 7 OVER Q KEITH CONRAD In this note, we calculate all the basic invariants of the number field K = Q( 3 7, ω), where ω = ( 1 + 3)/2 is a primitive cube root of unity. Here is

More information

8. Prime Factorization and Primary Decompositions

8. Prime Factorization and Primary Decompositions 70 Andreas Gathmann 8. Prime Factorization and Primary Decompositions 13 When it comes to actual computations, Euclidean domains (or more generally principal ideal domains) are probably the nicest rings

More information

Maximum Achievable Diversity for MIMO-OFDM Systems with Arbitrary. Spatial Correlation

Maximum Achievable Diversity for MIMO-OFDM Systems with Arbitrary. Spatial Correlation Maximum Achievable Diversity for MIMO-OFDM Systems with Arbitrary Spatial Correlation Ahmed K Sadek, Weifeng Su, and K J Ray Liu Department of Electrical and Computer Engineering, and Institute for Systems

More information

Math 429/581 (Advanced) Group Theory. Summary of Definitions, Examples, and Theorems by Stefan Gille

Math 429/581 (Advanced) Group Theory. Summary of Definitions, Examples, and Theorems by Stefan Gille Math 429/581 (Advanced) Group Theory Summary of Definitions, Examples, and Theorems by Stefan Gille 1 2 0. Group Operations 0.1. Definition. Let G be a group and X a set. A (left) operation of G on X is

More information

Complex Reflection Group Coding

Complex Reflection Group Coding Complex Reflection Group Coding Hye Jung Kim Thesis Committee: Dr. J.B. Nation, Adviser Dr. Ralph Freese Graduate Committee: Dr. Michelle Manes Dr. Monique Chyba Dr. Robert Little 1 Acknowledgements I

More information

THE DIFFERENT IDEAL. Then R n = V V, V = V, and V 1 V 2 V KEITH CONRAD 2 V

THE DIFFERENT IDEAL. Then R n = V V, V = V, and V 1 V 2 V KEITH CONRAD 2 V THE DIFFERENT IDEAL KEITH CONRAD. Introduction The discriminant of a number field K tells us which primes p in Z ramify in O K : the prime factors of the discriminant. However, the way we have seen how

More information

On Source-Channel Communication in Networks

On Source-Channel Communication in Networks On Source-Channel Communication in Networks Michael Gastpar Department of EECS University of California, Berkeley gastpar@eecs.berkeley.edu DIMACS: March 17, 2003. Outline 1. Source-Channel Communication

More information

Homework 4 Solutions

Homework 4 Solutions Homework 4 Solutions November 11, 2016 You were asked to do problems 3,4,7,9,10 in Chapter 7 of Lang. Problem 3. Let A be an integral domain, integrally closed in its field of fractions K. Let L be a finite

More information

FACTORIZATION OF IDEALS

FACTORIZATION OF IDEALS FACTORIZATION OF IDEALS 1. General strategy Recall the statement of unique factorization of ideals in Dedekind domains: Theorem 1.1. Let A be a Dedekind domain and I a nonzero ideal of A. Then there are

More information

Quantization Index Modulation using the E 8 lattice

Quantization Index Modulation using the E 8 lattice 1 Quantization Index Modulation using the E 8 lattice Qian Zhang and Nigel Boston Dept of Electrical and Computer Engineering University of Wisconsin Madison 1415 Engineering Drive, Madison, WI 53706 Email:

More information

Optimal Power Allocation for Achieving Perfect Secrecy Capacity in MIMO Wire-Tap Channels

Optimal Power Allocation for Achieving Perfect Secrecy Capacity in MIMO Wire-Tap Channels Optimal Power Allocation for Achieving Perfect Secrecy Capacity in MIMO Wire-Tap Channels Jia Liu, Y. Thomas Hou, and Hanif D. Sherali Bradley Department of Electrical and Computer Engineering Grado Department

More information

Timing errors in distributed space-time communications

Timing errors in distributed space-time communications Timing errors in distributed space-time communications Emanuele Viterbo Dipartimento di Elettronica Politecnico di Torino Torino, Italy viterbo@polito.it Yi Hong Institute for Telecom. Research University

More information

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable

More information

Norm-Euclidean Ideals in Galois Cubic Fields

Norm-Euclidean Ideals in Galois Cubic Fields Norm-Euclidean Ideals in Galois Cubic Fields Kelly Emmrich and Clark Lyons University of Wisconsin-La Crosse, University of California, Berkeley 2017 West Coast Number Theory Conference December 18, 2017

More information

Local corrections of discriminant bounds and small degree extensions of quadratic base fields

Local corrections of discriminant bounds and small degree extensions of quadratic base fields January 29, 27 21:58 WSPC/INSTRUCTION FILE main International Journal of Number Theory c World Scientific Publishing Company Local corrections of discriminant bounds and small degree extensions of quadratic

More information

Introduction to Arithmetic Geometry Fall 2013 Lecture #7 09/26/2013

Introduction to Arithmetic Geometry Fall 2013 Lecture #7 09/26/2013 18.782 Introduction to Arithmetic Geometry Fall 2013 Lecture #7 09/26/2013 In Lecture 6 we proved (most of) Ostrowski s theorem for number fields, and we saw the product formula for absolute values on

More information

ADVANCED TOPICS IN ALGEBRAIC GEOMETRY

ADVANCED TOPICS IN ALGEBRAIC GEOMETRY ADVANCED TOPICS IN ALGEBRAIC GEOMETRY DAVID WHITE Outline of talk: My goal is to introduce a few more advanced topics in algebraic geometry but not to go into too much detail. This will be a survey of

More information

NOTES Edited by Ed Scheinerman

NOTES Edited by Ed Scheinerman NOTES Edited by Ed Scheinerman Why is PSL(2, 7) = GL(3, 2)? Ezra Brown and Nicholas Loehr 1. INTRODUCTION. The groups of invertible matrices over finite fields are among the first groups we meet in a beginning

More information