A NACHRICHTENTECHNIK July 10, 2019 Carmen Sippel, Cornelia Ott, - - PowerPoint PPT Presentation

a
SMART_READER_LITE
LIVE PREVIEW

A NACHRICHTENTECHNIK July 10, 2019 Carmen Sippel, Cornelia Ott, - - PowerPoint PPT Presentation

Ulm University Institute of Communications Engineering ReedSolomon Codes over Fields of Characteristic Zero Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris A NACHRICHTENTECHNIK July 10, 2019 Carmen Sippel,


slide-1
SLIDE 1

Ulm University Institute of Communications Engineering

Reed–Solomon Codes

  • ver

Fields of Characteristic Zero

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert

ISIT 2019, Paris

A

NACHRICHTENTECHNIK

July 10, 2019

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 1

slide-2
SLIDE 2

Ulm University Institute of Communications Engineering

Motivation

A

NACHRICHTENTECHNIK

We know Reed–Solomon Codes over

Fq C

Elements are represented with a fixed number of bits Operations cost a constant number of bit operations Floating point operations are used Problem: Rounding errors Aim Reed–Solomon Codes over arbitrary fields with exact calculations during Encoding and Decoding.

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 2

slide-3
SLIDE 3

Ulm University Institute of Communications Engineering

Motivation

A

NACHRICHTENTECHNIK

We know Reed–Solomon Codes over

Fq C

Elements are represented with a fixed number of bits Operations cost a constant number of bit operations Floating point operations are used Problem: Rounding errors Aim Reed–Solomon Codes over arbitrary fields with exact calculations during Encoding and Decoding.

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 2

slide-4
SLIDE 4

Ulm University Institute of Communications Engineering

GRS Codes over arbitrary Fields

A

NACHRICHTENTECHNIK

Definition: Generalization of Definition 5.1.1 in [Rot06]

Let K be a field and k, n ∈ N such that k ≤ n. Choose α1, . . . , αn ∈ K\{0} to be distinct and v1, . . . , vn ∈ K \ {0}. We define the generalized Reed–Solomon Code CGRS ⊆ Kn with parity check matrix HVandermonde =      1 1 . . . 1 α1 α2 . . . αn . . . . . . . . . . . . αn−k−1

1

αn−k−1

2

. . . αn−k−1

n

          v1 v2 ... vn      .

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 3

slide-5
SLIDE 5

Ulm University Institute of Communications Engineering

GRS Codes over arbitrary Fields

A

NACHRICHTENTECHNIK

Generator Matrix

A generator matrix is of the form GVandermonde =      1 1 . . . 1 α1 α2 . . . αn . . . . . . . . . . . . αk−1

1

αk−1

2

. . . αk−1

n

          v′

1

v′

2

... v′

n

     , where the v′

i ∈ K \ {0}, given by the following linear system of

equations:

n

  • i=1

αr

i viv′ i = 0

∀ r = 0, . . . , n − 2 .

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 4

slide-6
SLIDE 6

Ulm University Institute of Communications Engineering

Coefficient Growth

A

NACHRICHTENTECHNIK

  • ver Fields of Characteristic Zero

If the underlying field is of characteristic zero the coefficients during Encoding and Decoding will grow. Example: Euclidean Algorithm f0, f1 ∈ F1789[x] g0, g1 ∈ Q[t] f0(x) = x10 − 3 f1(x) = 3x9 − 2 g0(t) = t10 − 3 g1(t) = 3t9 − 2

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 5

slide-7
SLIDE 7

Ulm University Institute of Communications Engineering

Coefficient Growth

A

NACHRICHTENTECHNIK

  • ver Fields of Characteristic Zero

Example: Euclidean Algorithm - Step 1 (x10 − 3)/(3x9 − 2) = 1193x Remainder: 597x + 1786 (t10 − 3)/(3t9 − 2) = 1 3t Remainder: 2 3t − 3

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 6

slide-8
SLIDE 8

Ulm University Institute of Communications Engineering

Coefficient Growth

A

NACHRICHTENTECHNIK

  • ver Fields of Characteristic Zero

Example: Euclidean Algorithm - Step 2 (3x9 − 2)/(597x + 1786) = 899x8 + 1362x7 + 762x6 + 1640x5 + 224x4 + 1008x3 + 958x2 + 733x + 615 Remainder: 54 (3t9 − 2)/(2 3t − 3) = 9 2t8 + 81 4 t7 + 729 8 t6 + 6561 16 t5 + 59049 32 t4 + 531441 64 t3 + 4782969 128 t2 + 43046721 256 t + 387420489 512 Remainder: 1162260443 512

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 7

slide-9
SLIDE 9

Ulm University Institute of Communications Engineering

Coefficient Growth

A

NACHRICHTENTECHNIK

  • ver Fields of Characteristic Zero

Example: Euclidean Algorithm - Step 3 (597x + 1786)/54 = 508x + 1292 Remainder: 0 (2 3t − 3)/1162260443 512 = 1024 3486781329t − 1536 1162260443 Remainder: 0 Question: Is it possible to derive bounds for the growth of the coefficients during Encoding and Decoding? → Solution with the help of already known results from computer algebra.

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 8

slide-10
SLIDE 10

Ulm University Institute of Communications Engineering

Coefficient Growth

A

NACHRICHTENTECHNIK

  • ver Fields of Characteristic Zero

Example: Euclidean Algorithm - Step 3 (597x + 1786)/54 = 508x + 1292 Remainder: 0 (2 3t − 3)/1162260443 512 = 1024 3486781329t − 1536 1162260443 Remainder: 0 Question: Is it possible to derive bounds for the growth of the coefficients during Encoding and Decoding? → Solution with the help of already known results from computer algebra.

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 8

slide-11
SLIDE 11

Ulm University Institute of Communications Engineering

Coefficient Growth

A

NACHRICHTENTECHNIK

  • ver Fields of Characteristic Zero

Example: Euclidean Algorithm - Step 3 (597x + 1786)/54 = 508x + 1292 Remainder: 0 (2 3t − 3)/1162260443 512 = 1024 3486781329t − 1536 1162260443 Remainder: 0 Question: Is it possible to derive bounds for the growth of the coefficients during Encoding and Decoding? → Solution with the help of already known results from computer algebra.

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 8

slide-12
SLIDE 12

Ulm University Institute of Communications Engineering

The bit width - a Measure of Coefficient GrowthA

NACHRICHTENTECHNIK

We define the bit width λ(a): (Generalization of [vzGG13] p. 142) a ∈ Z: λ(a) :=

  • ⌊log2(|a|)⌋ + 1,

if a = 0 0, if a = 0 a = b

c ∈ Q with b, c ∈ Z, c = 0, and gcd(b, c) = 1:

λ(a) := max{λ(b), λ(c)}. a(x) = r

i=0 ai b · xi ∈ Q[x] with ai ∈ Z and b ∈ N \ {0} such

that gcd(a0, . . . , ar, b) = 1: λ(a(x)) := max{λ(a0), . . . , λ(ar), λ(b)}. NEW: A = (aij) ∈ Qk×r: λ(A) = max{λ(aij) : i = 1, . . . , k and j = 1, . . . , r}.

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 9

slide-13
SLIDE 13

Ulm University Institute of Communications Engineering

The bit width - a Measure of Coefficient GrowthA

NACHRICHTENTECHNIK

We define the bit width λ(a): (Generalization of [vzGG13] p. 142) a ∈ Z: λ(a) :=

  • ⌊log2(|a|)⌋ + 1,

if a = 0 0, if a = 0 a = b

c ∈ Q with b, c ∈ Z, c = 0, and gcd(b, c) = 1:

λ(a) := max{λ(b), λ(c)}. a(x) = r

i=0 ai b · xi ∈ Q[x] with ai ∈ Z and b ∈ N \ {0} such

that gcd(a0, . . . , ar, b) = 1: λ(a(x)) := max{λ(a0), . . . , λ(ar), λ(b)}. NEW: A = (aij) ∈ Qk×r: λ(A) = max{λ(aij) : i = 1, . . . , k and j = 1, . . . , r}.

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 9

slide-14
SLIDE 14

Ulm University Institute of Communications Engineering

The bit width - a Measure of Coefficient GrowthA

NACHRICHTENTECHNIK

We define the bit width λ(a): (Generalization of [vzGG13] p. 142) a ∈ Z: λ(a) :=

  • ⌊log2(|a|)⌋ + 1,

if a = 0 0, if a = 0 a = b

c ∈ Q with b, c ∈ Z, c = 0, and gcd(b, c) = 1:

λ(a) := max{λ(b), λ(c)}. a(x) = r

i=0 ai b · xi ∈ Q[x] with ai ∈ Z and b ∈ N \ {0} such

that gcd(a0, . . . , ar, b) = 1: λ(a(x)) := max{λ(a0), . . . , λ(ar), λ(b)}. NEW: A = (aij) ∈ Qk×r: λ(A) = max{λ(aij) : i = 1, . . . , k and j = 1, . . . , r}.

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 9

slide-15
SLIDE 15

Ulm University Institute of Communications Engineering

The bit width - a Measure of Coefficient GrowthA

NACHRICHTENTECHNIK

We define the bit width λ(a): (Generalization of [vzGG13] p. 142) a ∈ Z: λ(a) :=

  • ⌊log2(|a|)⌋ + 1,

if a = 0 0, if a = 0 a = b

c ∈ Q with b, c ∈ Z, c = 0, and gcd(b, c) = 1:

λ(a) := max{λ(b), λ(c)}. a(x) = r

i=0 ai b · xi ∈ Q[x] with ai ∈ Z and b ∈ N \ {0} such

that gcd(a0, . . . , ar, b) = 1: λ(a(x)) := max{λ(a0), . . . , λ(ar), λ(b)}. NEW: A = (aij) ∈ Qk×r: λ(A) = max{λ(aij) : i = 1, . . . , k and j = 1, . . . , r}.

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 9

slide-16
SLIDE 16

Ulm University Institute of Communications Engineering

The bit width - a Measure of Coefficient GrowthA

NACHRICHTENTECHNIK

Examples

(i) λ(127) = ⌊log2(|127|)⌋ + 1 = 7 (ii) λ( 3

64) = max{

λ(3)

  • ⌊log2(|3|)⌋+1

, λ(64)

⌊log2(|64|)⌋+1

} = max{1, 7} = 7 (iii) λ(2x3 + 2

5x2 + 1 8) = λ( 80x3+16x2+5 40

) = max{λ(80), λ(16), λ(5), λ(40)} = λ(80) = ⌊log2(|80|)⌋ + 1 = 7

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 10

slide-17
SLIDE 17

Ulm University Institute of Communications Engineering

The bit width - a Measure of Coefficient GrowthA

NACHRICHTENTECHNIK

Examples

(i) λ(127) = ⌊log2(|127|)⌋ + 1 = 7 (ii) λ( 3

64) = max{

λ(3)

  • ⌊log2(|3|)⌋+1

, λ(64)

⌊log2(|64|)⌋+1

} = max{1, 7} = 7 (iii) λ(2x3 + 2

5x2 + 1 8) = λ( 80x3+16x2+5 40

) = max{λ(80), λ(16), λ(5), λ(40)} = λ(80) = ⌊log2(|80|)⌋ + 1 = 7

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 10

slide-18
SLIDE 18

Ulm University Institute of Communications Engineering

The bit width - a Measure of Coefficient GrowthA

NACHRICHTENTECHNIK

Examples

(i) λ(127) = ⌊log2(|127|)⌋ + 1 = 7 (ii) λ( 3

64) = max{

λ(3)

  • ⌊log2(|3|)⌋+1

, λ(64)

⌊log2(|64|)⌋+1

} = max{1, 7} = 7 (iii) λ(2x3 + 2

5x2 + 1 8) = λ( 80x3+16x2+5 40

) = max{λ(80), λ(16), λ(5), λ(40)} = λ(80) = ⌊log2(|80|)⌋ + 1 = 7

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 10

slide-19
SLIDE 19

Ulm University Institute of Communications Engineering

Coefficient Growth in Encoding

A

NACHRICHTENTECHNIK

  • ver the Rational Numbers

Bound for the bit width of the codeword Let c be an RS codeword generated by encoding u ∈ Qk with generator matrix G ∈ Qk×n. Then λ(c) ≤ k(λ(u) + λ(G) + 1). Generator Matrix in systematic form [RS85, Theorem 1] CGRS has a systematic generator matrix of the form Gsys = (Ik×k | A), where A = cidj

ai−bj

  • is a Cauchy matrix with

ai, bj, ci, dj dependent on αi and v′

i

∀i = 1, . . . , k, j = 1, . . . , n − k.

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 11

slide-20
SLIDE 20

Ulm University Institute of Communications Engineering

Coefficient Growth in Encoding

A

NACHRICHTENTECHNIK

  • ver the Rational Numbers

Bound for the bit width of the codeword Let c be an RS codeword generated by encoding u ∈ Qk with generator matrix G ∈ Qk×n. Then λ(c) ≤ k(λ(u) + λ(G) + 1). Generator Matrix in systematic form [RS85, Theorem 1] CGRS has a systematic generator matrix of the form Gsys = (Ik×k | A), where A = cidj

ai−bj

  • is a Cauchy matrix with

ai, bj, ci, dj dependent on αi and v′

i

∀i = 1, . . . , k, j = 1, . . . , n − k.

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 11

slide-21
SLIDE 21

Ulm University Institute of Communications Engineering

Coefficient Growth in Encoding

A

NACHRICHTENTECHNIK

  • ver the Rational Numbers

Bound for the bit width of the codeword Let c be an RS codeword generated by encoding u ∈ Qk with generator matrix G ∈ Qk×n. Then λ(c) ≤ k(λ(u) + λ(G) + 1). Generator Matrix in systematic form [RS85, Theorem 1] CGRS has a systematic generator matrix of the form Gsys = (Ik×k | A), where A = cidj

ai−bj

  • is a Cauchy matrix with

ai, bj, ci, dj dependent on αi and v′

i

∀i = 1, . . . , k, j = 1, . . . , n − k. → λ(G) small

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 11

slide-22
SLIDE 22

Ulm University Institute of Communications Engineering

Coefficient Growth in Encoding

A

NACHRICHTENTECHNIK

  • ver the Rational Numbers

Bound for the bit width of the codeword Let c be an RS codeword generated by encoding u ∈ Qk with generator matrix G ∈ Qk×n. Then λ(c) ≤ k(λ(u) + λ(G) + 1). Generator Matrix in systematic form [RS85, Theorem 1] CGRS has a systematic generator matrix of the form Gsys = (Ik×k | A), where A = cidj

ai−bj

  • is a Cauchy matrix with

ai, bj, ci, dj dependent on αi and v′

i

∀i = 1, . . . , k, j = 1, . . . , n − k. → λ(G) small

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 11

slide-23
SLIDE 23

Ulm University Institute of Communications Engineering

Coefficient Growth in Encoding

A

NACHRICHTENTECHNIK

  • ver the Rational Numbers

Comparison of systematic and non-systematic Encoding For a special choice of v′ we get λ(Gsys) < λ(GVandermonde) Upper Bounds for the bit width of the Generatormatix λ(GVandermonde) λ(Gsys) general (k − 1)λ(α) + λ(v′) 2(2k − 1)λ(α) + 2λ(v′) +2k − 1 cidj = 1 (k − 1)(3λ(α) + 1) 2λ(α) + 1

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 12

slide-24
SLIDE 24

Ulm University Institute of Communications Engineering

Coefficient Growth in Encoding

A

NACHRICHTENTECHNIK

  • ver the Rational Numbers

1,000 2,000 3,000 4,000 0.5 1 1.5 ·104 n average bit width of c α = α1, GV, v′

i = 1

α = α1, Gsys, cidj = 1 α = α2, GV, v′

i = 1

α = α2, Gsys, cidj = 1

α1 := (1, 2, . . . , n) α2 := (−1, 1, − 1

2 , 1 2 , −2, 2, 1 3 , − 1 3 , 2 3 , . . . )

We chose 1000 information words

  • f

bit width 100. Rate: k = ⌊n/3⌋. λ(GVandermonde) λ(Gsys) general (k − 1)λ(α) + λ(v′) 2(2k − 1)λ(α) + 2λ(v′) +2k − 1 cidj = 1 (k − 1)(3λ(α) + 1) 2λ(α) + 1 Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 13

slide-25
SLIDE 25

Ulm University Institute of Communications Engineering

Coefficient Growth in Decoding

A

NACHRICHTENTECHNIK

  • ver the Rational Numbers (Generalization of [Rot06] Chapter 6)

Algorithm 1: Decoding Algorithm for GRS Codes over Q

Input: Received Word r = c + e, where c ∈ CGRS and wtH(e) ≤ ⌊ n−k

2 ⌋.

Output: Codeword c

1 s ← rH⊤

Vandermonde

2 S(x) ← d−2

i=0 sixi

3 ξ ← lcm(den(s0), . . . , den(sd−2)) 4 (rh, sh, th) ← EEA(ξ · xd−1, ξ · S(x), d−1

2 ) // implementation of

[vzGG13, Algorithm 6.57]

5 c ← 0th coefficient of th 6 (Λ(x), Ω(x)) ← c−1 · (th, rh

ξ )

7 Λ′(x) ←

i>0 iΛixi−1

8 ei ← − αi

vi Ω(α−1

i

) Λ′(α−1

i

) for i = 1, . . . , n

9 return c = r − e Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 14

slide-26
SLIDE 26

Ulm University Institute of Communications Engineering

Coefficient Growth in Decoding

A

NACHRICHTENTECHNIK

  • ver the Rational Numbers

Bit width of the Syndrome Let r = c + e be a received word, s = rH⊤

Vandermonde the

syndrome and τ = wtH(e). For the bit width of s we get the following bound: λ(s) ≤ τ(λ(e) + λ(HVandermonde) + 1).

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 15

slide-27
SLIDE 27

Ulm University Institute of Communications Engineering

Coefficient Growth in Decoding

A

NACHRICHTENTECHNIK

  • ver the Rational Numbers

Complexity of the Algorithm The complexity in bit operations is O∼ d7 λ(e) + λ(HGRS) 2 + n4[λ(c) + λ(e) + λ(HGRS)]

  • .

If the error e has bit width at most t, codeword c at most t′ and α is chosen choosen such that λ(α) ∈ O(log(n)) (e.g., α1 or α2) then Algorithm 1 can be implemented in O∼ max{n7t2, n9, n4t′}

  • bit operations.

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 16

slide-28
SLIDE 28

Ulm University Institute of Communications Engineering

Coefficient Growth in Decoding

A

NACHRICHTENTECHNIK

  • ver the Rational Numbers

Complexity of the Algorithm The complexity in bit operations is O∼ d7 λ(e) + λ(HGRS) 2 + n4[λ(c) + λ(e) + λ(HGRS)]

  • .

If the error e has bit width at most t, codeword c at most t′ and α is chosen choosen such that λ(α) ∈ O(log(n)) (e.g., α1 or α2) then Algorithm 1 can be implemented in O∼ max{n7t2, n9, n4t′}

  • bit operations.

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 16

slide-29
SLIDE 29

Ulm University Institute of Communications Engineering

Coefficient Growth in Decoding

A

NACHRICHTENTECHNIK

Comparison of the maximum bit width λmax for Decoding using different Variants of the EEA

20 25 30 35 40 45 50 100 200 300 400 500 600 code length n maximum bit width λmax Algorithm 1 implementation with usual EEA

We chose λ(e) = 40, d = 11 For each point 100 simulations were carried out Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 17

slide-30
SLIDE 30

Ulm University Institute of Communications Engineering

Coefficient Growth in Decoding

A

NACHRICHTENTECHNIK

Comparison of the maximum bit width λmax for Decoding using different Variants of the EEA

4 6 8 10 12 14 16 18 20 22 200 400 600 800 1,000 minimum distance d maximum bit width λmax Algorithm 1 implementation with usual EEA

We chose λ(e) = 40 and n = 40 For each point 100 simulations were carried out Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 18

slide-31
SLIDE 31

Ulm University Institute of Communications Engineering

Conclusion

A

NACHRICHTENTECHNIK

Properties of Reed–Solomon Codes over Fq also hold over arbitrary fields Over Q there exist bounds for the coefficient growth during encoding Over Q decoding up to half-the-minimum distance is possible in a polynomial number of bit operations

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 19

slide-32
SLIDE 32

Ulm University Institute of Communications Engineering

Conclusion

A

NACHRICHTENTECHNIK

Properties of Reed–Solomon Codes over Fq also hold over arbitrary fields Over Q there exist bounds for the coefficient growth during encoding Over Q decoding up to half-the-minimum distance is possible in a polynomial number of bit operations

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 19

slide-33
SLIDE 33

Ulm University Institute of Communications Engineering

Conclusion

A

NACHRICHTENTECHNIK

Properties of Reed–Solomon Codes over Fq also hold over arbitrary fields Over Q there exist bounds for the coefficient growth during encoding Over Q decoding up to half-the-minimum distance is possible in a polynomial number of bit operations

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 19

slide-34
SLIDE 34

Ulm University Institute of Communications Engineering

Future Work

A

NACHRICHTENTECHNIK

Extension of the results to more classes of number fields, for instance Q[i]. Consider other decoding algorithms, e.g. Berlekamp-Welch, Berlekamp-Massey or list decoding approaches Reduction of the computation modulo a prime by decomposing the number field into prime ideals such as in [ALR17] Determine the bit complexity of Decoding algorithms for Gabidulin codes over characteristic zero with the same methods.

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 20

slide-35
SLIDE 35

Ulm University Institute of Communications Engineering

Future Work

A

NACHRICHTENTECHNIK

Extension of the results to more classes of number fields, for instance Q[i]. Consider other decoding algorithms, e.g. Berlekamp-Welch, Berlekamp-Massey or list decoding approaches Reduction of the computation modulo a prime by decomposing the number field into prime ideals such as in [ALR17] Determine the bit complexity of Decoding algorithms for Gabidulin codes over characteristic zero with the same methods.

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 20

slide-36
SLIDE 36

Ulm University Institute of Communications Engineering

Future Work

A

NACHRICHTENTECHNIK

Extension of the results to more classes of number fields, for instance Q[i]. Consider other decoding algorithms, e.g. Berlekamp-Welch, Berlekamp-Massey or list decoding approaches Reduction of the computation modulo a prime by decomposing the number field into prime ideals such as in [ALR17] Determine the bit complexity of Decoding algorithms for Gabidulin codes over characteristic zero with the same methods.

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 20

slide-37
SLIDE 37

Ulm University Institute of Communications Engineering

Future Work

A

NACHRICHTENTECHNIK

Extension of the results to more classes of number fields, for instance Q[i]. Consider other decoding algorithms, e.g. Berlekamp-Welch, Berlekamp-Massey or list decoding approaches Reduction of the computation modulo a prime by decomposing the number field into prime ideals such as in [ALR17] Determine the bit complexity of Decoding algorithms for Gabidulin codes over characteristic zero with the same methods.

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 20

slide-38
SLIDE 38

Ulm University Institute of Communications Engineering

References

A

NACHRICHTENTECHNIK

[ALR17] Daniel Augot, Pierre Loidreau, and Gwezheneg Robert. Generalized Gabidulin Codes Over Fields of Any Characteristic.

  • Des. Codes Cryptogr., pages 1–42, 2017.

[Rot06] Ron M. Roth. Introduction to Coding Theory. Cambridge UP, 2006. [RS85] Ron M Roth and Gadiel Seroussi. On Generator Matrices of MDS Codes. IEEE Trans. Inf. Theory, 31(6):826–830, November 1985. [SOPB19] Carmen Sippel, Cornelia Ott, Sven Puchinger, and Martin Bossert. Reed–Solomon Codes over Fields of Characteristic Zero, 2019. Available at https://nt.uni-ulm.de/sippelottpuchrs2019extended. [vzGG13] Joachim von zur Gathen and J¨ urgen Gerhard. Modern Computer Algebra. Cambridge university press, 2013.

Carmen Sippel, Cornelia Ott, Sven Puchinger, Martin Bossert ISIT 2019, Paris 21