Coding Theory, Information Theory and Cryptology : Proceedings of the EIDMA Winter Meeting, Veldhoven, December 19-21, 1994
Total Page:16
File Type:pdf, Size:1020Kb
Coding theory, information theory and cryptology : proceedings of the EIDMA winter meeting, Veldhoven, December 19-21, 1994 Citation for published version (APA): Tilborg, van, H. C. A., & Willems, F. M. J. (Eds.) (1994). Coding theory, information theory and cryptology : proceedings of the EIDMA winter meeting, Veldhoven, December 19-21, 1994. Euler Institute of Discrete Mathematics and its Applications. Document status and date: Published: 01/01/1994 Document Version: Publisher’s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please check the document version of this publication: • A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal. If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license above, please follow below link for the End User Agreement: www.tue.nl/taverne Take down policy If you believe that this document breaches copyright please contact us at: [email protected] providing details and we will investigate your claim. Download date: 29. Sep. 2021 PROCEEDINGS OF THE EIDMA Winter Meeting on Coding Theory, Information Theory and Cryptology Henk C.A. van Tilborg and Frans M.J. Willems (Eds.) Veldhoven, December 19-21, 1994 Euler Institute of Discrete Mathematics and its Applications Eindhoven University of Technology CIP-DATA KONINKLIJKE BIBLIOTHEEK, DEN HAAG Proceedings Proceedings of the EIDMA winter meeting on coding theory, information theory and cryptology, Veldhoven, December 19-21, 1994 / Henk C.A. van Tilborg and Frans M.J. Willems (eds.). - Eindhoven: Euler Institute of Discrete Mathematics and its Applications, Eindhoven University of Technology. - Ill., fig., tab. With ref. ISBN 90-75332-01-7 NUGI 811/832 Subject headings: coding theory / information theory / cryptology. Contents Preface .......... 4 CONVOLUTIONAL CODES AND METRICS List Decoding of Convolutional Codes A Tutorial. 5 Rolf J ohannesson Proof of the Completeness of Bi-infinite Convolutional Codes . 6 Emma Wittenmark, Zhe-xian Wan An Alternate Metric for Sequential Decoding . 7 Gerhard Kramer and Dirk J. Tempel A Comparision of Different Metrices for GMD Decoding. 8 Rainer Lucas MODULATION CODES I European Transmission Standards for Digital TV Broadcasting. 9 Paul G.M. de Bot Decoding of Concatenation of Outer Convolutional Code with Inner Orthogonal Code . 10 Thomas Frey Using Codes to Design CDMA Signal Sets ............. 11 Beat Keusch Modified Delay-Locked-Loop Structures for PN-Code Tracking. 12 Andreas Wilde On Binary DC-free Parity-Check Codes . 13 Volker Braun MODULATION CODES II New Optimum Distance Profile Trellis Codes ............ 14 Per Ljungberg On the Use of Concatenated Codes for 8-PSK Multilevel Coding 15 Joakim Persson On Viterbi decoding of High Rate Convolutional Codes on Partial Response Channels. 16 M. Fjelltveit and 0yvind Ytrehus Convolutional Codes for Precoded Partial-Response Channels: A Review ........ 17 Kjell J0rgen Hole and 0yvind Ytrehus MULTI-USER INFORMATION THEORY Probabilistic Dependence and Information Theory 18 James L. Massey Practical Save-up Strategies ............. 19 Phons Bloemen Further Results on the Non-Cooperative Binary Adder Channel 20 Suzanne Hjelm Communication Complexity of the Hamming Distance 21 Ulrich Tamm Constrained Sequences and Optimization 22 Thijs Veugen 1 SOURCE CODING Multiterminal Source Coding Challenges ...... 23 Toby Berger Elias Omega Code and Log-Star Function. ..... 24 R. Ahlswede, T. S. Han and K. Kobayashi Sporadic Information Sources . 25 Urs Loher Asymptotically Optimal Constructions for Covering Codes 26 Rene Struik The Context Tree Maximizing Method : Some Ideas .... 27 Paul A.J. Volf and Frans M.J. Willems SPECIAL CHANNELS Linear Codes for Error Detection on the Local Binomial Channel . .. 28 Torleiv Khwe Analysing the Computational Performance of Sequential Decoding for the Gilbert-Elliott Channel 29 Gunilla Bratt, Rolf Johannesson, Kamil Sh. Zigangirov Construction of Codes for Localized Errors Based on Ordinary Codes of Even Distance 30 Per Larsson On the Construction of Quasi-linear Synchronization Codes 31 A.J. van Wijngaarden COMBINED CODES Iterative Decoding of Block and Convolutional Codes 32 Joachim Hagenauer Simulation Results with the 'Turbo' Coding Scheme. 33 Jakob Dahl Andersen Interleaving Strategies for Product Codes ...... 34 Ralf Kotter and Jan Nilsson Additive Upper Bounds for Turbo-Codes with Perfect Interleaving 35 Yuri V. Svirid Methods for Computing Reliability Information in Concatenated Coding Schemes 36 Kristian Wahlgren CODING AND DECODING Decoding of the Quaternary Goethals Code 37 Tor Helleseth and P. Vijay Kumar Some Comments on the Theory of Bent Functions 38 Ernst M. Gabidulin The Correspondence between Projective Codes and 2-Weight Codes 39 A.E. Brouwer and M. van Eupen A Parallel Decoding Algorithm for First Order Reed-Muller Codes 40 P.W. Heijnen CRYPTOGRAPHY Minimal Vectors in Linear Codes and Sharing of Secrets . .. 41 Alexei Ashikhmin and Alexander Barg Broadcast Channels with Confidential Messages, with Tampering the Binary Symmetric Case 42 Marten van Dijk Secure Multiround Authentication Protocols. 43 Christian Gehrmann Success Probability of Partitioning Cryptanalysis. 44 Carlo Harpes A Parallel Permutation Multiplier Architecture. 45 Tamas Horvath, Spyros S. Magliveras and Tran van Trung 2 Secrecy Codes for Source Messages of Finite Length. 46 Thomas Johansson ALGEBRAIC GEOMETRY CODES Asymptotically Good Codes with Algebraic Curves 47 Ruud Pellikaan A Note on Implementing Sakata's Algorithm .... 48 Jan Aberg The Generalized Hamming Weights of Some Hyperelliptic Codes 49 Mario A. de Boer On Termination Criteria for Decoding Algorithms 50 Iwan M. Duursma " werk uiterUjk terugbezorger- 3 Preface By organizing the 1994 Winter Meeting on Coding Theory, Information Theory and Cryptology, the Euler Institute of Discrete Mathematics and its Applications continues a tradition that was started by Prof. Han Vinck who arranged winter meetings in 1991 and 1993 in Essen, Germany. Again the primary intention of the meeting is to give young researchers the opportunity to present their results in front of an audience of scientists from various countries. In addition to this, senior scientists are encouraged to present survey papers or to point at new directions in research. Last but not least, this meeting should provide an atmosphere that allows the participants to communicate with each other in an informal way. We hope that the third winter meeting will be just as successful as the previous meetings both from a scientific and personal perspective. At this point we would like to thank Mrs. Henny Houben who assisted in the organization and Phons Bloemen for his help in preparing these proceedings. The STIMULANS support for EIDMA from NWO made it possible to arrange this meeting. Henk van Tilborg and Frans Willems, Meeting organizers December, 1994. 4 List Decoding of Convolutional Codes - A Tutorial Rolf Johannesson Department ofInformation Theory, Lund University, P.O. Box 118, 8-221 00 Lund, Sweden. email: [email protected] A bstract In this tutorial, list (convolutional) de- errors, as long as e falls within the powers of the systematic coding is considered. It is shown that the error per encoder. formance depends on the early part of the distance In conclusion, using feed-forward systematic convolutional profile and on the number of survivors kept, and not encoders essentially solves the correct path loss problem with on the free distance or on the details of the code gener list decoders. Since both systematic and nonsystematic en ators. Particularly, the encoder may be feed-forward coders have the same error rate in the absence of correct path systematic without loss. Furthermore, it is shown loss, systematic encoders are clearly superiour to nonsystem that this kind of encoder solves the correct path loss atic ones. problem. Other kinds do not. Therefore only system 1 atic encoders should be used with list decoders • III. The List Minimum Weight Consider a list decoder with a fixed list size L. For every I. Introduction depth t ::;: 0, 1, ... and every received sequence L(O,tj E lF2 (l+t)c In Viterbi decoding we first choose a suitable code and then let pL(!:(O,tj) denote the largest radius of a sphere with center design the decoder in order to "squeeze all juice" out of the L[O,t] such that the number of codewords in the sphere is less chosen code. In sequential decoding we choose a code whose than or equal to L. The smallest such radius is of particular encoder memory is long enough to warrant essentially error significance: free decoding. For a list decoder with a given list size L the list minimum In list decoding (the M-algorithm) we first limit the re weight Wmin is sources of the decoder, then we choose an encoding matrix with a state space that is larger than the decoder state space. Wmin ::;: min min PL(L(O,tj)' Thus, assuming the same decoder complexity, we use a more t !.[o.tj powerful code with list decoding than with Viterbi decoding.