Skip to main content

Showing 1–8 of 8 results for author: İşcan, O

.
  1. arXiv:2002.11687  [pdf, ps, other

    cs.CR cs.IT eess.IV eess.SP math.PR

    Secure and Reliable Key Agreement with Physical Unclonable Functions

    Authors: Onur Günlü, Tasnad Kernetzky, Onurcan İşcan, Vladimir Sidorenko, Gerhard Kramer, Rafael F. Schaefer

    Abstract: Different transforms used in binding a secret key to correlated physical-identifier outputs are compared. Decorrelation efficiency is the metric used to determine transforms that give highly-uncorrelated outputs. Scalar quantizers are applied to transform outputs to extract uniformly distributed bit sequences to which secret keys are bound. A set of transforms that perform well in terms of the dec… ▽ More

    Submitted 27 February, 2020; v1 submitted 26 February, 2020; originally announced February 2020.

    Comments: An extra term in the last page due to the mismatch between the Arxiv compiler and MDPI template is eliminated. No other changes

    Journal ref: MDPI Entropy Journal 20 (2018) 340:1-340:19

  2. arXiv:1910.13240  [pdf, ps, other

    cs.IT

    Sign-Bit Sha** Using Polar Codes

    Authors: Onurcan İşcan, Ronald Böhnke, Wen Xu

    Abstract: A new polar coding scheme for higher order modulation is presented. The proposed scheme is based on multi-level coding (MLC) with natural labeling, where the bit-level corresponding to the sign-bit is generated in dependence on the previous bit-levels, such that the modulated symbols are distributed according to a target non-uniform distribution resulting in a sha** gain. This is realized by rep… ▽ More

    Submitted 29 October, 2019; originally announced October 2019.

  3. arXiv:1812.07864  [pdf, ps, other

    cs.IT

    Probabilistically Shaped Multi-Level Coding with Polar Codes for Fading Channels

    Authors: Onurcan İşcan, Ronald Böhnke, Wen Xu

    Abstract: A probabilistic sha** method for multi-level coding (MLC) is presented, where the transmitted symbols are forced to have a shaped non-uniform distribution. It is shown that sha** only a single bit-level suffices to compensate for most of the sha** loss on the fading channels. A polar code based implementation of the proposed scheme is presented, where sha** is performed by using a precoder… ▽ More

    Submitted 19 December, 2018; originally announced December 2018.

  4. arXiv:1808.09360  [pdf, ps, other

    cs.IT

    Polar Codes with Integrated Probabilistic Sha** for 5G New Radio

    Authors: Onurcan İşcan, Wen Xu

    Abstract: A modification to 5G New Radio (NR) polar code is proposed, which improves the error correction performance with higher order modulation through probabilistic sha**. The presented scheme mainly re-uses existing hardware at the transmitter, and modifications at the receiver are small. Simulation results show that the presented approach can improve the performance by up to 1dB for 256-QAM on AWGN… ▽ More

    Submitted 28 August, 2018; originally announced August 2018.

    Comments: This work is accepted for publication at IEEE 88th Vehicular Technology Conference (VTC 2018-Fall). Copyright IEEE 2018

  5. arXiv:1709.00275  [pdf, ps, other

    cs.IT cs.CR cs.MM eess.SP math.PR

    Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems

    Authors: Onur Günlü, Onurcan İşcan, Vladimir Sidorenko, Gerhard Kramer

    Abstract: The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random linear codes and achieves all points of the key-leakage-storage regions of the generated-secret and chosen-secret models. The second construction uses nested polar codes for vector quantization during… ▽ More

    Submitted 3 April, 2019; v1 submitted 1 September, 2017; originally announced September 2017.

    Comments: To appear in IEEE Transactions on Information Forensics and Security

  6. arXiv:1707.09753  [pdf, ps, other

    cs.IT

    Polar Code Construction for List Decoding

    Authors: Peihong Yuan, Tobias Prinz, Georg Böcherer, Onurcan İşcan, Ronald Böhnke, Wen Xu

    Abstract: A heuristic construction of polar codes for successive cancellation list (SCL) decoding with a given list size is proposed to balance the trade-off between performance measured in frame error rate (FER) and decoding complexity. Furthermore, a construction based on dynamically frozen bits with constraints among the "low weight bits" (LWB) is presented. Simulation results show that the LWB-polar cod… ▽ More

    Submitted 2 August, 2018; v1 submitted 31 July, 2017; originally announced July 2017.

    Comments: 6 pages

  7. arXiv:1402.0313  [pdf, other

    cs.IT

    Rate-Distortion Properties of Single-Layer Quantize-and-Forward for Two-Way Relaying

    Authors: Michael Heindlmaier, Onurcan Iscan

    Abstract: The Quantize & Forward (QF) scheme for two-way relaying is studied with a focus on its rate-distortion properties. A sum rate maximization problem is formulated and the associated quantizer optimization problem is investigated. An algorithm to approximately solve the problem is proposed. Under certain cases scalar quantizers maximize the sum rate.

    Submitted 3 February, 2014; originally announced February 2014.

    Comments: Extended version of submission to ISIT 2014

  8. arXiv:1301.6397  [pdf, ps, other

    cs.IT

    Scalar Quantize-and-Forward for Symmetric Half-duplex Two-Way Relay Channels

    Authors: Michael Heindlmaier, Onurcan Iscan, Christopher Rosanka

    Abstract: Scalar Quantize & Forward (QF) schemes are studied for the Two-Way Relay Channel. Different QF approaches are compared in terms of rates as well as relay and decoder complexity. A coding scheme not requiring Slepian-Wolf coding at the relay is proposed and properties of the corresponding sum-rate optimization problem are presented. A numerical scheme similar to the Blahut-Arimoto algorithm is deri… ▽ More

    Submitted 27 January, 2013; originally announced January 2013.

    Comments: Extended version of ISIT submission