Skip to main content

Showing 1–15 of 15 results for author: Jerkovits, T

.
  1. arXiv:2404.10666  [pdf, ps, other

    cs.IT math.CO

    Bounds on Sphere Sizes in the Sum-Rank Metric and Coordinate-Additive Metrics

    Authors: Hugo Sauerbier Couvée, Thomas Jerkovits, Jessica Bariffi

    Abstract: This paper provides new bounds on the size of spheres in any coordinate-additive metric with a particular focus on improving existing bounds in the sum-rank metric. We derive improved upper and lower bounds based on the entropy of a distribution related to the Boltzmann distribution, which work for any coordinate-additive metric. Additionally, we derive new closed-form upper and lower bounds speci… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

  2. arXiv:2306.04359  [pdf, ps, other

    cs.IT

    Randomized Decoding of Linearized Reed-Solomon Codes Beyond the Unique Decoding Radius

    Authors: Thomas Jerkovits, Hannes Bartz, Antonia Wachter-Zeh

    Abstract: In this paper we address the problem of decoding linearized Reed-Solomon (LRS) codes beyond their unique decoding radius. We analyze the complexity in order to evaluate if the considered problem is of cryptographic relevance, i.e., can be used to design cryptosystems that are computationally hard to break. We show that our proposed algorithm improves over other generic algorithms that do not take… ▽ More

    Submitted 7 June, 2023; originally announced June 2023.

  3. On Decoding High-Order Interleaved Sum-Rank-Metric Codes

    Authors: Thomas Jerkovits, Felicitas Hörmann, Hannes Bartz

    Abstract: We consider decoding of vertically homogeneous interleaved sum-rank-metric codes with high interleaving order $s$, that are constructed by stacking $s$ codewords of a single constituent code. We propose a Metzner--Kapturowski-like decoding algorithm that can correct errors of sum-rank weight $t <= d-2$, where $d$ is the minimum distance of the code, if the interleaving order $s > t$ and the erro… ▽ More

    Submitted 30 March, 2023; originally announced March 2023.

    Journal ref: Code-Based Cryptography 10 (2022) 90-109

  4. arXiv:2207.01319  [pdf, ps, other

    cs.IT

    Fast Kötter-Nielsen-Høholdt Interpolation over Skew Polynomial Rings and its Application in Coding Theory

    Authors: Hannes Bartz, Thomas Jerkovits, Johan Rosenkilde

    Abstract: Skew polynomials are a class of non-commutative polynomials that have several applications in computer science, coding theory and cryptography. In particular, skew polynomials can be used to construct and decode evaluation codes in several metrics, like e.g. the Hamming, rank, sum-rank and skew metric. We propose a fast divide-and-conquer variant of Kötter-Nielsen-Høholdt (KNH) interpolation algor… ▽ More

    Submitted 4 July, 2022; originally announced July 2022.

    Comments: submitted to Designs, Codes and Cryptography

  5. arXiv:2202.09057  [pdf, ps, other

    cs.IT

    Fast Kötter-Nielsen-Høholdt Interpolation over Skew Polynomial Rings

    Authors: Hannes Bartz, Thomas Jerkovits

    Abstract: Skew polynomials are a class of non-commutative polynomials that have several applications in computer science, coding theory and cryptography. In particular, skew polynomials can be used to construct and decode evaluation codes in several metrics, like e.g. the Hamming, rank, sum-rank and skew metric. In this paper we propose a fast divide-and-conquer variant of the Kötter-Nielsen-Høholdt (KNH) i… ▽ More

    Submitted 18 February, 2022; originally announced February 2022.

    Comments: 6 pages, 1 figure, submitted to: 25th International Symposium on Mathematical Theory of Networks and Systems (MTNS)

  6. arXiv:2112.02198  [pdf, other

    cs.IT cs.CR

    Analysis of Communication Channels Related to Physical Unclonable Functions

    Authors: Georg Maringer, Marvin Xhemrishi, Sven Puchinger, Kathrin Garb, Hedongliang Liu, Thomas Jerkovits, Ludwig Kürzinger, Matthias Hiller, Antonia Wachter-Zeh

    Abstract: Cryptographic algorithms rely on the secrecy of their corresponding keys. On embedded systems with standard CMOS chips, where secure permanent memory such as flash is not available as a key storage, the secret key can be derived from Physical Unclonable Functions (PUFs) that make use of minuscule manufacturing variations of, for instance, SRAM cells. Since PUFs are affected by environmental change… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

  7. arXiv:2102.02554  [pdf, ps, other

    cs.IT

    Decoding of Space-Symmetric Rank Errors

    Authors: Thomas Jerkovits, Vladimir Sidorenko, Antonia Wachter-Zeh

    Abstract: This paper investigates the decoding of certain Gabidulin codes that were transmitted over a channel with space-symmetric errors. Space-symmetric errors are additive error matrices that have the property that their column and row spaces are equal. We show that for channels restricted to space-symmetric errors, with high probability errors of rank up to 2(n-k)/3 can be decoded with a Gabidulin code… ▽ More

    Submitted 4 February, 2021; originally announced February 2021.

  8. arXiv:2005.09916  [pdf, other

    cs.IT cs.SC

    Fast Decoding of Codes in the Rank, Subspace, and Sum-Rank Metric

    Authors: Hannes Bartz, Thomas Jerkovits, Sven Puchinger, Johan Rosenkilde

    Abstract: We speed up existing decoding algorithms for three code classes in different metrics: interleaved Gabidulin codes in the rank metric, lifted interleaved Gabidulin codes in the subspace metric, and linearized Reed-Solomon codes in the sum-rank metric. The speed-ups are achieved by new algorithms that reduce the cores of the underlying computational problems of the decoders to one common tool: compu… ▽ More

    Submitted 10 March, 2021; v1 submitted 20 May, 2020; originally announced May 2020.

    Comments: 26 pages, accepted for publication in IEEE Transactions on Information Theory

  9. arXiv:2004.13095  [pdf, other

    cs.IT cs.CR cs.MM

    Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage

    Authors: Thomas Jerkovits, Onur Günlü, Vladimir Sidorenko, Gerhard Kramer

    Abstract: A key agreement problem is considered that has a biometric or physical identifier, a terminal for key enrollment, and a terminal for reconstruction. A nested convolutional code design is proposed that performs vector quantization during enrollment and error control during reconstruction. Physical identifiers with small bit error probability illustrate the gains of the design. One variant of the ne… ▽ More

    Submitted 27 April, 2020; originally announced April 2020.

    Comments: To appear in ACM Workshop on Information Hiding and Multimedia Security 2020

  10. arXiv:1911.13193  [pdf, ps, other

    cs.IT cs.CR

    Randomized Decoding of Gabidulin Codes Beyond the Unique Decoding Radius

    Authors: Julian Renner, Thomas Jerkovits, Hannes Bartz, Sven Puchinger, Pierre Loidreau, Antonia Wachter-Zeh

    Abstract: We address the problem of decoding Gabidulin codes beyond their unique error-correction radius. The complexity of this problem is of importance to assess the security of some rank-metric code-based cryptosystems. We propose an approach that introduces row or column erasures to decrease the rank of the error in order to use any proper polynomial-time Gabidulin code error-erasure decoding algorithm.… ▽ More

    Submitted 10 February, 2020; v1 submitted 29 November, 2019; originally announced November 2019.

  11. arXiv:1908.10839  [pdf, ps, other

    cs.IT cs.CR

    Efficient Decoding of Interleaved Low-Rank Parity-Check Codes

    Authors: Julian Renner, Thomas Jerkovits, Hannes Bartz

    Abstract: An efficient decoding algorithm for horizontally u-interleaved LRPC codes is proposed and analyzed. Upper bounds on the decoding failure rate and the computational complexity of the algorithm are derived. It is shown that interleaving reduces the decoding failure rate exponentially in the interleaving order u whereas the computational complexity grows linearly.

    Submitted 28 August, 2019; originally announced August 2019.

  12. arXiv:1908.10397  [pdf, other

    cs.IT

    Successive Cancellation List Decoding of Product Codes with Reed-Muller Component Codes

    Authors: Mustafa Cemil Coşkun, Thomas Jerkovits, Gianluigi Liva

    Abstract: This letter proposes successive cancellation list (SCL) decoding of product codes with Reed--Muller (RM) component codes. SCL decoding relies on a product code description based on the $2\times 2$ Hadamard kernel, which enables interpreting the code as an RM subcode. The focus is on a class of product codes considered in wireless communication systems, based on single parity-check and extended Ham… ▽ More

    Submitted 27 August, 2019; originally announced August 2019.

    Comments: accepted for publication in IEEE Communications Letters

  13. arXiv:1812.08562  [pdf, other

    cs.IT

    Efficient Error-Correcting Codes in the Short Blocklength Regime

    Authors: Mustafa Cemil Coşkun, Giuseppe Durisi, Thomas Jerkovits, Gianluigi Liva, William Ryan, Brian Stein, Fabian Steiner

    Abstract: The design of block codes for short information blocks (e.g., a thousand or less information bits) is an open research problem that is gaining relevance thanks to emerging applications in wireless communication networks. In this paper, we review some of the most promising code constructions targeting the short block regime, and we compare them with both finite-length performance bounds and classic… ▽ More

    Submitted 10 March, 2019; v1 submitted 20 December, 2018; originally announced December 2018.

    Comments: Preprint submitted to Physical Communication; corrected typos; added references; extended discussion on list decoding of polar codes

  14. Improving the Decoding Threshold of Tailbiting Spatially Coupled LDPC Codes by Energy Sha**

    Authors: Thomas Jerkovits, Gianluigi Liva, Alexandre Graell i Amat

    Abstract: We show how the iterative decoding threshold of tailbiting spatially coupled (SC) low-density parity-check (LDPC) code ensembles can be improved over the binary input additive white Gaussian noise channel by allowing the use of different transmission energies for the codeword bits. We refer to the proposed approach as energy sha**. We focus on the special case where the transmission energy of a… ▽ More

    Submitted 16 February, 2018; v1 submitted 15 February, 2018; originally announced February 2018.

    Comments: Accepted for publication in the IEEE Communications Letters

  15. arXiv:1610.00873  [pdf, ps, other

    cs.IT

    Code Design for Short Blocks: A Survey

    Authors: Gianluigi Liva, Lorenzo Gaudio, Tudor Ninacs, Thomas Jerkovits

    Abstract: The design of block codes for short information blocks (e.g., a thousand or less information bits) is an open research problem which is gaining relevance thanks to emerging applications in wireless communication networks. In this work, we review some of the most recent code constructions targeting the short block regime, and we compare then with both finite-length performance bounds and classical… ▽ More

    Submitted 4 October, 2016; originally announced October 2016.

    Comments: A preliminary version of this work was presented at the 25th Edition of the European Conference on Networks and Communications (EuCNC), June 2016. This version includes the performance of polar codes with list decoding and CRC

    Report number: 02