-
arXiv:1705.08652 [pdf, ps, other]
On the Success Probability of Decoding (Partial) Unit Memory Codes
Abstract: In this paper, we derive analytic expressions for the success probability of decoding (Partial) Unit Memory codes in memoryless channels. An applications of this result is that these codes outperform individual block codes in certain channels.
Submitted 24 May, 2017; originally announced May 2017.
Comments: 9 pages, extended version of a paper submitted to the International Workshop on Optimal Codes and Related Topics, 2017
-
arXiv:1704.01306 [pdf, ps, other]
Using Convolutional Codes for Key Extraction in SRAM Physical Unclonable Functions
Abstract: Physical Unclonable Functions (PUFs) exploit variations in the manufacturing process to derive bit sequences from integrated circuits, which can be used as secure cryptographic keys. Instead of storing the keys in an insecure, non-volatile memory, they can be reproduced when needed. Since the reproduced sequences are not stable due to physical reasons, error correction must be applied. Recently, c… ▽ More
Submitted 10 January, 2018; v1 submitted 5 April, 2017; originally announced April 2017.
Comments: Submitted to "Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE 2018)"
-
Constructing an LDPC Code Containing a Given Vector
Abstract: The coding problem considered in this work is to construct a linear code $\mathcal{C}$ of given length $n$ and dimension $k<n$ such that a given binary vector $\mathbf{r} \in \mathbb{F}^{n}$ is contained in the code. We study a recent solution of this problem by Müelich and Bossert, which is based on LDPC codes. We address two open questions of this construction. First, we show that under certain… ▽ More
Submitted 14 August, 2018; v1 submitted 23 March, 2017; originally announced March 2017.
Comments: 5 pages, accepted at the International Workshop on Algebraic and Combinatorial Coding Theory, 2018
-
arXiv:1611.07702 [pdf, ps, other]
Timing Attack Resilient Decoding Algorithms for Physical Unclonable Functions
Abstract: This paper deals with the application of list decoding of Reed--Solomon codes to a concatenated code for key reproduction using Physical Unclonable Functions. The resulting codes achieve a higher error-correction performance at the same code rate than known schemes in this scenario. We also show that their decoding algorithms can be protected from side-channel attacks on the runtime both by maskin… ▽ More
Submitted 23 November, 2016; originally announced November 2016.
Comments: 6 pages, accepted for publication at the 11th International ITG Conference on Systems, Communications and Coding (SCC 2017)
-
arXiv:1611.01960 [pdf, ps, other]
A New Error Correction Scheme for Physical Unclonable Functions
Abstract: Error correction is an indispensable component when Physical Unclonable Functions (PUFs) are used in cryptographic applications. So far, there exist schemes that obtain helper data, which they need within the error correction process. We introduce a new scheme, which only uses an error correcting code without any further helper data. The main idea is to construct for each PUF instance an individua… ▽ More
Submitted 8 November, 2016; v1 submitted 7 November, 2016; originally announced November 2016.
Comments: 6 pages
-
arXiv:1604.05899 [pdf, ps, other]
Decoding Interleaved Gabidulin Codes using Alekhnovich's Algorithm
Abstract: We prove that Alekhnovich's algorithm can be used for row reduction of skew polynomial matrices. This yields an $O(\ell^3 n^{(ω+1)/2} \log(n))$ decoding algorithm for $\ell$-Interleaved Gabidulin codes of length $n$, where $ω$ is the matrix multiplication exponent, improving in the exponent of $n$ compared to previous results.
Submitted 15 September, 2016; v1 submitted 20 April, 2016; originally announced April 2016.
Comments: 6 pages, presented at the International Workshop on Algebraic and Combinatorial Coding Theory (ACCT) 2016, submitted to Electronic Notes in Discrete Mathematics (volume devoted to ACCT 2016)
-
arXiv:1604.04397 [pdf, ps, other]
Low-Rank Matrix Recovery using Gabidulin Codes in Characteristic Zero
Abstract: We present a new approach on low-rank matrix recovery (LRMR) based on Gabidulin Codes. Since most applications of LRMR deal with matrices over infinite fields, we use the recently introduced generalization of Gabidulin codes to fields of characterstic zero. We show that LRMR can be reduced to decoding of Gabidulin codes and discuss which field extensions can be used in the code construction.
Submitted 15 September, 2016; v1 submitted 15 April, 2016; originally announced April 2016.
Comments: 6 pages, presented at the International Workshop on Algebraic and Combinatorial Coding Theory (ACCT) 2016, submitted to Electronic Notes in Discrete Mathematics (volume devoted to ACCT 2016)
-
arXiv:1601.05205 [pdf, ps, other]
An Alternative Decoding Method for Gabidulin Codes in Characteristic Zero
Abstract: Gabidulin codes, originally defined over finite fields, are an important class of rank metric codes with various applications. Recently, their definition was generalized to certain fields of characteristic zero and a Welch--Berlekamp like algorithm with complexity $O(n^3)$ was given. We propose a new application of Gabidulin codes over infinite fields: low-rank matrix recovery. Also, an alternativ… ▽ More
Submitted 21 April, 2016; v1 submitted 20 January, 2016; originally announced January 2016.
Comments: 5 pages, accepted at IEEE International Symposium on Information Theory 2016
-
arXiv:1511.08413 [pdf, ps, other]
Code-Based Cryptosystems Using Generalized Concatenated Codes
Abstract: The security of public-key cryptosystems is mostly based on number theoretic problems like factorization and the discrete logarithm. There exists an algorithm which solves these problems in polynomial time using a quantum computer. Hence, these cryptosystems will be broken as soon as quantum computers emerge. Code-based cryptography is an alternative which resists quantum computers since its secur… ▽ More
Submitted 26 November, 2015; originally announced November 2015.
Comments: Submitted to Springer Proceedings in Mathematics & Statistics, special issue devoted to the conference Application of Computer Algebra (ACA) 2015
-
arXiv:1501.06698 [pdf, ps, other]
On Error Correction for Physical Unclonable Functions
Abstract: Physical Unclonable Functions evaluate manufacturing variations to generate secure cryptographic keys for embedded systems without secure key storage. It is explained how methods from coding theory are applied in order to ensure reliable key reproduction. We show how better results can be obtained using code classes and decoding principles not used for this scenario before. These methods are exemp… ▽ More
Submitted 27 January, 2015; originally announced January 2015.
Comments: 6 pages, accepted at 10th International ITG Conference on Systems, Communications and Coding, Hamburg, Germany, February 2015
-
arXiv:1407.8034 [pdf, ps, other]
Error Correction for Physical Unclonable Functions Using Generalized Concatenated Codes
Abstract: Physical Unclonable Functions can be used for secure key generation in cryptographic applications. It is explained how methods from coding theory must be applied in order to ensure reliable key regeneration. Based on previous work, we show ways how to obtain better results with respect to error probability and codeword length. Also, an example based on Generalized Concatenated codes is given, whic… ▽ More
Submitted 30 July, 2014; originally announced July 2014.
Comments: Accepted for: Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory ACCT2014, Svetlogorsk (Kaliningrad region), Russia