Skip to main content

Showing 1–11 of 11 results for author: Müelich, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:1705.08652  [pdf, ps, other

    cs.IT

    On the Success Probability of Decoding (Partial) Unit Memory Codes

    Authors: Sven Puchinger, Sven Müelich, Martin Bossert

    Abstract: In this paper, we derive analytic expressions for the success probability of decoding (Partial) Unit Memory codes in memoryless channels. An applications of this result is that these codes outperform individual block codes in certain channels.

    Submitted 24 May, 2017; originally announced May 2017.

    Comments: 9 pages, extended version of a paper submitted to the International Workshop on Optimal Codes and Related Topics, 2017

  2. arXiv:1704.01306  [pdf, ps, other

    cs.IT cs.CR

    Using Convolutional Codes for Key Extraction in SRAM Physical Unclonable Functions

    Authors: Sven Müelich, Sven Puchinger, Martin Bossert

    Abstract: Physical Unclonable Functions (PUFs) exploit variations in the manufacturing process to derive bit sequences from integrated circuits, which can be used as secure cryptographic keys. Instead of storing the keys in an insecure, non-volatile memory, they can be reproduced when needed. Since the reproduced sequences are not stable due to physical reasons, error correction must be applied. Recently, c… ▽ More

    Submitted 10 January, 2018; v1 submitted 5 April, 2017; originally announced April 2017.

    Comments: Submitted to "Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE 2018)"

  3. arXiv:1703.07973  [pdf, other

    cs.IT

    Constructing an LDPC Code Containing a Given Vector

    Authors: Sven Müelich, Sven Puchinger, Martin Bossert

    Abstract: The coding problem considered in this work is to construct a linear code $\mathcal{C}$ of given length $n$ and dimension $k<n$ such that a given binary vector $\mathbf{r} \in \mathbb{F}^{n}$ is contained in the code. We study a recent solution of this problem by Müelich and Bossert, which is based on LDPC codes. We address two open questions of this construction. First, we show that under certain… ▽ More

    Submitted 14 August, 2018; v1 submitted 23 March, 2017; originally announced March 2017.

    Comments: 5 pages, accepted at the International Workshop on Algebraic and Combinatorial Coding Theory, 2018

  4. arXiv:1611.07702  [pdf, ps, other

    cs.IT

    Timing Attack Resilient Decoding Algorithms for Physical Unclonable Functions

    Authors: Sven Puchinger, Sven Müelich, Antonia Wachter-Zeh, Martin Bossert

    Abstract: This paper deals with the application of list decoding of Reed--Solomon codes to a concatenated code for key reproduction using Physical Unclonable Functions. The resulting codes achieve a higher error-correction performance at the same code rate than known schemes in this scenario. We also show that their decoding algorithms can be protected from side-channel attacks on the runtime both by maskin… ▽ More

    Submitted 23 November, 2016; originally announced November 2016.

    Comments: 6 pages, accepted for publication at the 11th International ITG Conference on Systems, Communications and Coding (SCC 2017)

  5. arXiv:1611.01960  [pdf, ps, other

    cs.CR cs.IT

    A New Error Correction Scheme for Physical Unclonable Functions

    Authors: Sven Müelich, Martin Bossert

    Abstract: Error correction is an indispensable component when Physical Unclonable Functions (PUFs) are used in cryptographic applications. So far, there exist schemes that obtain helper data, which they need within the error correction process. We introduce a new scheme, which only uses an error correcting code without any further helper data. The main idea is to construct for each PUF instance an individua… ▽ More

    Submitted 8 November, 2016; v1 submitted 7 November, 2016; originally announced November 2016.

    Comments: 6 pages

  6. arXiv:1604.05899  [pdf, ps, other

    cs.IT cs.SC

    Decoding Interleaved Gabidulin Codes using Alekhnovich's Algorithm

    Authors: Sven Puchinger, Sven Müelich, David Mödinger, Johan Rosenkilde né Nielsen, Martin Bossert

    Abstract: We prove that Alekhnovich's algorithm can be used for row reduction of skew polynomial matrices. This yields an $O(\ell^3 n^{(ω+1)/2} \log(n))$ decoding algorithm for $\ell$-Interleaved Gabidulin codes of length $n$, where $ω$ is the matrix multiplication exponent, improving in the exponent of $n$ compared to previous results.

    Submitted 15 September, 2016; v1 submitted 20 April, 2016; originally announced April 2016.

    Comments: 6 pages, presented at the International Workshop on Algebraic and Combinatorial Coding Theory (ACCT) 2016, submitted to Electronic Notes in Discrete Mathematics (volume devoted to ACCT 2016)

  7. arXiv:1604.04397  [pdf, ps, other

    cs.IT cs.CV

    Low-Rank Matrix Recovery using Gabidulin Codes in Characteristic Zero

    Authors: Sven Müelich, Sven Puchinger, Martin Bossert

    Abstract: We present a new approach on low-rank matrix recovery (LRMR) based on Gabidulin Codes. Since most applications of LRMR deal with matrices over infinite fields, we use the recently introduced generalization of Gabidulin codes to fields of characterstic zero. We show that LRMR can be reduced to decoding of Gabidulin codes and discuss which field extensions can be used in the code construction.

    Submitted 15 September, 2016; v1 submitted 15 April, 2016; originally announced April 2016.

    Comments: 6 pages, presented at the International Workshop on Algebraic and Combinatorial Coding Theory (ACCT) 2016, submitted to Electronic Notes in Discrete Mathematics (volume devoted to ACCT 2016)

  8. arXiv:1601.05205  [pdf, ps, other

    cs.IT

    An Alternative Decoding Method for Gabidulin Codes in Characteristic Zero

    Authors: Sven Müelich, Sven Puchinger, David Mödinger, Martin Bossert

    Abstract: Gabidulin codes, originally defined over finite fields, are an important class of rank metric codes with various applications. Recently, their definition was generalized to certain fields of characteristic zero and a Welch--Berlekamp like algorithm with complexity $O(n^3)$ was given. We propose a new application of Gabidulin codes over infinite fields: low-rank matrix recovery. Also, an alternativ… ▽ More

    Submitted 21 April, 2016; v1 submitted 20 January, 2016; originally announced January 2016.

    Comments: 5 pages, accepted at IEEE International Symposium on Information Theory 2016

  9. arXiv:1511.08413  [pdf, ps, other

    cs.IT cs.CR

    Code-Based Cryptosystems Using Generalized Concatenated Codes

    Authors: Sven Puchinger, Sven Müelich, Karim Ishak, Martin Bossert

    Abstract: The security of public-key cryptosystems is mostly based on number theoretic problems like factorization and the discrete logarithm. There exists an algorithm which solves these problems in polynomial time using a quantum computer. Hence, these cryptosystems will be broken as soon as quantum computers emerge. Code-based cryptography is an alternative which resists quantum computers since its secur… ▽ More

    Submitted 26 November, 2015; originally announced November 2015.

    Comments: Submitted to Springer Proceedings in Mathematics & Statistics, special issue devoted to the conference Application of Computer Algebra (ACA) 2015

  10. arXiv:1501.06698  [pdf, ps, other

    cs.IT

    On Error Correction for Physical Unclonable Functions

    Authors: Sven Puchinger, Sven Müelich, Martin Bossert, Matthias Hiller, Georg Sigl

    Abstract: Physical Unclonable Functions evaluate manufacturing variations to generate secure cryptographic keys for embedded systems without secure key storage. It is explained how methods from coding theory are applied in order to ensure reliable key reproduction. We show how better results can be obtained using code classes and decoding principles not used for this scenario before. These methods are exemp… ▽ More

    Submitted 27 January, 2015; originally announced January 2015.

    Comments: 6 pages, accepted at 10th International ITG Conference on Systems, Communications and Coding, Hamburg, Germany, February 2015

  11. arXiv:1407.8034  [pdf, ps, other

    cs.IT

    Error Correction for Physical Unclonable Functions Using Generalized Concatenated Codes

    Authors: Sven Müelich, Sven Puchinger, Martin Bossert, Matthias Hiller, Georg Sigl

    Abstract: Physical Unclonable Functions can be used for secure key generation in cryptographic applications. It is explained how methods from coding theory must be applied in order to ensure reliable key regeneration. Based on previous work, we show ways how to obtain better results with respect to error probability and codeword length. Also, an example based on Generalized Concatenated codes is given, whic… ▽ More

    Submitted 30 July, 2014; originally announced July 2014.

    Comments: Accepted for: Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory ACCT2014, Svetlogorsk (Kaliningrad region), Russia