-
Coding and Bounds for Partially Defective Memory Cells
Authors:
Haider Al Kim,
Sven Puchinger,
Ludo Tolhuizen,
Antonia Wachter-Zeh
Abstract:
This paper considers coding for so-called partially stuck (defect) memory cells. Such memory cells can only store partial information as some of their levels cannot be used fully due to, e.g., wearout. First, we present new constructions that are able to mask $u$ partially stuck cells while correcting at the same time $t$ random errors. The process of "masking" determines a word whose entries coin…
▽ More
This paper considers coding for so-called partially stuck (defect) memory cells. Such memory cells can only store partial information as some of their levels cannot be used fully due to, e.g., wearout. First, we present new constructions that are able to mask $u$ partially stuck cells while correcting at the same time $t$ random errors. The process of "masking" determines a word whose entries coincide with writable levels at the (partially) stuck cells. For $u>1$ and alphabet size $q>2$, our new constructions improve upon the required redundancy of known constructions for $t=0$, and require less redundancy for masking partially stuck cells than former works required for masking fully stuck cells (which cannot store any information). Second, we show that treating some of the partially stuck cells as erroneous cells can decrease the required redundancy for some parameters. Lastly, we derive Singleton-like, sphere-packing-like, and Gilbert--Varshamov-like bounds. Numerical comparisons state that our constructions match the Gilbert--Varshamov-like bounds for several code parameters, e.g., BCH codes that contain all-one word by our first construction.
△ Less
Submitted 15 February, 2022;
originally announced February 2022.
-
Maximum weight spectrum codes with reduced length
Authors:
Gerard D Cohen,
Ludo Tolhuizen
Abstract:
A q-ary linear code of dimension k is called a maximum weight spectrum (MWS) code if it has the maximum possible number (viz. (q^k-1)/(q-1)) of different non-zero weights. We construct MWS codes from quasi-minimal codes, thus obtaining of much shorter length than hitherto known. By an averaging argument, we show the existence of MWS codes of even shorter length.
A q-ary linear code of dimension k is called a maximum weight spectrum (MWS) code if it has the maximum possible number (viz. (q^k-1)/(q-1)) of different non-zero weights. We construct MWS codes from quasi-minimal codes, thus obtaining of much shorter length than hitherto known. By an averaging argument, we show the existence of MWS codes of even shorter length.
△ Less
Submitted 14 June, 2018;
originally announced June 2018.
-
A Multi-layer Recursive Residue Number System
Authors:
Henk D. L. Hollmann,
Ronald Rietman,
Sebastiaan de Hoogh,
Ludo M. G. M. Tolhuizen,
Paul Gorissen
Abstract:
We present a method to increase the dynamical range of a Residue Number System (RNS) by adding virtual RNS layers on top of the original RNS, where the required modular arithmetic for a modulus on any non-bottom layer is implemented by means of an RNS Montgomery multiplication algorithm that uses the RNS on the layer below. As a result, the actual arithmetic is deferred to the bottom layer. The mu…
▽ More
We present a method to increase the dynamical range of a Residue Number System (RNS) by adding virtual RNS layers on top of the original RNS, where the required modular arithmetic for a modulus on any non-bottom layer is implemented by means of an RNS Montgomery multiplication algorithm that uses the RNS on the layer below. As a result, the actual arithmetic is deferred to the bottom layer. The multiplication algorithm that we use is based on an algorithm by Bajard and Imbert, extended to work with pseudo-residues (remainders with a larger range than the modulus). The resulting Recursive Residue Number System (RRNS) can be used to implement modular addition, multiplication, and multiply-and-accumulate for very large (2000+ bits) moduli, using only modular operations for small (for example 8-bits) moduli. A hardware implementation of this method allows for massive parallelization.
Our method can be applied in cryptographic algorithms such as RSA to realize modular exponentiation with a large (2048-bit, or even 4096-bit) modulus. Due to the use of full RNS Montgomery algorithms, the system does not involve any carries, therefore cryptographic attacks that exploit carries cannot be applied.
△ Less
Submitted 15 January, 2018;
originally announced January 2018.
-
The MMO problem
Authors:
Oscar Garcia-Morchon,
Ronald Rietman,
Ludo Tolhuizen,
Domingo Gomez,
Jaime Gutierrez
Abstract:
We consider a two polynomials analogue of the polynomial interpolation problem. Namely, we consider the Mixing Modular Operations (MMO) problem of recovering two polynomials $f\in \Z_p[x]$ and $g\in \Z_q[x]$ of known degree, where $p$ and $q$ are two (un)known positive integers, from the values of $f(t)\bmod p + g(t)\bmod q$ at polynomially many points $t \in \Z$. We show that if $p$ and $q$ are k…
▽ More
We consider a two polynomials analogue of the polynomial interpolation problem. Namely, we consider the Mixing Modular Operations (MMO) problem of recovering two polynomials $f\in \Z_p[x]$ and $g\in \Z_q[x]$ of known degree, where $p$ and $q$ are two (un)known positive integers, from the values of $f(t)\bmod p + g(t)\bmod q$ at polynomially many points $t \in \Z$. We show that if $p$ and $q$ are known, the MMO problem is equivalent to computing a close vector in a lattice with respect to the infinity norm. We also implemented in the SAGE system a heuristic polynomial-time algorithm. If $p$ and $q$ are kept secret, we do not know how to solve this problem. This problem is motivated by several potential cryptographic applications.
△ Less
Submitted 29 January, 2014;
originally announced January 2014.
-
Interpolation and Approximation of Polynomials in Finite Fields over a Short Interval from Noisy Values
Authors:
Oscar Garcia-Morchon,
Ronald Rietman,
Igor E. Shparlinski,
Ludo Tolhuizen
Abstract:
Motivated by a recently introduced HIMMO key distribution scheme, we consider a modification of the noisy polynomial interpolation problem of recovering an unknown polynomial $f(X) \in Z[X]$ from approximate values of the residues of $f(t)$ modulo a prime $p$ at polynomially many points $t$ taken from a short interval.
Motivated by a recently introduced HIMMO key distribution scheme, we consider a modification of the noisy polynomial interpolation problem of recovering an unknown polynomial $f(X) \in Z[X]$ from approximate values of the residues of $f(t)$ modulo a prime $p$ at polynomially many points $t$ taken from a short interval.
△ Less
Submitted 7 January, 2014;
originally announced January 2014.
-
A generalisation of the Gilbert-Varshamov bound and its asymptotic evaluation
Authors:
Ludo Tolhuizen
Abstract:
The Gilbert-Varshamov (GV) lower bound on the maximum cardinality of a q-ary code of length n with minimum Hamming distance at least d can be obtained by application of Turan's theorem to the graph with vertex set {0,1,..,q-1}^n in which two vertices are joined if and only if their Hamming distance is at least d. We generalize the GV bound by applying Turan's theorem to the graph with vertex set C…
▽ More
The Gilbert-Varshamov (GV) lower bound on the maximum cardinality of a q-ary code of length n with minimum Hamming distance at least d can be obtained by application of Turan's theorem to the graph with vertex set {0,1,..,q-1}^n in which two vertices are joined if and only if their Hamming distance is at least d. We generalize the GV bound by applying Turan's theorem to the graph with vertex set C^n, where C is a q-ary code of length m and two vertices are joined if and only if their Hamming distance at least d. We asymptotically evaluate the resulting bound for n-> \infty and d δmn for fixed δ> 0, and derive conditions on the distance distribution of C that are necessary and sufficient for the asymptotic generalized bound to beat the asymptotic GV bound. By invoking the Delsarte inequalities, we conclude that no improvement on the asymptotic GV bound is obtained. By using a sharpening of Turan's theorem due to Caro and Wei, we improve on our bound. It is undecided if there exists a code C for which the improved bound can beat the asymptotic GV bound.
△ Less
Submitted 30 June, 2011;
originally announced June 2011.
-
Bounds for codes for a non-symmetric ternary channel
Authors:
Ludo Tolhuizen
Abstract:
We provide bounds for codes for a non-symmetric channel or, equivalently, for ternary codes with the Manhattan distance.
We provide bounds for codes for a non-symmetric channel or, equivalently, for ternary codes with the Manhattan distance.
△ Less
Submitted 9 April, 2010;
originally announced April 2010.
-
Optimal codes for correcting a single (wrap-around) burst of errors
Authors:
Henk D. L. Hollmann,
Ludo M. G. M. Tolhuizen
Abstract:
In 2007, Martinian and Trott presented codes for correcting a burst of erasures with a minimum decoding delay. Their construction employs [n,k] codes that can correct any burst of erasures (including wrap-around bursts) of length n-k. The raised the question if such [n,k] codes exist for all integers k and n with 1<= k <= n and all fields (in particular, for the binary field). In this note, we a…
▽ More
In 2007, Martinian and Trott presented codes for correcting a burst of erasures with a minimum decoding delay. Their construction employs [n,k] codes that can correct any burst of erasures (including wrap-around bursts) of length n-k. The raised the question if such [n,k] codes exist for all integers k and n with 1<= k <= n and all fields (in particular, for the binary field). In this note, we answer this question affirmatively by giving two recursive constructions and a direct one.
△ Less
Submitted 13 December, 2007;
originally announced December 2007.
-
On q-ary codes correcting all unidirectional errors of a limited magnitude
Authors:
R. Ahlswede,
H. Aydinian,
L. H. Khachatrian,
L. M. G. M. Tolhuizen
Abstract:
We consider codes over the alphabet Q={0,1,..,q-1}intended for the control of unidirectional errors of level l. That is, the transmission channel is such that the received word cannot contain both a component larger than the transmitted one and a component smaller than the transmitted one. Moreover, the absolute value of the difference between a transmitted component and its received version is…
▽ More
We consider codes over the alphabet Q={0,1,..,q-1}intended for the control of unidirectional errors of level l. That is, the transmission channel is such that the received word cannot contain both a component larger than the transmitted one and a component smaller than the transmitted one. Moreover, the absolute value of the difference between a transmitted component and its received version is at most l.
We introduce and study q-ary codes capable of correcting all unidirectional errors of level l. Lower and upper bounds for the maximal size of those codes are presented.
We also study codes for this aim that are defined by a single equation on the codeword coordinates(similar to the Varshamov-Tenengolts codes for correcting binary asymmetric errors). We finally consider the problem of detecting all unidirectional errors of level l.
△ Less
Submitted 27 July, 2006;
originally announced July 2006.
-
Generating parity check equations for bounded-distance iterative erasure decoding
Authors:
Henk D. L. Hollmann,
Ludo M. G. M. Tolhuizen
Abstract:
A generic $(r,m)$-erasure correcting set is a collection of vectors in $\bF_2^r$ which can be used to generate, for each binary linear code of codimension $r$, a collection of parity check equations that enables iterative decoding of all correctable erasure patterns of size at most $m$.
That is to say, the only stop** sets of size at most $m$ for the generated parity check equations are the…
▽ More
A generic $(r,m)$-erasure correcting set is a collection of vectors in $\bF_2^r$ which can be used to generate, for each binary linear code of codimension $r$, a collection of parity check equations that enables iterative decoding of all correctable erasure patterns of size at most $m$.
That is to say, the only stop** sets of size at most $m$ for the generated parity check equations are the erasure patterns for which there is more than one manner to fill in theerasures to obtain a codeword.
We give an explicit construction of generic $(r,m)$-erasure correcting sets of cardinality $\sum_{i=0}^{m-1} {r-1\choose i}$. Using a random-coding-like argument, we show that for fixed $m$, the minimum size of a generic $(r,m)$-erasure correcting set is linear in $r$.
Keywords: iterative decoding, binary erasure channel, stop** set
△ Less
Submitted 6 June, 2006;
originally announced June 2006.
-
On parity check collections for iterative erasure decoding that correct all correctable erasure patterns of a given size
Authors:
Henk D. L. Hollmann,
Ludo M. G. M. Tolhuizen
Abstract:
Recently there has been interest in the construction of small parity check sets for iterative decoding of the Hamming code with the property that each uncorrectable (or stop**) set of size three is the support of a codeword and hence uncorrectable anyway. Here we reformulate and generalise the problem, and improve on this construction. First we show that a parity check collection that corrects…
▽ More
Recently there has been interest in the construction of small parity check sets for iterative decoding of the Hamming code with the property that each uncorrectable (or stop**) set of size three is the support of a codeword and hence uncorrectable anyway. Here we reformulate and generalise the problem, and improve on this construction. First we show that a parity check collection that corrects all correctable erasure patterns of size m for the r-th order Hamming code (i.e, the Hamming code with codimension r) provides for all codes of codimension $r$ a corresponding ``generic'' parity check collection with this property. This leads naturally to a necessary and sufficient condition on such generic parity check collections. We use this condition to construct a generic parity check collection for codes of codimension r correcting all correctable erasure patterns of size at most m, for all r and m <= r, thus generalising the known construction for m=3. Then we discussoptimality of our construction and show that it can be improved for m>=3 and r large enough. Finally we discuss some directions for further research.
△ Less
Submitted 28 July, 2005;
originally announced July 2005.