On Strictly Geometrically Uniform Codes: Construction and New Codes
スポンサーリンク
概要
- 論文の詳細を見る
Geometrically Uniform (GU) codes have been a center of attention because their symmetric properties along with group algebraic structure provide benefits on their design and performance evaluation. We have been following a class of GU codes that we call Strictly Geometrically Uniform (SGU) codes. Our studies had started from devising a way to get SGU trellis codes from Non-SGU (NSGU) constellations. Essentially, SGU multidimensional constellations were derived from an 1-or 2-dimensional NSGU constellations. Some simple good codes were then found, and the novelty is that they rely on symmetries of permutation of channel symbols. Applying the same method to PSK-type constellations, which is SGU, yielded again good codes, along with results regarding their algebraic structure.
- 社団法人電子情報通信学会の論文
- 1997-03-25
著者
-
Imai H
Univ. Tokyo Tokyo Jpn
-
TAKESHITA Oscar
3rd Department, Institute of Industrial Science, University of Tokyo
-
IMAI Hideki
3rd Department, Institute of Industrial Science, University of Tokyo
-
Imai Hideki
3rd Department Institute Of Industrial Science The University Of Tokyo
-
Takeshita O
3rd Department Institute Of Industrial Science University Of Tokyo
-
Imai Hideki
3rd Department Institute Of Industrial Science University Of Tokyo
関連論文
- Information Theoretical Secure Oblivious Polynomial Evaluation : Model, Bounds and Constructions
- On Strictly Geometrically Uniform Codes: Construction and New Codes
- An Algorithm for Cryptanalysis of Certain Keystream Generators Suitable for High-Speed Software and Hardware Implementations : Special Section on Cryptography and Information Security
- A Novel Fast Correlation Attack Suitable for Simple Hardare Implementation
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability(Special Section on Cryptography and Information Security)
- A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures : Special Section on Cryptography and Information Security
- Unconditionally Secure Authenticated Encryption(Discrete Mathematics and Its Applications)
- Efficient Unconditionally Secure Digital Signatures (Asymmetric Cipher) (Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures
- A Traitor Traceable Conference System with Dynamic Sender(Special Section on Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
- Improving the Secure Electronic Transaction Protocol by Using Signcryption
- Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks : Special Section on Cryptography and Information Security
- An Optimization of Credit-Based Payment for Electronic Toll Collection Systems
- Realizing the Menezes-Okamoto-Vanstone (MOV) Reduction Efficiently for Ordinary Elliptic Curves
- Deforestation and Degradation of Natural Resources in Ethiopia : Forest Management Implications from a Case Study in the Belete-Gera Forest
- Magnesium Requirement for Biological Removal of Phosphate by Activated Sludge
- The Role of Arbiters for Unconditionally Secure Authentication(Discrete Mathematics and Its Applications)
- Information-Theoretically Secure Key Insulated Encryption : Models, Bounds and Constructions(Cryptography and Information Security)(Information Theory and Its Applications)
- Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data