共查询到20条相似文献,搜索用时 31 毫秒
1.
Poli A. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1995,41(3):790-794
A simple deterministic algorithm to construct a normal basis of GF(qn) over GF(q) (q=pr, p prime) is given. When p=2, the authors deduce a (self complementary normal-SCN) basis of GF(q n) over GF(q) for n odd, or n=2t, t odd. In characteristic 2 these cases are known to be the only possible ones for which there exists an SCN basis 相似文献
2.
Yuh-Sien Sun Hsuen-Chyun Shyu 《Electronics letters》2001,37(11):685-687
A novel fractional GF(qn) composite domain (FGCD) for image scrambling applications is described. The FGCD scrambled image can be recovered using the appropriate keys without any knowledge of the original image information. Gaussian noise is added to the FGCD transformation results to test the reversing performance of the FGCD 相似文献
3.
4.
Thangaraj A. McLaughlin S.W. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2001,47(3):1176-1178
We provide a construction for quantum codes (Hermitian-self-orthogonal codes over GF(4)) starting from cyclic codes over GF(4m). We also provide examples of these codes some of which meet the known bounds for quantum codes 相似文献
5.
Low-density parity check codes over GF(q) 总被引:2,自引:0,他引:2
Gallager's (1962) low-density binary parity check codes have been shown to have near-Shannon limit performance when decoded using a probabilistic decoding algorithm. We report the empirical results of error-correction using the analogous codes over GF(q) for q>2, with binary symmetric channels and binary Gaussian channels. We find a significant improvement over the performance of the binary codes, including a rate 1/4 code with bit error probability <10-5 at Eb/N0=0.2 dB 相似文献
6.
Guozhen Xiao Shimin Wei Kwok Yan Lam Imamura K. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2000,46(6):2203-2206
A fast algorithm is presented for determining the linear complexity of a sequence with period pn over GF (q), where p is an odd prime, and where q is a prime and a primitive root (mod p2) 相似文献
7.
A parity check matrix construction method for constructing a low-density parity-check (LDPC) codes over GF(q) (q>2) based on the modified progressive edge growth (PEG) algorithm is introduced. First, the nonzero locations of the parity check matrix are selected using the PEG algorithm. Then the nonzero elements are defined by avoiding the definition of subcode. A proof is given to show the good minimum distance property of constructed GF(q)-LDPC codes. Simulations are also presented to illustrate the good error performance of the designed codes. 相似文献
8.
Hao Chen 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2005,51(5):1854-1856
We prove a result which reduces the computation of the linear complexity of a sequence over GF(pm) (p is an odd prime) with period 2n (n is a positive integer such that there exists an element bisinGF(pm), bn=-1) to the computation of the linear complexities of two sequences with period n. By combining with some known algorithms such as the Berlekamp-Massey algorithm and the Games-Chan algorithm we can determine the linear complexity of any sequence over GF(pm) with period 2tn (such that 2 t|pm-1 and gcd(n,pm-1)=1) more efficiently 相似文献
9.
Park W.J. Jr. Komo J.J. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1989,35(1):183-186
It is shown that m -sequences over GF(q m ) of length q nm-1 corresponding to primitive polynomials in GF[q m,x ] of degree n can be generated from known m -sequences over GF(q ) of length q nm-1 obtained from primitive polynomials in GF[q ,x ] of degree mn . A procedure for generating the m -sequences over GF(q 2) from m -sequences over GF(q ) was given which enables the generation of m -sequences over GF( p 2n). In addition it was shown that all of the primitive polynomials in GF[q ,m,x ] can be obtained from a complete set of the primitive polynomials in GF[q ,x ] 相似文献
10.
An efficient algorithm for the construction of primitive polynomials of degree m over GF(q) is proposed. The algorithm runs in time O(km/sup 2/), where k is an integer such that gcd (k,q/sup m-1/)=1.<> 相似文献
11.
文章讨论了定义在GaloisField(GF)2有限域上椭圆曲线密码体制(ECC)协处理器芯片的设计。首先在详细分析基于GF(2n)ECC算法的基础上提取了最基本和关键的运算,并提出了通过协处理器来完成关键运算步骤,主处理器完成其它运算的ECC加/解密实现方案。其次,进行了加密协处理器体系结构设计,在综合考虑面积、速度、功耗的基础上选择了全串行方案来实现GF(2n)域上的乘和加运算。然后,讨论了加密协处理器芯片的电路设计和仿真、验证问题。最后讨论了芯片的物理设计并给出了样片的测试结果。 相似文献
12.
Wu J. Costello D.J. Jr. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1992,38(3):933-939
Set partitioning is applied to multidimensional signal spaces over GF(q ), i.e., GFn1(q ) (n 1⩽q ), and it is shown how to construct both multilevel block codes and multilevel trellis codes over GF(q ). Multilevel (n , k , d ) block codes over GF(q ) with block length n , number of information symbols k , and minimum distance d min⩾d are presented. These codes use Reed-Solomon codes as component codes. Longer multilevel block codes are also constructed using q -ary block codes with block length longer than q +1 as component codes. Some quaternary multilevel block codes are presented with the same length and number of information symbols as, but larger distance than, the best previously known quaternary one-level block codes. It is proved that if all the component block codes are linear. the multilevel block code is also linear. Low-rate q -ary convolutional codes, word-error-correcting convolutional codes, and binary-to-q -ary convolutional codes can also be used to construct multilevel trellis codes over GF(q ) or binary-to-q -ary trellis codes 相似文献
13.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》2002,48(10):2754-2758
A fast algorithm is presented for determining the linear complexity and the minimal polynomial of a sequence with period 2p/sup n/ over GF (q), where p and q are odd prime, and q is a primitive root (mod p/sup 2/). The algorithm uses the fact that in this case the factorization of x/sup 2p(n)/-1 is especially simple. 相似文献
14.
Circulant based extremal additive self-dual codes over GF(4) 总被引:2,自引:0,他引:2
Gulliver T.A. Kim J.-L. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2004,50(2):359-366
It is well known that the problem of finding stabilizer quantum-error-correcting codes (QECC) is transformed into the problem of finding additive self-orthogonal codes over the Galois field GF(4) under a trace inner product. Our purpose is to classify the extremal additive circulant self-dual codes of lengths up to 15, and construct good codes for lengths 16/spl les/n/spl les/27. We also classify the extremal additive 4-circulant self-dual codes of lengths 4,6,8,12,14, and 16 and most codes of length 10, and construct good codes of even lengths up to 22. Furthermore, we classify the extremal additive bordered 4-circulant self-dual codes of lengths 3,5,7,9,11,13,15, and 17, and construct good codes for lengths 19,21,23, and 25. We give the current status of known extremal (or optimal) additive self-dual codes of lengths 12 to 27. 相似文献
15.
16.
A closed form solution that yields the component shift required for the vector representation of m-sequences over GF(q2) in terms of m-sequences over GF(q2) is presented. Iterative application of this expression then enables the vctor representation of m-sequences over GF(q2m) in terms of m-sequences over GF(q). These vector m-seqeences can be used directly for the selection of frequencies in frequency hopped spread spectrum communication systems. 相似文献
17.
Fan H. Hasan M. A. 《IEEE transactions on circuits and systems. I, Regular papers》2006,53(12):2606-2615
A new nonpipelined bit-parallel-shifted polynomial basis multiplier for GF(2n) is presented. For some irreducible trinomials, the space complexity of the multiplier matches the best results available in the literature, and its gate delay is equal to T A+lceillog2nrceilTX, where TA and TX are the delay of one two-input and and xor gates, respectively. To the best of our knowledge, this is the first time that the gate delay bound TA+lceillog2nrceilTX is reached. For some irreducible pentanomials, its gate delay is equal to TA +(1+lceillog2nrceil)TX. NIST has recommended five binary fields for the elliptic curve digital signature algorithm applications: GF(2163), GF(2233), GF(2 283), GF(2409), and GF(2571), but no irreducible trinomials exist for three degrees, viz., 163, 283 and 571. For the three corresponding binary fields, we show that the gate delay of the proposed multiplier is TA+(1+lceillog2nrceil)TX. This result outperforms the previously known results 相似文献
18.
This paper presents two bit-serial modular multipliers based on the linear feedback shift register using an irreducible all one polynomial (AOP) over GF(2m). First, a new multiplication algorithm and its architecture are proposed for the modular AB multiplication. Then a new algorithm and architecture for the modular AB2 multiplication are derived based on the first multiplier. They have significantly smaller hardware complexity than the previous multipliers because of using the property of AOP. It simplifies the modular reduction compared with the case of using the generalized irreducible polynomial. Since the proposed multipliers have low hardware requirements and regular structures, they are suitable for VLSI implementation. The proposed multipliers can be used as the kernel architecture for the operations of exponentiation, inversion, and division. 相似文献
19.
本文给出了q元Alternant码的最小距离一个新的下界,改进了以往有关结果。此外,本文将指出,文献[1]关于Alternant码的最小距离的结果,一般是不成立的。 相似文献
20.
Kim J.-L. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2001,47(4):1575-1580
The purpose of this correspondence is to construct new Hermitian self-dual codes over GF(4) of lengths 22, 24, 26, 32, and 34 which have the highest known minimum weights. In particular, for length 22, we construct eight new extremal self-dual [22,11,8] codes over GF(4) which do not have a nontrivial automorphism of odd order. The existence of such codes has been left open since 1991 by Huffman 相似文献