Results 71 to 80 of about 139,535 (196)

Assessing and countering reaction attacks against post-quantum public-key cryptosystems based on QC-LDPC codes

open access: yes, 2018
Code-based public-key cryptosystems based on QC-LDPC and QC-MDPC codes are promising post-quantum candidates to replace quantum vulnerable classical alternatives.
A Becker   +14 more
core   +1 more source

Energy‐Efficiency Maximization in Backscatter Communication‐Based Non‐Orthogonal Multiple Access System: Dinkelbach and Successive Convex Approximation Approaches

open access: yesIET Signal Processing, Volume 2024, Issue 1, 2024.
This paper investigates a backscatter communication (BackCom) based non‐orthogonal multiple access (NOMA) system in a multiple‐input and single‐output (MISO) scenario, where two decoding methods are deployed, including the sum‐capacity approach and QR decomposition.
Dingjia Lin   +4 more
wiley   +1 more source

New Constructions of MDS Twisted Reed-Solomon Codes and LCD MDS Codes [PDF]

open access: yesarXiv, 2020
Maximum distance separable (MDS) codes are optimal where the minimum distance cannot be improved for a given length and code size. Twisted Reed-Solomon codes over finite fields were introduced in 2017, which are generalization of Reed-Solomon codes.
arxiv  

Design and Analysis of Time-Invariant SC-LDPC Convolutional Codes With Small Constraint Length

open access: yes, 2017
In this paper, we deal with time-invariant spatially coupled low-density parity-check convolutional codes (SC-LDPC-CCs). Classic design approaches usually start from quasi-cyclic low-density parity-check (QC-LDPC) block codes and exploit suitable ...
Baldi, Marco   +4 more
core   +1 more source

A cyclic‐shift based method for counting cycles of quasi‐cyclic LDPC codes

open access: yesElectronics Letters, Volume 60, Issue 2, January 2024.
This paper presents some new necessary and sufficient conditions for the existence of cycles with arbitrary lengths and proposes a simple and novel method for counting cycles of QC‐LDPC codes based on the improved condition. Compared with the existing methods, the presented method is effective and feasible and can enumerate cycles of QC‐LDPC codes in a
Hengzhou Xu   +5 more
wiley   +1 more source

Tanner (3, 23)-Regular QC-LDPC Codes: Cycle Structure and Girth Distribution

open access: yesIEEE Access
This paper studies a class of quasi-cyclic LDPC (QC-LDPC) codes, i.e., Tanner (3, 23)-regular QC-LDPC codes of code length $23p$ with $p$ being a prime and $p \equiv 1 (\mathrm {mod} 69)$ .
Qi Wang   +5 more
doaj   +1 more source

FPGA implementation of rate-compatible QC-LDPC code decoder [PDF]

open access: yes2011 20th European Conference on Circuit Theory and Design (ECCTD), 2011
The use of rate-compatible error correcting codes offers several advantages as compared to the use of fixed-rate codes: a smooth adaptation to the channel conditions, the possibility of incremental Hybrid ARQ schemes, as well as simplified code representations in the encoder and decoder.
Blad, Anton, Gustafsson, Oscar
openaire   +3 more sources

High Efficiency Continuous-Variable Quantum Key Distribution Based on ATSC 3.0 LDPC Codes

open access: yesEntropy, 2020
Due to the rapid development of quantum computing technology, encryption systems based on computational complexity are facing serious threats. Based on the fundamental theorem of quantum mechanics, continuous-variable quantum key distribution (CVQKD) has
Kun Zhang   +4 more
doaj   +1 more source

Type-II QC-LDPC Codes From Multiplicative Subgroup of Prime Field

open access: yesIEEE Access, 2020
A quasi-cyclic (QC) low-density parity-check (LDPC) code is called type-II, if the maximum weight over all circulants appearing in the parity-check matrix has the value of two. On the basis of multiplicative subgroup analysis for the prime field, a novel
Guohua Zhang   +4 more
doaj   +1 more source

Аналіз енергетичної ефективності LDPC-кодів широкосмугових телекомунікацій технологіі 5G [PDF]

open access: yes, 2020
Розглянуті особливості квазіциклічних кодів QC-LDPC, що викорис-товуються для даних користувача транспортного каналу широкосмугового мобільного зв‘язку 5G. Проаналізовані особливості побудови кодів, їх пе-ревірочних і експонентних матриць.
Бойко, Ю. М., Пятін, І. С.
core  

Home - About - Disclaimer - Privacy