35 results on '"eisenstein integers"'
Search Results
2. 关于素域上的 Koblitz 曲线.
- Author
-
伍 涵 and 许光午
- Abstract
Copyright of Journal of Cryptologic Research (2097-4116) is the property of Editorial Board of Journal of Cryptologic Research and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
3. Reliability-Based Decoding of Low-Density Lattice Codes Using Gaussian and Eisenstein Integers
- Author
-
Warangrat Wiriya and Brian M. Kurkoski
- Subjects
Complex low-density lattice codes ,low-density lattice codes ,parametric decoder ,lattice decoder ,Eisenstein integers ,Gaussian integers ,Telecommunication ,TK5101-6720 ,Transportation and communications ,HE1-9990 - Abstract
This paper proposes reliability-based decoding for complex low-density lattice codes (CLDLC) which can be applied to both Gaussian and Eisenstein integers. Two major contributions are: first, a decoding algorithm for CLDLC using a likelihood-based reliability function is used to determine the number of complex Gaussian functions at the variable node. This allows each message to be approximated by a variable number of Gaussian functions depending upon its reliability. An upper bound on the Kullback-Leibler (KL) divergence of the approximation is formed to find selection thresholds via linear regression. Second, a construction of CLDLC using Eisenstein integers is given. Compared to Gaussian integers, this reduces the complexity of CLDLC decoding by exploiting the structure of the Eisenstein integers. The proposed CLDLC decoding algorithm has higher performance and lower complexity compared to existing algorithms. When the reliability-based algorithm is applied to Eisenstein integer CLDLC decoding, the complexity is reduced to $\mathcal {O}(n\cdot t \cdot 1.35^{d-1})$ at the volume-to-noise ratio of 6 dB, for lattice dimension n, with degree d inverse generator matrix and t decoding iterations. Decoding CLDLC using Eisenstein integers has lower complexity than CLDLC using Gaussian integers when $n \geq 49$ .
- Published
- 2024
- Full Text
- View/download PDF
4. Eisenstein field BCH codes construction and decoding
- Author
-
Muhammad Sajjad, Tariq Shah, Qin Xin, and Bander Almutairi
- Subjects
eisenstein integers ,eisenstein field ,bch codes over eisenstein field ,berlekamp-massey algorithm ,Mathematics ,QA1-939 - Abstract
First, we will go through the theory behind the Eisenstein field (EF) and its extension field. In contrast, we provide a detailed framework for building BCH codes over the EF in the second stage. BCH codes over the EF are decoded using the Berlekamp-Massey algorithm (BMA) in this article. We investigate the error-correcting capabilities of these codes and provide expressions for minimal distance. We provide researchers and engineers creating and implementing robust error-correcting codes for digital communication systems with detailed information on building, decoding and performance assessment.
- Published
- 2023
- Full Text
- View/download PDF
5. Nonlinear Components of a Block Cipher over Eisenstein Integers.
- Author
-
Hazzazi, MohammadMazyad, Sajjad, Muhammad, Bassfar, Zaid, Shah, Tariq, and Albakri, Ashwag
- Subjects
BLOCK ciphers ,GAUSSIAN integers ,INTEGERS ,ELLIPTIC curves ,DATA security ,LINEAR dependence (Mathematics) - Abstract
In block ciphers, the nonlinear components, also known as substitution boxes (S-boxes), are used with the purpose to induce confusion in cryptosystems. For the last decade,most of the work on designing S-boxes over the points of elliptic curves, chaotic maps, and Gaussian integers has been published. The main purpose of these studies is to hide data and improve the security levels of crypto algorithms. In this work, we design pair of nonlinear components of a block cipher over the residue class of Eisenstein integers (EI). The fascinating features of this structure provide S-boxes pair at a time by fixing three parameters. However, in the same way, by taking three fixed parameters only one S-box is obtained through a prime field-dependent Elliptic curve (EC), chaotic maps, and Gaussian integers. The newly designed pair of S-boxes are assessed by various tests like nonlinearity, bit independence criterion, strict avalanche criterion, linear approximation probability, and differential approximation probability. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
6. Eisenstein field BCH codes construction and decoding.
- Author
-
Sajjad, Muhammad, Shah, Tariq, Qin Xin, and Almutairi, Bander
- Subjects
TELECOMMUNICATION systems ,DIGITAL communications ,ERROR-correcting codes ,RESEARCH personnel ,INFORMATION storage & retrieval systems ,ALGORITHMS - Abstract
First, we will go through the theory behind the Eisenstein field (EF) and its extension field. In contrast, we provide a detailed framework for building BCH codes over the EF in the second stage. BCH codes over the EF are decoded using the Berlekamp-Massey algorithm (BMA) in this article. We investigate the error-correcting capabilities of these codes and provide expressions for minimal distance. We provide researchers and engineers creating and implementing robust error-correcting codes for digital communication systems with detailed information on building, decoding and performance assessment. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
7. Algorithms and Bounds for Complex and Quaternionic Lattices With Application to MIMO Transmission.
- Author
-
Stern, Sebastian, Ling, Cong, and Fischer, Robert F. H.
- Subjects
- *
GAUSSIAN integers , *ALGORITHMS , *RIESZ spaces , *ARITHMETIC , *INTEGERS - Abstract
Lattices are a popular field of study in mathematical research, but also in more practical areas like cryptology or multiple-input/multiple-output (MIMO) transmission. In mathematical theory, most often lattices over real numbers are considered. However, in communications, complex-valued processing is usually of interest. Besides, by the use of dual-polarized transmission as well as by the combination of two time slots or frequencies, four-dimensional (quaternion-valued) approaches become more and more important. Hence, to account for this fact, well-known lattice algorithms and related concepts are generalized in this work. To this end, a brief review of complex arithmetic, including the sets of Gaussian and Eisenstein integers, and an introduction to quaternion-valued numbers, including the sets of Lipschitz and Hurwitz integers, are given. On that basis, generalized variants of two important algorithms are derived: first, of the polynomial-time LLL algorithm, resulting in a reduced basis of a lattice by performing a special variant of the Euclidean algorithm defined for matrices, and second, of an algorithm to calculate the successive minima—the norms of the shortest independent vectors of a lattice—and its related lattice points. Generalized bounds for the quality of the particular results are established and the asymptotic complexities of the algorithms are assessed. These findings are extensively compared to conventional real-valued processing. It is shown that the generalized approaches outperform their real-valued counterparts in complexity and/or quality aspects. Moreover, the application of the generalized algorithms to MIMO communications is studied, particularly in the field of lattice-reduction-aided and integer-forcing equalization. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
8. Generalized designs for precoded receive spatial modulation derived from non-orthogonal space time block codes.
- Author
-
Shashikant, Shrutkirthi Godkhindi, Simha, G. D. Goutham, and Acharya, Udupi Shripathi
- Subjects
SPACE-time block codes ,CYCLIC codes ,FINITE fields ,GAUSSIAN integers ,RECEIVING antennas - Abstract
In this paper, a new MIMO scheme termed as precoded Spatially Modulated Non-orthogonal Space Time Block Code (precoded SM-NSTBC) is proposed. The primary concept of precoded SM-NSTBC is to activate a subset of receive antennas in a pre-defined manner and choose specific activated patterns to represent information symbols. We have synthesized schemes derived from full rank Cyclic codes defined over Galois field Rank preserving transformations are used to map the full rank codewords over a finite field to full rank Space Time Block Codes. Due to the characteristics of full rank Cyclic codes employed, a performance improvement of approximately 2 dB to 7 dB is observed. This advantage is realized when the performance of these schemes is compared with precoded SM-OSTBC and precoded STBC-SM. The improvement due to the coding gain is observed in both uncorrelated as well as correlated Rayleigh fading environments. An upper bound on the average bit error rate (ABER) is derived. Close correspondence between Monte-Carlo simulations and analytic values are observed. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
9. GR-NTRU: Dihedral group over ring of Eisenstein integers.
- Author
-
Kumar, Vikas, Das, Rohan, and Gangopadhyay, Aditi Kar
- Subjects
- *
INTEGERS , *CRYPTOSYSTEMS , *POLYNOMIALS , *NONCOMMUTATIVE rings , *DATA encryption - Abstract
NTRU is a lattice-based cryptosystem built on a convolutional ring of polynomials. There are many generalizations of NTRU in the literature; however, group ring NTRU, or GR-NTRU, is the most reasonable description of NTRU as a general framework to design its variants. Most versions are commutative and are obtained by changing the ring of coefficients while keeping the cyclic structure intact. In this work, we analyze the noncommutative version of GR-NTRU designed with the group ring of dihedral group over the ring of Eisenstein integers. We experimentally test the size of the keyspace of this new variant and find that it is comparable and even larger for certain parameters compared to the existing commutative counterpart. We observe that although it is slightly slow in terms of speed of encryption and decryption, it has higher lattice security. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Affine Mendelsohn triple systems and the Eisenstein integers.
- Author
-
Nowak, Alex W.
- Subjects
- *
INTEGERS , *ABELIAN groups , *QUASIGROUPS , *MAGIC squares , *EISENSTEIN series - Abstract
We define a Mendelsohn triple system (MTS) of order coprime with 3, and having multiplication affine over an abelian group, to be affine, nonramified. By exhibiting a one‐to‐one correspondence between isomorphism classes of affine MTS and those of modules over the Eisenstein integers, we solve the isomorphism problem for affine, nonramified MTS and enumerate these isomorphism classes (extending the work of Donovan, Griggs, McCourt, Opršal, and Stanovský). As a consequence, all entropic MTSs of order coprime with 3 and distributive MTS of order coprime with 3 are classified. Partial results on the isomorphism problem for affine MTS with order divisible by 3 are given, and a complete classification is conjectured. We also prove that for any affine MTS, the qualities of being nonramified, pure, and self‐orthogonal are equivalent. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
11. 複素低密度格子符号の構成および復号化
- Author
-
WARANGRAT, WIRIYA
- Subjects
Belief propagation decoder ,Complex low-density lattice codes ,NAND flash memory ,Low-density parity-check codes ,Eisenstein integers - Abstract
Supervisor: KURKOSKI, Brian Michael, 先端科学技術研究科, 博士
- Published
- 2023
12. Signal constellations employing multiplicative groups of Gaussian and Eisenstein integers for Enhanced Spatial Modulation.
- Author
-
G.D., Goutham Simha, M.A.N.S., Raghavendra, K, Shriharsha, and Shripathi Acharya, U.
- Subjects
GAUSSIAN integers ,EISENSTEIN series ,ENERGY consumption ,ANTENNA arrays ,INTERPOLATION - Abstract
In this paper, we propose two new signal constellation designs employing Gaussian and Eisenstein Integers for Enhanced Spatial Modulation (ESM). ESM is a novel technique which was propounded by Cheng et al. The advantage of ESM over other Spatial Modulation (SM) schemes lies in its ability to enhance spectral efficiency while keeping the energy efficiency intact. This is done by activating either one or two antennas judiciously depending upon the required trade-off. In ESM, information radiated from the antennas depends upon index of the active transmit antenna combination(s) and also on the set of constellation points chosen, which may include points from multiple constellations. In this paper, we propose signal constellations based on multiplicative groups of Gaussian and Eisenstein integers. The set comprising of Gaussian and Eisenstein integers serves as primary and secondary constellation points for Gaussian Enhanced Spatial Modulation (GESM) scheme. The secondary constellation points are deduced from a single geometric interpolation from the primary constellation points. The Monte Carlo simulation results indicate that the proposed nonuniform constellations achieve impressive SNR gains compared to conventional constellation points used in the design of ESM. This new design has been described for MIMO employing 4 × 4 and 8 × 8 antenna configurations with only two active antennas. Furthermore, a closed form expression for the pairwise error probability (PEP) for the GESM scheme has been deduced. The PEP is utilized to determine the upper bound on the average bit error probability (ABEP). Our simulations indicate that the proposed GESM from Gaussian and Eisenstein integers scheme outperforms all the other variants of SM including conventional ESM by at least 2.5 dB at an average bit error ratio (ABER) of 10 − 5 . Close correspondence between the theoretical analysis and the Monte Carlo simulation results are observed. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
13. Signal Constellations Based on Eisenstein Integers for Generalized Spatial Modulation.
- Author
-
Freudenberger, Jurgen and Shavgulidze, Sergo
- Abstract
This letter introduces signal constellations based on multiplicative groups of Eisenstein integers, i.e., hexagonal lattices. These sets of Eisenstein integers are proposed as signal constellations for generalized spatial modulation. The algebraic properties of the new constellations are investigated and a set partitioning technique is developed. This technique can be used to design coded modulation schemes over hexagonal lattices. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
14. Algorithms and bounds for complex and quaternionic lattices with application to MIMO transmission
- Author
-
Sebastian Stern, Cong Ling, Robert F. H. Fischer, and Engineering & Physical Science Research Council (EPSRC)
- Subjects
FOS: Computer and information sciences ,Gaussian integers ,Technology ,Computer Science - Information Theory ,DIVERSITY ,Lipschitz integers ,Numerical simulation ,Library and Information Sciences ,successive minima ,Engineering ,lattice reduction ,LLL algorithm ,Hurwitz integers ,0801 Artificial Intelligence and Image Processing ,1005 Communications Technologies ,MIMO communication ,Eisenstein integers ,ANTENNA ,CODES ,Quantization (signal) ,lattice-reduction-aided equalization ,quaternions ,Science & Technology ,Computer Science, Information Systems ,Information Theory (cs.IT) ,Engineering, Electrical & Electronic ,Lattices ,Computer Science Applications ,Computational complexity ,Time-frequency analysis ,MIMO ,REDUCTION ,0906 Electrical and Electronic Engineering ,Computer Science ,integer-forcing equalization ,Networking & Telecommunications ,Information Systems - Abstract
Lattices are a popular field of study in mathematical research, but also in more practical areas like cryptology or multiple-input/multiple-output (MIMO) transmission. In mathematical theory, most often lattices over real numbers are considered. However, in communications, complex-valued processing is usually of interest. Besides, by the use of dual-polarized transmission as well as by the combination of two time slots or frequencies, four-dimensional (quaternion-valued) approaches become more and more important. Hence, to account for this fact, well-known lattice algorithms and related concepts are generalized in this work. To this end, a brief review of complex arithmetic, including the sets of Gaussian and Eisenstein integers, and an introduction to quaternion-valued numbers, including the sets of Lipschitz and Hurwitz integers, are given. On that basis, generalized variants of two important algorithms are derived: first, of the polynomial-time LLL algorithm, resulting in a reduced basis of a lattice by performing a special variant of the Euclidean algorithm defined for matrices, and second, of an algorithm to calculate the successive minima - the norms of the shortest independent vectors of a lattice - and its related lattice points. Generalized bounds for the quality of the particular results are established and the asymptotic complexities of the algorithms are assessed. These findings are extensively compared to conventional real-valued processing. It is shown that the generalized approaches outperform their real-valued counterparts in complexity and/or quality aspects. Moreover, the application of the generalized algorithms to MIMO communications is studied, particularly in the field of lattice-reduction-aided and integer-forcing equalization.
- Published
- 2022
15. UNIT AND UNITARY CAYLEY GRAPHS FOR THE RING OF EISENSTEIN INTEGERS MODULO \(n\)
- Author
-
Reza Jahani-Nezhad and Ali Bahrami
- Subjects
Computer Science::Discrete Mathematics ,General Mathematics ,QA1-939 ,UNIT GRAPH ,unit graph, unitary cayley graph, eisenstein integers, hamiltonian graph ,EISENSTEIN INTEGERS ,UNITARY CAYLEY GRAPH ,Mathematics ,HAMILTONIAN GRAPH - Abstract
Let \({E}_{n}\) be the ring of Eisenstein integers modulo \(n\). We denote by \(G({E}_{n})\) and \(G_{{E}_{n}}\), the unit graph and the unitary Cayley graph of \({E}_{n}\), respectively. In this paper, we obtain the value of the diameter, the girth, the clique number and the chromatic number of these graphs. We also prove that for each \(n>1\), the graphs \(G(E_{n})\) and \(G_{E_{n}}\) are Hamiltonian.
- Published
- 2021
16. Trigonal Toda Lattice Equation
- Author
-
Matsutani, Shigeki
- Published
- 2020
- Full Text
- View/download PDF
17. Efficient Integer Coefficient Search for Compute-and-Forward.
- Author
-
Liu, William and Ling, Cong
- Abstract
Integer coefficient selection is an important decoding step in the implementation of compute-and-forward (C-F) relaying scheme. Choosing the optimal integer coefficients in C-F has been shown to be a shortest vector problem, which is known to be NP-hard in its general form. Exhaustive search of the integer coefficients is only feasible in complexity for small number of users while approximation algorithms, such as Lenstra–Lenstra–Lovász lattice reduction algorithm, only find a vector within an exponential factor of the shortest vector. An optimal deterministic algorithm was proposed for C-F by Sahraei and Gastpar specifically for the real valued channel case. In this paper, we adapt their idea to the complex valued channel and propose an efficient search algorithm to find the optimal integer coefficient vectors over the ring of Gaussian integers and the ring of Eisenstein integers. A second algorithm is then proposed that generalizes our search algorithm to the integer-forcing multiple-input multiple-output (MIMO) C-F receiver. Performance and efficiency of the proposed algorithms are evaluated through simulations and theoretical analysis. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
18. Unit and Unitary Cayley Graphs for the Ring of Eisenstein Integers Modulo N
- Author
-
Jahani-Nezhad, R., Bahrami, A., Jahani-Nezhad, R., and Bahrami, A.
- Abstract
Let En be the ring of Eisenstein integers modulo n. We denote by G(En) and GEn, the unit graph and the unitary Cayley graph of En, respectively. In this paper, we obtain the value of the diameter, the girth, the clique number and the chromatic number of these graphs. We also prove that for each n>1, the graphs G(En) and GEn are Hamiltonian.
- Published
- 2021
19. Lattices Over Eisenstein Integers for Compute-and-Forward.
- Author
-
Tunali, Nihat Engin, Huang, Yu-Chih, Boutros, Joseph J., and Narayanan, Krishna R.
- Subjects
- *
INTEGERS , *LATTICE theory , *WIRELESS communications , *RANDOM noise theory , *TRANSMITTERS (Communication) - Abstract
In this paper, we consider the use of lattice codes over Eisenstein integers for implementing a compute-and-forward protocol in wireless networks when channel state information is not available at the transmitter. We extend the compute-and-forward paradigm of Nazer and Gastpar to decoding Eisenstein integer combinations of transmitted messages at relays by proving the existence of a sequence of pairs of nested lattices over Eisenstein integers in which the coarse lattice is good for covering and the fine lattice can achieve the Poltyrev limit. Using this result, we show that both the outage performance and error-correcting performance of the nested lattice codebooks over Eisenstein integers surpass those of lattice codebooks over integers considered by Nazer and Gastpar with no additional computational complexity. [ABSTRACT FROM PUBLISHER]
- Published
- 2015
- Full Text
- View/download PDF
20. Lattice network codes based on Eisenstein integers.
- Author
-
Qifu Tyler Sun and Jinhong Yuan
- Abstract
In this paper, we investigate lattice network codes (LNCs) constructed from lattices over the ring of Eisenstein integers. Quantization and encoding algorithms over Eisenstein integers are first introduced. Then, a union bound estimation (UBE) of the decoding error probability is derived when the shaping region of the LNC is a product of regular hexagons. We show that the UBE is in the same form as the one for hypercube shaped LNCs, such as in the Gaussian integer case. We also demonstrate that in the Eisenstein integer case, the nominal coding gain and the shaping gain of a baseline LNC are, respectively, 0.625 dB and 0.167 dB, in contrast to the Gaussian integer case, where both gains are 0 dB. This is consistent with the simulation results comparing the performance of decoding error probability of baseline LNCs. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
21. ETRU: NTRU over the Eisenstein integers.
- Author
-
Jarvis, Katherine and Nevins, Monica
- Subjects
PUBLIC key cryptography ,EISENSTEIN series ,INTEGERS ,POLYNOMIAL rings ,COMPUTER security ,LATTICE theory - Abstract
NTRU is a public-key cryptosystem based on polynomial rings over $$\mathbb Z .$$ Replacing $$\mathbb Z $$ with the ring of Eisenstein integers yields ETRU. We prove through both theory and implementation that ETRU is faster and has smaller keys for the same or better level of security than does NTRU. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
22. Symmetric digit sets for elliptic curve scalar multiplication without precomputation.
- Author
-
Heuberger, Clemens and Mazzoli, Michela
- Subjects
- *
SYMMETRIC functions , *SET theory , *ELLIPTIC curves , *SCALAR field theory , *MULTIPLICATION - Abstract
We describe a method to perform scalar multiplication on two classes of ordinary elliptic curves, namely E:y² = x³ + Ax in prime characteristic p ≡ 1 mod 4, and E:y² = x³ + B in prime characteristic p ≡ 1 mod 3. On these curves, the 4-th and 6-th roots of unity act as (computationally efficient) endomorphisms. In order to optimise the scalar multiplication, we consider a width-w-NAF (Non-Adjacent Form) digit expansion of positive integers to the complex base of τ, where τ is a zero of the characteristic polynomial x²-tx+p of the Frobenius endomorphism associated to the curve. We provide a precomputationless algorithm by means of a convenient factorisation of the unit group of residue classes modulo τ in the endomorphism ring, whereby we construct a digit set consisting of powers of subgroup generators, which are chosen as efficient endomorphisms of the curve. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
23. Cyclotomic matrices over the Eisenstein and Gaussian integers
- Author
-
Greaves, Gary
- Subjects
- *
CYCLOTOMIC fields , *MATRICES (Mathematics) , *EISENSTEIN series , *GAUSSIAN integers , *EIGENVALUES , *INTERVAL analysis - Abstract
Abstract: We classify all cyclotomic matrices over the Eisenstein and Gaussian integers, that is, all Hermitian matrices over the Eisenstein and Gaussian integers that have all their eigenvalues in the interval . [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
24. Interesting eigenvectors of the Fourier transform.
- Author
-
Horn, Berthold K. P.
- Subjects
- *
EIGENVECTORS , *FOURIER transforms , *MATHEMATICAL functions , *CODING theory - Abstract
It is well known that a function can be decomposed uniquely into the sum of an odd and an even function. This notion can be extended to the unique decomposition into the sum of four functions - two of which are even and two odd. These four functions are eigenvectors of the Fourier Transform with four different eigenvalues. That is, the Fourier transformof each of the four components is simply that component multiplied by the corresponding eigenvalue. Some eigenvectors of the discrete Fourier transform of particular interest find application in coding, communication and imaging. Some of the underlying mathematics goes back to the times of Carl Friedrich Gauss. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
25. On the complex reflection group
- Author
-
Allcock, Daniel
- Subjects
- *
REFLECTION groups , *MATHEMATICAL proofs , *ARTIN algebras , *LATTICE theory , *ISOMETRICS (Mathematics) , *COMMUTATIVE algebra , *BRAID theory , *MATHEMATICAL analysis - Abstract
Abstract: We give a computer-free proof of a theorem of Basak, describing the group generated by 16 complex reflections of order 3, satisfying the braid and commutation relations of the diagram. The group is the full isometry group of a certain lattice of signature over the Eisenstein integers . Along the way we enumerate the cusps of this lattice and classify the root and Niemeier lattices over . [Copyright &y& Elsevier]
- Published
- 2009
- Full Text
- View/download PDF
26. Lower bounds for decision problems in imaginary, norm-Euclidean quadratic integer rings
- Author
-
Busch, J.
- Subjects
- *
STATISTICAL decision making , *QUADRATIC forms , *RINGS of integers , *MATHEMATICAL proofs , *LINEAR operators , *ALGORITHMS - Abstract
Abstract: We prove lower bounds for the complexity of deciding several relations in imaginary, norm-Euclidean quadratic integer rings, where computations are assumed to be relative to a basis of piecewise-linear operations. In particular, we establish lower bounds for deciding coprimality in these rings, which yield lower bounds for gcd computations. In each imaginary, norm-Euclidean quadratic integer ring, a known binary-like gcd algorithm has complexity that is quadratic in our lower bound. [Copyright &y& Elsevier]
- Published
- 2009
- Full Text
- View/download PDF
27. Cubic Identities for Theta Series in Three Variables.
- Author
-
Chapman, Robin
- Abstract
We consider three-variable analogues of the theta series of Borwein and Borwein. We prove various identities involving these theta series including a generalization of the cubic identity of Borwein and Borwein. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
28. Advanced equalization and coded-modulation strategies for multiple-input/multiple-output systems
- Author
-
Stern, Sebastian Patrick
- Subjects
Gaussian integers ,V-BLAST ,MIMO multiple-access channel ,Successive interference cancellation ,MIMO broadcast channel ,Integer forcing ,Algebraic constellations ,Lattice theory ,Gaussian processes ,MIMO systems ,Codierungstheorie ,Equalization ,Nachrichtentechnik ,DDC 620 / Engineering & allied operations ,Eisenstein integers ,Digital communications ,Computer Science::Information Theory ,Coded modulation ,Multiuser detection (Telecommunication) ,Lattices ,MIMO ,Lattice reduction ,Multiple access communications ,Coding theory ,ddc:620 ,Multiuser ,Interferenz - Abstract
Advanced equalization and coded-modulation strategies for multiple-input/multiple-output (MIMO) communication are considered. The focus is on techniques that are suited for the application in multiuser MIMO uplink transmission (MIMO multiple-access channel) or multiuser MIMO downlink transmission (MIMO broadcast channel). This particularly includes lattice-reduction-aided (LRA) schemes which have become popular in recent years. In LRA schemes, the MIMO channel matrix is factorized into two parts: a unimodular integer matrix and a residual non-integer matrix. Given that factorization, only the non-integer part is conventionally equalized, either by means of linear equalization or the application of the principle of successive interference cancellation (SIC). In contrast to that, the integer interference can be resolved without any performance-harming noise enhancement. From a mathematical point of view, the integer matrix describes a change to a more suited basis for channel equalization. Consequently, the channel factorization can be obtained by well-known lattice-basis-reduction algorithms, e.g., the Lenstra–Lenstra–Lovász (LLL) algorithm. However, concentrating on the treatment of the multiuser MIMO interference, LRA schemes have most often been treated uncoded, i.e., neglecting the combination with a convenient coded-modulation approach. This situation has changed with the concept of integer-forcing (IF) equalization. In IF schemes, the channel matrix is factorized, too. Nevertheless, the integer interference is resolved over the finite field of the channel code—creating a close coupling between channel equalization and coded modulation. For the finite-field integer matrix, the unimodularity constraint as present in LRA schemes can be relaxed to a full-rank constraint. This not only brings up the question if, in classical LRA schemes, the unimodularity constraint is really necessary, but also if the LRA techniques have really been operated in an optimum or at least in a close-to-optimum way. Hence, in this thesis, strategies and approaches are identified that enable a performance gain over the state-of-the-art application of LRA receiver- or transmitter-side equalization. First, this involves the choice of the signal constellation. In particular, constellations over the Eisenstein integers—the hexagonal lattice over the complex plane—are studied. These signal constellations as well as conventional quadrature amplitude modulation (QAM) ones are combined with coded-modulation schemes that are suited for the application in multiuser MIMO communications using binary or non-binary low-density parity-check (LDPC) codes. Moreover, criteria and algorithms for lattice basis reduction are reviewed and extended for lattices over Eisenstein integers. These considerations also include the abovementioned relaxation to full-rank integer matrices, which is specifically known as successive minima problem. A recapitulation of conventional linear and SIC-based equalization schemes is provided, where the famous V-BLAST detection strategy is regarded from the perspective of lattice theory. Following this, optimum or close-to-optimum channel factorization strategies and related algorithms are worked out for LRA transmitter- and receiver-side schemes. It is shown that the classical unimodularity constraint can indeed be relaxed—generalizing the “lattice-reduction-aided” to “lattice-aided” (LA) schemes. The combination of these LA approaches with coded-modulation strategies is studied and the differences to the corresponding IF schemes are clarified; a discussion on the convenience of both philosophies in multiuser MIMO uplink and downlink transmission is given. The theoretical derivations in this thesis are supported by results obtained from Monte-Carlo simulations. This particularly includes the evaluation of the transmission performance if binary source symbols are transmitted.
- Published
- 2020
- Full Text
- View/download PDF
29. Advanced equalization and coded-modulation strategies for multiple-input/multiple-output systems
- Author
-
Stern, Sebastian Patrick, Fischer, Robert, and Ling, Cong
- Subjects
MIMO Broadcast Channel ,V-BLAST ,Successive Interference Cancellation ,Lattice theory ,Lattice Reduction ,Gaussian processes ,Multiuser detection (telecommunication) ,MIMO systems ,Coded Modulation ,Codierungstheorie ,Equalization ,Nachrichtentechnik ,DDC 620 / Engineering & allied operations ,Digital communications ,Gaussian Integers ,Computer Science::Information Theory ,Multiple Access Communications ,Algebraic Constellations ,Eisenstein Integers ,Lattices ,Integer Forcing ,MIMO ,Coding theory ,ddc:620 ,Multiuser ,MIMO Multiple-Access Channel ,Interferenz - Abstract
Advanced equalization and coded-modulation strategies for multiple-input/multiple-output (MIMO) communication are considered. The focus is on techniques that are suited for the application in multiuser MIMO uplink transmission (MIMO multiple-access channel) or multiuser MIMO downlink transmission (MIMO broadcast channel). This particularly includes lattice-reduction-aided (LRA) schemes which have become popular in recent years. In LRA schemes, the MIMO channel matrix is factorized into two parts: a unimodular integer matrix and a residual non-integer matrix. Given that factorization, only the non-integer part is conventionally equalized, either by means of linear equalization or the application of the principle of successive interference cancellation (SIC). In contrast to that, the integer interference can be resolved without any performance-harming noise enhancement. From a mathematical point of view, the integer matrix describes a change to a more suited basis for channel equalization. Consequently, the channel factorization can be obtained by well-known lattice-basis-reduction algorithms, e.g., the Lenstra–Lenstra–Lovász (LLL) algorithm. However, concentrating on the treatment of the multiuser MIMO interference, LRA schemes have most often been treated uncoded, i.e., neglecting the combination with a convenient coded-modulation approach. This situation has changed with the concept of integer-forcing (IF) equalization. In IF schemes, the channel matrix is factorized, too. Nevertheless, the integer interference is resolved over the finite field of the channel code—creating a close coupling between channel equalization and coded modulation. For the finite-field integer matrix, the unimodularity constraint as present in LRA schemes can be relaxed to a full-rank constraint. This not only brings up the question if, in classical LRA schemes, the unimodularity constraint is really necessary, but also if the LRA techniques have really been operated in an optimum or at least in a close-to-optimum way. Hence, in this thesis, strategies and approaches are identified that enable a performance gain over the state-of-the-art application of LRA receiver- or transmitter-side equalization. First, this involves the choice of the signal constellation. In particular, constellations over the Eisenstein integers—the hexagonal lattice over the complex plane—are studied. These signal constellations as well as conventional quadrature amplitude modulation (QAM) ones are combined with coded-modulation schemes that are suited for the application in multiuser MIMO communications using binary or non-binary low-density parity-check (LDPC) codes. Moreover, criteria and algorithms for lattice basis reduction are reviewed and extended for lattices over Eisenstein integers. These considerations also include the abovementioned relaxation to full-rank integer matrices, which is specifically known as successive minima problem. A recapitulation of conventional linear and SIC-based equalization schemes is provided, where the famous V-BLAST detection strategy is regarded from the perspective of lattice theory. Following this, optimum or close-to-optimum channel factorization strategies and related algorithms are worked out for LRA transmitter- and receiver-side schemes. It is shown that the classical unimodularity constraint can indeed be relaxed—generalizing the “lattice-reduction-aided” to “lattice-aided” (LA) schemes. The combination of these LA approaches with coded-modulation strategies is studied and the differences to the corresponding IF schemes are clarified; a discussion on the convenience of both philosophies in multiuser MIMO uplink and downlink transmission is given. The theoretical derivations in this thesis are supported by results obtained from Monte-Carlo simulations. This particularly includes the evaluation of the transmission performance if binary source symbols are transmitted.
- Published
- 2019
30. A cubic RSA code equivalent to factorization.
- Author
-
Loxton, J., Khoo, David, Bird, Gregory, and Seberry, Jennifer
- Abstract
The RSA public-key encryption system of Rivest, Shamir, and Adelman can be broken if the modulus, R say, can be factorized. However, it is still not known if this system can be broken without factorizing R. A version of the RSA scheme is presented with encryption exponent e ≡ 3 (mod 6). For this modified version, the equivalence of decryption and factorization of R can be demonstrated. [ABSTRACT FROM AUTHOR]
- Published
- 1992
- Full Text
- View/download PDF
31. On the Y555 complex reflection group
- Author
-
Daniel Allcock
- Subjects
Pure mathematics ,Braid group ,Group Theory (math.GR) ,01 natural sciences ,symbols.namesake ,Complex reflections ,0103 physical sciences ,FOS: Mathematics ,Order (group theory) ,Eisenstein integers ,0101 mathematics ,22E40 ,Mathematics ,Algebra and Number Theory ,Complex reflection group ,Group (mathematics) ,010102 general mathematics ,Lattices ,Monster ,Artin groups ,Eisenstein integer ,20F55 ,symbols ,010307 mathematical physics ,Quotient group ,Signature (topology) ,Isometry group ,Mathematics - Group Theory - Abstract
We give a computer-free proof of a theorem of Basak, describing the group generated by 16 complex reflections of order 3, satisfying the braid and commutation relations of the Y555 diagram. The group is the full isometry group of a certain lattice of signature (13,1) over the Eisenstein integers Z[cube root of 1]. Along the way we enumerate the cusps of this lattice and classify the root and Niemeier lattices over this ring., Comment: 16 pages; submitted
- Published
- 2009
- Full Text
- View/download PDF
32. Spatially Modulated Non Orthogonal Space Time Block Code: Construction and design from cyclic codes over Galois Field.
- Author
-
S., Godkhindi Shrutkirthi, G.D., Goutham Simha, and Shripathi Acharya, U.
- Subjects
SPACE-time block codes ,CYCLIC codes ,BINARY codes ,FINITE fields ,ORTHOGONALIZATION - Abstract
A new class of non-binary Spatially Modulated Non-orthogonal Space Time Block Code designs (SM-NSTBC) has been proposed. These designs employ full rank, length n , (n | q m − 1 , m ≤ n) cyclic codes defined over G F (q m). The underlying cyclic code constructions have the property that the codewords when viewed as m × n matrices over G F (q) have rank equal to m (Full rank). These codes are punctured to yield m × m full rank matrices over G F (q). Rank preserving transformations are used to map the codewords of full rank codes over a finite field to full rank Space Time Block Codes. The proposed scheme can be generalized to handle any number of transmit antenna greater than two. Due to the characteristics of Full rank cyclic codes employed, a coding gain of approximately 1.5 dB to 5 dB is obtained over conventional STBC-SM and SM-OSTBC schemes. This is demonstrated for spectral efficiencies of 4, 5, 7 and 8 bpcu. Analytical as well as Monte-Carlo simulations show that proposed SM-NSTBC outperforms STBC-SM and its variants. The upper bound on average bit error rate has been derived and the computation complexity for ML detection has been estimated. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
33. Symmetric digit sets for elliptic curve scalar multiplication without precomputation
- Author
-
Clemens, Heuberger and Michela, Mazzoli
- Subjects
Gaussian integers ,Integer digit expansion ,Frobenius endomorphism ,Eisenstein integers ,Width-w Non-Adjacent Form ,Article ,Elliptic curve scalar multiplication - Abstract
We describe a method to perform scalar multiplication on two classes of ordinary elliptic curves, namely E:y2=x3+Ax in prime characteristic p≡1mod4, and E:y2=x3+B in prime characteristic p≡1mod3. On these curves, the 4-th and 6-th roots of unity act as (computationally efficient) endomorphisms. In order to optimise the scalar multiplication, we consider a width-w-NAF (Non-Adjacent Form) digit expansion of positive integers to the complex base of τ, where τ is a zero of the characteristic polynomial x2−tx+p of the Frobenius endomorphism associated to the curve. We provide a precomputationless algorithm by means of a convenient factorisation of the unit group of residue classes modulo τ in the endomorphism ring, whereby we construct a digit set consisting of powers of subgroup generators, which are chosen as efficient endomorphisms of the curve.
- Published
- 2013
34. NTRU over the Eisenstein Integers
- Author
-
Jarvis, Katherine
- Subjects
Eisenstein Integers ,Lattice Based Cryptography ,NTRU ,Public Key Cryptography - Abstract
NTRU is a fast public-key cryptosystem that is constructed using polynomial rings with integer coefficients. We present ETRU, an NTRU-like cryptosystem based on the Eisenstein integers. We discuss parameter selection and develop a model for the probabilty of decryption failure. We also provide an implementation of ETRU. We use theoretical and experimental data to compare the security and efficiency of ETRU to NTRU with comparable parameter sets and show that ETRU is an improvement over NTRU in terms of security.
- Published
- 2011
- Full Text
- View/download PDF
35. Cyclotomic matrices over the Eisenstein and Gaussian integers
- Author
-
Gary R. W. Greaves
- Subjects
Gaussian integers ,Discrete mathematics ,Algebra and Number Theory ,Mathematics - Number Theory ,Gaussian integer ,Mathematics::Number Theory ,Complex multiplication ,Mathematics::Spectral Theory ,Hermitian matrix ,Combinatorics ,symbols.namesake ,Quadratic integer ,05C22, 05C50, 11C20, 15B33 ,Cyclotomic matrices ,Eisenstein integer ,symbols ,FOS: Mathematics ,Interval (graph theory) ,Cubic reciprocity ,Number Theory (math.NT) ,Eisenstein integers ,Eigenvalues and eigenvectors ,Mathematics - Abstract
We classify all cyclotomic matrices over the Eisenstein and Gaussian integers, that is, all Hermitian matrices over the Eisenstein and Gaussian integers that have all their eigenvalues in the interval [-2, 2]., 24 pages
- Published
- 2011
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.