Catálogo de publicaciones - libros

Compartir en
redes sociales


Sequences, Subsequences, and Consequences: International Workshop, SSC 2007, Los Angeles, CA, USA, May 31: June 2, 2007, Revised Invited Papers

Solomon W. Golomb ; Guang Gong ; Tor Helleseth ; Hong-Yeop Song (eds.)

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Theory of Computation; Coding and Information Theory; Data Encryption; Discrete Mathematics in Computer Science; Computer Communication Networks

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-77403-7

ISBN electrónico

978-3-540-77404-4

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2007

Tabla de contenidos

Cyclotomic Mapping Permutation Polynomials over Finite Fields

Qiang Wang

We explore a connection between permutation polynomials of the form () and cyclotomic mapping permutation polynomials over finite fields. As an application, we characterize a class of permutation binomials in terms of generalized Lucas sequences.

Pp. 119-128

Single-Track Gray Codes and Sequences

Tuvi Etzion

Single-track Gray codes are cyclic Gray codes with codewords of length , such that all the tracks which correspond to the distinct coordinates of the codewords are cyclic shifts of the first track. These codes have advantages over conventional Gray codes in certain quantization and coding applications. We survey the main results on this problem, their connections to sequence design, and discuss some of the interesting open problems.

Pp. 129-133

The Asymptotic Behavior of π-Adic Complexity with π = − 2

Andrew Klapper

We study the asymptotic behavior of stream cipher security measures associated with algebraic feedback shift registers and feedback based on the ring . For non-periodic sequences we consider normalized -adic complexity and study the set of accumulation points for a fixed sequence. The the set of accumulation points is a closed subinterval of the real closed interval [0,1]. We see that this interval is of the form [,1 − ] “most” of the time, and that all such intervals occur for some sequence.

Pp. 134-146

Shannon Capacity Limits of Wireless Networks

Andrew Viterbi

Two wideband physical-layer multiple access techniques for mobile telephony and data are compared: CDMA, which in one of several manifestations has been chosen for virtually all third generation cellular systems, and OFDM with MIMO, which seems to be the most favored for a future generation. We compare the Shannon capacities of the two and conclude that with appropriate processing CDMA and OFDM capacities are similar but that the latter may more effectively be combined with MIMO antennas to provide higher capacities.

Pp. 147-152

Some Mysterious Sequences Associated with LDPC Codes

Robert J. McEliece; Sarah L. Sweatlock

One of the most important research areas in coding theory is . This is a large subject, but the basic problem is easily stated: determine or estimate the (, ..., ) for an (,) binary linear code, specified by a ( − ) × parity-check matrix with entries from (2). Here

where is the weight of the vector . If the number of codewords is large, the logarithmic weight enumerator, i.e.,

is more convenient. If a code belongs to a family of codes which share similar properties, the log-weight enumerator may approach a limiting function called the :

In modern coding theory, is usually very large and very sparse, e.g., the row and column sums are bounded as → ∞. The corresponding codes are called Often we are faced with large collections, or , of long LDPC codes, which share similar properties, in which case it may be difficult to find the spectral shape of an individual member of the ensemble, but relatively easy to calculate the .

Pp. 153-161

Remarks on a Sequence of Minimal Niven Numbers

H. Fredricksen; E. J. Ionascu; F. Luca; P. Stănică

In this short note we introduce two new sequences defined using the sum of digits in the representation of an integer in a certain base. A connection to Niven numbers is proposed and some results are proven.

Pp. 162-168

The Linear Vector Space Spanned by the Nonlinear Filter Generator

Sondre Rønjom; Tor Helleseth

The filter generator is an important building block in many stream ciphers. The generator consists of a linear feedback shift register (LFSR) of length and a Boolean filtering function of degree that combines bits from the shift register and creates an output bit at any time . A new attack on stream ciphers based on linear shift registers has recently been described by the authors in [3]. This attack is modified to stream ciphers based on any linear shift register and not only for LFSRs. The focal point of this paper is to present a linear description of the filter generator in terms of matrices. The filter generator is viewed entirely in terms of powers of a unique linear operator together with a vector representing the filtering function. It is proved that embodies the coefficient sequences described in [3]. Thus, interesting properties of the vector space (e.g. the dimension of the equation systems) generated by the filter generator can be analysed using theory of cyclic vector spaces, which very elegantly complements analysis in terms of the roots of the LFSR.

Pp. 169-183

Existence of Modular Sonar Sequences of Twin-Prime Product Length

Sung-Jun Yoon; Hong-Yeop Song

In this paper, we investigate the existence of modular sonar sequences of length and mod where is a product of twin primes. For  = 3·5 = 15, we have found some old and new examples by exhaustive search. However, the very next case  = 5·7 = 35 is completely open, in that neither we know (have) an example, nor we prove the nonexistence. We describe simply some approach to locate a single example of modular sonar sequences of length 35 and mod 35, assuming (or hoping) that one exists.

Pp. 184-191

Randomness and Representation of Span Sequences

Guang Gong

Any span sequences can be regarded as filtering sequences. From this observation, new randomness criteria for span sequences are proposed. It is proved that the feedback function of a span sequence can be represented as a composition of its trace representation, or equivalently, its discrete Fourier transform, and a permutation from the state space of the sequence to the multiplicative group of the finite field (2), and vice versa. Significant enhancements for randomness of span sequences, so that de Bruijn sequences, are illustrated by some examples.

Pp. 192-203

On Attacks on Filtering Generators Using Linear Subspace Structures

Sondre Rønjom; Guang Gong; Tor Helleseth

The filter generator consists of a linear feedback shift register (LFSR) and a Boolean filtering function that combines some bits from the shift register to create a key stream. A new attack on the filter generator has recently been described by Rønjom and Helleseth [6]. This paper gives an alternative and extended attack to reconstruct the initial state of the LFSR using the underlying subspace structure of the filter sequence. This improved attack provides further insight and more flexibility in performing the attack by Rønjom and Helleseth. The main improvements are that this attack does not use the coefficient sequences that were fundamental in the previous attack and also works in the unlikely cases when the original attack needed some modifications.

Pp. 204-217