Efficient decoders for short block length codes in 6G URLLC

C Yue, V Miloslavskaya… - IEEE …, 2023 - ieeexplore.ieee.org
This article reviews the potential channel decoding techniques for ultra-reliable low-latency
communications (URLLC). URLLC is renowned for its stringent requirements including ultra …

End-to-end deep learning of optical fiber communications

B Karanov, M Chagnon, F Thouin… - Journal of Lightwave …, 2018 - ieeexplore.ieee.org
In this paper, we implement an optical fiber communication system as an end-to-end deep
neural network, including the complete chain of transmitter, channel model, and receiver …

A genome-wide algal mutant library and functional screen identifies genes required for eukaryotic photosynthesis

X Li, W Patena, F Fauser, RE **kerson, S Saroussi… - Nature …, 2019 - nature.com
Photosynthetic organisms provide food and energy for nearly all life on Earth, yet half of their
protein-coding genes remain uncharacterized,. Characterization of these genes could be …

Efficient design and decoding of polar codes

P Trifonov - IEEE transactions on communications, 2012 - ieeexplore.ieee.org
Polar codes are shown to be instances of both generalized concatenated codes and
multilevel codes. It is shown that the performance of a polar code can be improved by …

Quantum error correction with only two extra qubits

R Chao, BW Reichardt - Physical review letters, 2018 - APS
Noise rates in quantum computing experiments have dropped dramatically, but reliable
qubits remain precious. Fault-tolerance schemes with minimal qubit overhead are therefore …

[PDF][PDF] Complementary dual codes for counter-measures to side-channel attacks.

C Carlet, S Guilley - Adv. Math. Commun., 2016 - researchgate.net
We recall why linear codes with complementary duals (LCD codes) play a role in counter-
measures to passive and active side-channel analyses on embedded cryptosystems. The …

Block Ciphers – Focus on the Linear Layer (feat. PRIDE)

MR Albrecht, B Driessen, EB Kavun, G Leander… - Advances in Cryptology …, 2014 - Springer
The linear layer is a core component in any substitution-permutation network block cipher.
Its design significantly influences both the security and the efficiency of the resulting block …

LS-designs: Bitslice encryption for efficient masked software implementations

V Grosso, G Leurent, FX Standaert, K Varıcı - … 2014, London, UK, March 3-5 …, 2015 - Springer
Side-channel analysis is an important issue for the security of embedded cryptographic
devices, and masking is one of the most investigated solutions to mitigate such attacks. In …

Complementary Dual Codes for Counter-Measures to Side-Channel Attacks.

C Carlet, S Guilley - ICMCTA, 2014 - Springer
We recall why linear codes with complementary duals (LCD codes) play a role in counter-
measures to passive and active side-channel analyses on embedded cryptosystems. The …

LDPC-cat codes for low-overhead quantum computing in 2D

D Ruiz, J Guillaud, A Leverrier, M Mirrahimi… - Nature …, 2025 - nature.com
The main obstacle to large scale quantum computing are the errors present in every
physical qubit realization. Correcting these errors requires a large number of additional …