Efficient decoders for short block length codes in 6G URLLC
This article reviews the potential channel decoding techniques for ultra-reliable low-latency
communications (URLLC). URLLC is renowned for its stringent requirements including ultra …
communications (URLLC). URLLC is renowned for its stringent requirements including ultra …
End-to-end deep learning of optical fiber communications
In this paper, we implement an optical fiber communication system as an end-to-end deep
neural network, including the complete chain of transmitter, channel model, and receiver …
neural network, including the complete chain of transmitter, channel model, and receiver …
A genome-wide algal mutant library and functional screen identifies genes required for eukaryotic photosynthesis
Photosynthetic organisms provide food and energy for nearly all life on Earth, yet half of their
protein-coding genes remain uncharacterized,. Characterization of these genes could be …
protein-coding genes remain uncharacterized,. Characterization of these genes could be …
Efficient design and decoding of polar codes
P Trifonov - IEEE transactions on communications, 2012 - ieeexplore.ieee.org
Polar codes are shown to be instances of both generalized concatenated codes and
multilevel codes. It is shown that the performance of a polar code can be improved by …
multilevel codes. It is shown that the performance of a polar code can be improved by …
Quantum error correction with only two extra qubits
Noise rates in quantum computing experiments have dropped dramatically, but reliable
qubits remain precious. Fault-tolerance schemes with minimal qubit overhead are therefore …
qubits remain precious. Fault-tolerance schemes with minimal qubit overhead are therefore …
[PDF][PDF] Complementary dual codes for counter-measures to side-channel attacks.
We recall why linear codes with complementary duals (LCD codes) play a role in counter-
measures to passive and active side-channel analyses on embedded cryptosystems. The …
measures to passive and active side-channel analyses on embedded cryptosystems. The …
Block Ciphers – Focus on the Linear Layer (feat. PRIDE)
The linear layer is a core component in any substitution-permutation network block cipher.
Its design significantly influences both the security and the efficiency of the resulting block …
Its design significantly influences both the security and the efficiency of the resulting block …
LS-designs: Bitslice encryption for efficient masked software implementations
Side-channel analysis is an important issue for the security of embedded cryptographic
devices, and masking is one of the most investigated solutions to mitigate such attacks. In …
devices, and masking is one of the most investigated solutions to mitigate such attacks. In …
Complementary Dual Codes for Counter-Measures to Side-Channel Attacks.
We recall why linear codes with complementary duals (LCD codes) play a role in counter-
measures to passive and active side-channel analyses on embedded cryptosystems. The …
measures to passive and active side-channel analyses on embedded cryptosystems. The …
LDPC-cat codes for low-overhead quantum computing in 2D
The main obstacle to large scale quantum computing are the errors present in every
physical qubit realization. Correcting these errors requires a large number of additional …
physical qubit realization. Correcting these errors requires a large number of additional …