2017
DOI: 10.1007/978-3-319-67882-5
|View full text |Cite
|
Sign up to set email alerts
|

Lattices Applied to Coding for Reliable and Secure Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 0 publications
0
8
0
1
Order By: Relevance
“…what is known as maximum likelihood decoding [4]. In general, solving (2) is an NP-hard problem for an arbitrary lattice [8].…”
Section: Problem Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…what is known as maximum likelihood decoding [4]. In general, solving (2) is an NP-hard problem for an arbitrary lattice [8].…”
Section: Problem Formulationmentioning
confidence: 99%
“…By exploiting the characteristics of the communications channel such as noise or fading, one can design lattice codes that minimize the probability of making decoding errors. For a nice introduction to the use of lattices for reliable and secure communications we refer the reader to [4].…”
Section: Introductionmentioning
confidence: 99%
“…In this section, we will provide a short practical motivation for the construction of generic well-rounded lattices with large packing densities. We refer the interested reader to [26,3,6,9] and references therein for more details on reliable and secure wireless communications.…”
Section: Secure Wireless Communicationsmentioning
confidence: 99%
“…The torus layers spherical codes (TLSC) [7], while not asymptotically dense, have a more homogeneous structure and have been shown to compare favorably with other codes for non-asymptotic minimum distances. This method foliates the sphere S 2n−1 by flat manifolds S 1 × • • • × S 1 and distributes points using good packing density lattices in the half-dimension [8], [9]. Other recent contributions to this topic include codes obtained by partitioning the sphere into regions of equal area [10], bounds for constructible codes near the Shannon bound [11], commutative group codes [12], [13] and cyclic group codes [14].…”
Section: Introductionmentioning
confidence: 99%
“…with η i := π/4 + i∆η as in(6), t := t(d) as in(7), m i := m(d, η i ) as in(9) and n i := n(d, η i ) as in(12). To construct a code in R 8 with minimum distance d = 0.5 by our standard procedure, we consider the foliation of S 7 by (S 3 ×S 3 ) η and use Proposition 1 to choose the set of parameters η ∈ {0.5053, π/4, 1.2907}.…”
mentioning
confidence: 99%