On the Structure of Cyclotomic Fourier Transforms and Their Applications to Reed-Solomon Codes

被引:15
|
作者
Bellini, S. [1 ]
Ferrari, M. [1 ]
Tomasoni, A.
机构
[1] Politecn Milan, Dipartimento Elettron & Informaz, CNR IEIIT, I-20133 Milan, Italy
关键词
Fourier transforms; Galois fields; Reed-Solomon codes; convolution; COMPUTATION; GF(2(M));
D O I
10.1109/TCOMM.2011.060911.090145
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper is focused on cyclotomic Fourier transforms in GF(2(m)), and on their applications to algebraic decoding of Reed-Solomon codes, like the evaluation of syndromes and of error locator (or evaluator) polynomials. Cyclotomic transforms are much more efficient than straightforward evaluation. In particular, the number of multiplications is quite small. In this paper it is shown that also the number of additions can be considerably reduced with respect to previous analyses. A simple interpretation of the cyclotomic Fourier transform best suited for the evaluation of syndromes allows to assemble the required matrix easily and quickly, even in large fields. Fast construction of such matrices is important to obtain the best results, since as many matrices as possible must be generated and compared. It is shown that both the structure of the matrix and of bilinear convolutions need to be exploited, to reduce the complexity of the costly part of cyclotomic Fourier transforms, which is a matrix-vector product. Heuristic algorithms for matrix-vector product are to be run as many times as possible to obtain the best transform. It is shown with several examples that very good results can be obtained even with very simple algorithms.
引用
收藏
页码:2110 / 2118
页数:9
相关论文
共 50 条
  • [31] On the IPP Properties of Reed-Solomon Codes
    Fernandez, Marcel
    Cotrina, Josep
    Soriano, Miguel
    Domingo, Neus
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 87 - 97
  • [32] Lifted projective Reed-Solomon codes
    Lavauzelle, Julien
    DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (07) : 1541 - 1575
  • [33] A Topological View of Reed-Solomon Codes
    Besana, Alberto
    Martinez, Cristina
    MATHEMATICS, 2021, 9 (05)
  • [34] On error distance of Reed-Solomon codes
    LI YuJuan1 & WAN DaQing21 Institute of Mathematics
    Science in China(Series A:Mathematics), 2008, (11) : 1982 - 1988
  • [35] ON SHARING SECRETS AND REED-SOLOMON CODES
    MCELIECE, RJ
    SARWATE, DV
    COMMUNICATIONS OF THE ACM, 1981, 24 (09) : 583 - 584
  • [36] Advances in the performance of Reed-Solomon codes
    Daraiseh, AGA
    IEEE TRANSACTIONS ON COMMUNICATIONS, 1999, 47 (01) : 1 - 5
  • [37] Nonlinear Repair of Reed-Solomon Codes
    Con, Roni
    Tamo, Itzhak
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (08) : 5165 - 5177
  • [38] Recovering Reed-Solomon Codes Privately
    Kruglik, Stanislav
    Kiah, Han Mao
    Dau, Son Hoang
    Yaakobi, Eitan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 2807 - 2821
  • [39] Quantum Generalized Reed-Solomon codes
    State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an 710071, China
    Wuli Xuebao, 2008, 1 (28-30):
  • [40] A PROGRAMMABLE DECODER FOR REED-SOLOMON CODES
    KATSAROS, A
    INTERNATIONAL JOURNAL OF ELECTRONICS, 1988, 64 (04) : 641 - 647