Show simple item record

dc.contributor.authorAl-Hassan, S
dc.contributor.authorAhmed, MZ
dc.contributor.authorTomlinson, M
dc.date.accessioned2019-04-17T11:24:17Z
dc.date.available2019-04-17T11:24:17Z
dc.date.issued2014-10
dc.identifier.isbn9781479967865
dc.identifier.issn2162-1233
dc.identifier.issn2162-1241
dc.identifier.urihttp://hdl.handle.net/10026.1/13722
dc.description.abstract

In this paper we present a code design technique which produces codes for syndrome coding which have better secrecy than the best error correcting codes. Code examples are given for the case where the number of parity bits of the code is equal to 15. The code design technique presented is based on extensions of the parity check matrix of a set of good equivocation codes of shorter length. It is also shown that syndrome coding can be implemented without the traditional syndrome look up table, enabling any length codes to be used. An efficient recursive method to calculate the equivocation rate for the binary symmetric channel (BSC) and any linear binary code is also presented. The design results show that the best equivocation codes (BEC) that are produced have better equivocation rate for the syndrome coding scheme compared to all previously published codes, including the best known codes (BKC).

dc.format.extent669-674
dc.language.isoen
dc.publisherIEEE
dc.subject4613 Theory Of Computation
dc.subject46 Information and Computing Sciences
dc.subject4006 Communications Engineering
dc.subject40 Engineering
dc.titleNew best equivocation codes for syndrome coding
dc.typeconference
dc.typeConference Proceeding
plymouth.date-start2014-10-22
plymouth.date-finish2014-10-24
plymouth.conference-name2014 International Conference on Information and Communication Technology Convergence (ICTC)
plymouth.publication-statusPublished
plymouth.journal2014 International Conference on Information and Communication Technology Convergence (ICTC)
dc.identifier.doi10.1109/ictc.2014.6983251
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA12 Engineering
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dc.identifier.eissn2162-1241
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1109/ictc.2014.6983251
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.typeConference Paper/Proceeding/Abstract


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV