Embodiments of the present disclosure are directed to methods of forming error correcting codes.
In coding theory, generalized Reed-Solomon (GRS) codes form a class of error-correcting codes (ECCs) that are constructed using finite fields. GRS codes can be defined as follows. Let q be a prime power, and let q be the finite field of q elements. We will consider a primitive GRS code, C, of length n:=q−1 and designed distance d∈*, d≥2. Note that since the most general GRS code, as defined, e.g., in Section 5.1 of R, M. Roth, Introduction to Coding Theory, Cambridge University Press, 2006, the contents of which are herein incorporated by reference in their entirety, may be obtained by shortening a primitive GRS code, there is no loss of generality in considering only primitive GRS codes. Let ã=(ã0, . . . , ãn−1)∈(*q)n be a vector of non-zero elements. For a vector f=(f0, f1, . . . , fn−1)∈qn, let f(X):=f0+f1X+ . . . +fn−1Xn−1∈q[X]. Now C⊆qn is defined as the set of all vectors f∈qn for which ã(X)⊙f(X) has roots 1, α, . . . , αd−2 for some fixed primitive α∈q, where (-⊙-) stands for coefficient-wise multiplication of polynomials: for f(X)=Σi=0r fiXi and g(X)=Σi=0s giXi, let m:=min{r, s}, and define f(X)⊙g(X):=Σi=0m figiXi. GRS codes allow a precise control over the number of symbol errors and erasures correctable by the code during code design, in particular, it is possible to design GRS codes that can correct multiple symbol errors and erasures. GRS codes can also be easily decoded using an algebraic method known as syndrome decoding. This can simplify the design of the decoder for these codes by using small, low-power electronic hardware.
The syndrome of a received codeword y=x+e, where x is the transmitted codeword and e is an error pattern, is defined in terms of a parity matrix H. A parity check matrix of a linear code C is a generator matrix of the dual code C⊥, which means that a codeword c is ire C iff the matrix-vector product Hc=0. Then, the syndrome of the received word y=x+e is defined as S=Hy=H(x+e)=Hx+He=0+He=He. For GRS codes, it is useful to work with a syndrome that corresponds to a particular parity-check matrix. For j∈{0, . . . , d−2}, let Sj=Sj(y):=(ã⊙y)(αj). The syndrome polynomial associated with y is S(y)(X):=S0+S1X+ . . . +Sd−2Xd−2. By the definition of a GRS code, the same syndrome polynomial is associated with e. In terms of syndromes, the main computation in decoding GRS codes is to determine polynomials ω(X), σ(X)∈q[X], that satisfy the following equation, known as a key equation:
ω≡Sσ mod(Xd−1),
where S=S(y) is the syndrome polynomial, X is a free variable in the polynomial, ω(X)∈q[X] is the error evaluator polynomial (EEP), defined by ω(X):=Σi=1εβiαiΠj≠i (1−αjX), σ(X)∈2
The Berlekamp-Massey (BM) algorithm is an algorithm for decoding GRS codes that finds an estimated ELP C(X)=1+C1X+C2X2+ . . . +CLXL which results in zero coefficients for Xk in S(X)C(X) for k=L, . . . , d−2 Sk+C1Sk−1+ . . . +CLSk−L=0, where L is the number of errors found by the algorithm, N=d−1 is the total number of syndromes, Si is the coefficient of Xi in the syndrome polynomial S(X) for all i, and k is an index that ranges from L to (N−1). Note that once the decoder has an estimate of the ELP, it can calculate an estimate of the EEP by the key equation. Note also that having both the ELP and the EEP, the decoder can find both the error locators and the error values, and therefore the error vector e itself, in the following way. The error locators are, by definition, the inverses of the roots of the EEP. The error values can be found using Forney's formula:
where for a polynomial f(X)=Σi=0mγiXl, f′(X):=Σi=1miγiXi−1 is the formal derivative.
The BM algorithm begins by initializing C(X) to 1, L to zero; B(X) (a copy of the last C(X) since L was updated) to 1, b (a copy of the last discrepancy d since L was updated and initialized) to 1; and m (the number of iterations since L, B(X), and b were updated and initialized) to 1. The algorithm iterates from k=0 to N−1. At each iteration k of the algorithm, a discrepancy d is calculated:
d=Sk+CjSk−1+ . . . +CLSs−L.
If d is zero, C(X) and L are assumed correct for the moment, in is incremented, and the algorithm continues.
If d is not zero and 2L>k, C(X) is adjusted so that a recalculation of d would be zero;
C(X)=C(X)−(d/b)XmB(X).
The Xm term shifts B(X) to follow the syndromes corresponding to b. If the previous update of L occurred on iteration j, then m=k−j, and a recalculated discrepancy would be:
d=Sk+C1Sk−1+ . . . −(d/b)(Sj+B1Sj−1+ . . . ).
This would change a recalculated discrepancy to: d=d−(d/b)b=d−d=0. Then, m is incremented, and the algorithm continues.
On the other hand, if d is not zero and 2L≤n, a copy of C is saved in vector T, C(X) is adjusted as above, B is updated from T, L is reset to (k+1−L), the discrepancy d is saved as b, in is reset to 1, and the algorithm continues.
A Chien search is an algorithm for determining roots of polynomials over a finite field, such as ELPs encountered in decoding GRS codes. Let a be a primitive element of a finite field. Chien's search tests the non-zero elements in the field in the generator's order α0, α1, α2, . . . . In this way, every non-zero field element is checked. If at any stage the resultant polynomial evaluates to zero, then the associated element is a root.
Hard information for a received symbol in Fq is the estimated symbol value, i.e., one of 0, 1, α, . . . , αq−2, while “soft information” includes both an estimated value and the reliability of this estimation. This reliability may take many forms, but one common form is the probability, or an estimation of this probability, that the estimation is correct, possibly plus a subset of Fq of the most probable alternative estimates for the received symbol. For example, if symbols of the GRS code are mapped to Quadrature Amplitude Modulation (QAM) symbols and transmitted through an Additive White Gaussian Noise (AWGN) channel, then the typical hard information may be obtained from the closest QAM symbol to the received coordinate, while for soft information, the reliability can be obtained by some decreasing function of the distance between the received coordinate and the closest QAM symbol, and the subset of Fq of the most probable alternative estimates may be, e.g., the symbols corresponding to the 2nd, 3rd, . . . , M-th (for some M≤q), closest QAM symbols to the received coordinate.
In hard-decision (HD) decoding, the hard-information vector (per-coordinate symbol estimates) is used as the input of an error-correcting code (ECC) decoder, while in soft-decision (SD) decoding, a soft information vector, e.g., per-coordinate reliability vector and, for each coordinate that is considered unreliable, a subset of Fq consisting of the most probable alternative estimates, on top of the hard-information vector, is used as the input of the ECC decoder.
As another example, in generalized concatenated coding schemes that may be employed in flash-memory controllers, decoders of per-row binary codes may return estimated symbols for GRS codes that work between different rows. In such a case, each per row binary decoder may output a single estimated GRS symbol or an indication of erasure in case of HD decoding, while SD decoding of the per-row binary codes may result in SD information for the inter-row GRS codes. In the case of a single-level cell (SLC) flash memory, in which each cell stores a single bit, hard information for the per-row binary codes is obtained with a single read (single threshold), while increasingly refined soft information is obtained from additional reads.
Symbols with a high enough reliability may be considered “strong”, while the remaining symbols may be considered “weak”.
Chase decoding is a simple and general method for SD decoding for both binary and non-binary codes. See D. Chase, “A Class of Algorithms for Decoding Block Codes With Channel Measurement Information”, IEEE Trans, inform. Theory, Vol. IT-18, pp. 170-182, January 1972, the contents of which are herein incorporated by reference in their entirety. In its simplest form, in case of HD decoding failure, “soft” reliability information is used to distinguish between reliable and non-reliable coordinates of a received word. The decoder then tries to replace the symbols on the weak coordinates by the symbol-vectors in some pre-defined list. For each such replacement, the decoder performs HD decoding. If the number of errors on the reliable coordinates is not above the HD decoding radius of the code and the hypothesized replacement vector is close enough to the transmitted vector on the non-reliable coordinates, in terms of Hamming distance, then HD decoding will succeed.
Consider now two replacement vectors that differ on a single coordinate. In a naïve application of Chase decoding, the similarity between these two replacement vectors is ignored, and two applications of HD decoding are required. In fast Chase decoding, intermediate results from the HD decoding of the first pattern are saved, and used to significantly reduce the complexity of HD decoding of the second, almost identical, pattern.
Recently, Wu, “Fast Chase decoding algorithms and architectures for Reed-Solomon codes”, IEEE Trans. Inform. Theory, vol. 58, no. 1, pp. 109-129, January 2012, the contents of which are herein incorporated by reference in their entirety, hereinafter Wu2012, introduced a new fast Chase decoding algorithm for Reed-Solomon (RS) codes for the case where the HD decoder is based on the Berlekamp-Massey (BM) algorithm. The basic form of Wu's algorithm enables avoiding multiple applications of the BM algorithm, but still requires an exhaustive root search, such as a Chien search, for each replacement vector. To avoid also unnecessary Chien searches, Wu suggests a stopping criterion for significantly reducing the probability of an unnecessary Chien search, while never missing the required Chien search, at the cost of slightly degrading the performance. However, Wu's method is conceptually complicated. There are 8 distinct cases to consider, and a considerable modification is required for working in the frequency domain, as an alternative method for avoiding Chien searches, etc. In addition, Wu's method is not capable of handling the case where the total number of errors is larger than d−1.
Exemplary embodiments of the disclosure provide a new fast Chase algorithm for generalized RS (GRS) codes for syndrome-based HD decoders. The new decoder is conceptually simpler than Wu's, and is based on two applications of Koetter's algorithm for each additional modified symbol. Also, the new decoder is automatically suitable for application in the frequency domain, by tracking evaluation vectors of both a polynomial and its formal derivative, Embodiments of the disclosure also provide a new stopping criterion for avoiding unnecessary Chien searches in a fast Chase algorithm according to an embodiment. An embodiment of an algorithm is somewhat more complicated than Wu's algorithm, but, as opposed to Wu's algorithm, is capable of working when the total number of errors is strictly larger than d−1, where d is the minimum distance of the decoded GRS code. Another embodiment of an algorithm works when the total number of errors is smaller than d−1 and has a complexity similar to that of Wu's algorithm”.
According to an embodiment of the disclosure, there is provided an application specific integrated circuit (ASIC) tangibly encoding a program of instructions executable by the integrated circuit to perform a method for fast Chase decoding of generalized Reed-Solomon (GRS) codes. The method includes using outputs of a syndrome-based hard-decision (HD) algorithm to find an initial Groebner basis G={g0=(g00, g01), g1=(g10, g11)} for a solution module of a key equation, upon failure of RD decoding of a GRS codeword received by the ASIC from a communication channel; traversing a tree of error patterns in
on a plurality of unreliable coordinates to adjoin a next weak coordinate wherein n0 is a number of the unreliable coordinates, i1, . . . , in
According to a further embodiment of the disclosure, the syndrome-based HD algorithm is selected from a group that includes the Berlekamp-Massey (BM) algorithm and Fitzpatrick's algorithm.
According to a further embodiment of the disclosure, finding an initial Groebner basis G includes defining polynomials b1:=(Sσ mod Xd−1, σ), and b2 (SXmB mod Xd−1, XmB), wherein S is the syndrome polynomial, σ is the estimated ELP output by the BM algorithm, m is the number of iterations since the last linear feedback shift register (LFSR) length change in the BM algorithm, and B is a polynomial output from the BM algorithm that is a copy of the last estimated ELP σ before the LFSR length L was updated; and outputting one of (1) c{b1, b2} as the Groebner basis when leading monomials of b1 and b2 contain distinct unit vectors, for a non-zero constant c; (2) {d(b1−cX1b2), db2} as the Groebner basis when the leading monomials contain a same unit vector and the leading monomial of b1 is at least as large as that of b2, wherein c∈K* and l∈N are chosen such that the leading monomial of b2 is canceled and d is a non-zero constant, or (3) {db1, d(b2−cX1b1)} as the Groebner basis when the leading monomials contain the same unit vector and the leading monomial of b2 is strictly larger than that of b1, wherein c∈K* and l∈N* are chosen such that the leading monomial of b2 is canceled and d is a non-zero constant.
According to a further embodiment of the disclosure, traversing a tree of error patterns to find a Groebner basis G+ for each adjoining error location includes calculating a root discrepancy Δjrt:=gj1(αr−1) for j=0 and 1, wherein g0=(g00(X), g01(X)) and g1=(g10(X), g11(X)) constitute a current Groebner basis and αr is a next error location and r is a number of error locations; setting, when a set
when (j≠j*), wherein j*∈J is such that a leading monomial of gj* is a minimum leading monomial of (gj) for all j∈J and c is a non-zero constant, or g+j:=c(X−αr−1)gj* when j=j*, wherein X is a free variable; setting gj:=g+j for j=0 and 1; calculating a derivative discrepancy Δjder:=βrαrg′j1(αr−1)+αrgj0(αr−) for j=0 and 1, wherein βr is a value of location αr, and g′j1(X) is a formal derivative of gj1(X); setting, when a set
when (j≠j), wherein j*∈J is such that a leading monomial of M(gj*)=a minimum leading monomial of (gj) for j∈J and c is a non-zero constant, or g+j:=c(X−αr−1)gj* when j=j*.
According to a further embodiment of the disclosure, the method includes, when set J:={j∈{0, 1}|Δjrt≠0}=Ø or when set J:={j∈{0, 1}Δjder≠0}=Ø, setting g+j:=gj for j=0, 1, where g+0=(g+00, g+01) and g+1=(g+10, g+11) is a Groebner basis G+ for the next error locator.
According to a further embodiment of the disclosure, the method includes determining whether a root discrepancy is zero for j=1 and a derivative discrepancy is zero for j=1, and stopping setting of g+j, if it is determined that both the root discrepancy and the derivative discrepancy are zero for j=1.
According to a further embodiment of the disclosure, the method includes tracking a degree of Groebner basis function g00 with a variable d0 by increasing d0 by 1 whenever j*=0.
According to a further embodiment of the disclosure, the method includes tracking two polynomials g01(X), g11(X); and calculating, gj0(αr−1) by using the key equation for j=0, 1.
According to a further embodiment of the disclosure, calculating gj0(αr−1) includes calculating and storing, for k=2t−δ−1 to 2t−2, {tilde over (B)}k+1=αr−1. {tilde over (B)}k−(gj1)2t−1−k and result=result+Sk+1{tilde over (B)}k+1, wherein δ:=deg(gj1), {tilde over (B)}k is initialized to 0, (gj1)m is a coefficient of Xm in gj1, result is initialized to 0, and Sk+1 is a coefficient of the syndrome polynomial; updating result=result·(αr−1)2t; and outputting result. The steps of calculating and storing, for k=2t−δ−1 to 2t−2, {tilde over (B)}k+1 and result, updating result and outputting result are performed while adjoining the next weak coordinate αr.
According to a further embodiment of the disclosure, the method includes calculating and storing (αm−1)2t for all weak coordinates αm, wherein t=└(d−1)/2┘ is an error correction radius of a GRS code of designed distance d.
According to another embodiment of the disclosure, there is provided a non-transitory program storage device readable by a computer, tangibly embodying a program of instructions executed by the computer to perform the method steps for fast Chase decoding of generalized Reed-Solomon (GRS) codes.
Exemplary embodiments of the invention as described herein generally provide systems and methods for performing fast Chase decoding of generalized Reed-Solomon codes. While embodiments are susceptible to various modifications and alternative forms, specific embodiments thereof are shown by way of example in the drawings and will herein be described in detail. It should be understood, however, that there is no intent to limit the invention to the particular forms disclosed, but on the contrary, the invention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention.
Embodiments of the disclosure use a combination of a syndrome-based hard decision algorithm, such as the Berlekamp-Massey algorithm, and Koetter's algorithm for fast Chase decoding of generalized Reed-Solomon codes, and therefore also for fast Chase decoding of their subfield subcodes. Ira case of hard-decision decoding failure, an algorithm according to an embodiment begins by finding a Groebner basis for the solution module of the key equation. This Groebner basis can be obtained from the existing outputs of the Berlekamp-Massey algorithm, or alternatively, the Euclidean algorithm or Fitzpatrick's algorithm (see P. Fitzpatrick, “On the key equation,” IEEE Trans. Inform. Theory, vol. 41, no. 5, pp. 1290-1302, September 1995, the contents of which are herein incorporated by reference in their entirety, hereinafter Fitzpatrick) may be used. Then, the above Groebner basis is used as an initial value in Koetter's algorithm, as described, e.g., in R. J. McEliece, “The Guruswami-Sudan decoding algorithm for Reed-Solomon codes,” IPN Progress Report, vol. 42-153, May 2003, the contents of which are herein incorporated by reference in their entirety. This leads to a tree-based Chase scheduling. Modifying an unmodified coordinate in the received vector amounts to 2 updates in Koetter's algorithm, and does not require updating syndromes. An algorithm according to an embodiment uses the same number of finite-field multiplications per iteration as Wu's algorithm, but it is conceptually simpler.
Let q be a prime power, and let Fq be the finite field q elements. Consider a primitive generalized Reed-Solomon (GRS) code, C, of length n:=q−1 and designed distance d∈N*, d≥2, where N* is the set of positive integers. Since the most general GRS code can be obtained by shortening a primitive GRS code, there is no loss of generality in considering only primitive GRS codes. In detail, let ã=(ã0, . . . , ãn−1)∈(F*q)n be a vector of non-zero elements. For a vector f=(f0, f1, . . . , fn−1)∈Fqn, let f(X):=f0+f1X+ . . . +fn−1Xn−1∈Fqn[X]. Now C⊆Fqn is defined as the set of all vectors f∈Fqn for which ã(X)⊙f(X) has roots 1, α, . . . , αd−2 for some fixed primitive α∈q, where (-⊙-) stands for coefficient-wise multiplication of polynomials: for f(X)=Σi=0rfiXi and g(X)=Σi=0sgiXi, let m:=min{r, s}, and define f(X)⊙g(X):=Σi=0mfigiXi.
To recall the key equation, suppose that a codeword x∈C is transmitted, and the received word is y:=x+e for some error vector e∈Fqn. For j∈{0, . . . , d−2}, let Sj=Sj(y):=(ã⊙y)(αj). The syndrome polynomial associated with y is S(y)(X):=S0+S1X+ . . . +Sd−2Xd−2. By the definition of the GRS code, the same syndrome polynomial is associated with e.
If v∈Fqn is such that v(X)=Xi for some i∈{0, . . . , n−1}, then Sj(v)=(ã⊙v)(αj)=ãi(αi)j, so that
So, if the error locators are some distinct elements α1, . . . , αε∈*q, where ε∈{1, . . . , n} is the number of errors, and the corresponding error values are β1, . . . , βε∈*q, then
where αi:={tilde over (α)}i, for the i′∈{0, . . . , n−1} with αi=αi′.
Defining the error locator polynomial, σ(X)∈Fq[X], by
σ(X):=Πi=1ε(1−αiX),
and the error evaluator polynomial, ω(X)∈Fq[X], by
ω(X):=Σi=1εαiβiΠj≠i(1−αjX),
it follows from EQ. (1) that
ω≡S(y)σ mod(Xd−1). (2)
EQ. (2) is the so-called key equation.
Let
M0=M0(S(y)):={(u,v)∈Fq[X]2|u≡S(y)v mod(Xd−1)}.
be the solution module of the key equation. Next, recall that if the number of errors in y is up to t:=└(d−1)/2┘, then (ω, σ) is a minimal element in M0 for an appropriate monomial ordering on Fq[X]2, in fact, it is the unique minimal element (u,v)∈M0 with v(0)=1—see ahead for details. The monomial ordering of the following definition is the special case of the ordering <r corresponding to r=−1 of Fitzpatrick. If a pair (f(X), g(X)) is regarded as the bivariate polynomial f(X)+Yg(X), then this ordering is also the (1, −1)-weighted-lex ordering with Y>X
The following proposition is a special case of Thm. 3.2 of Fitzpatrick. Its proof is included herein for completeness. Unless noted otherwise, LM(u,v) will stand for the leading monomial of (u,v) with respect to the above monomial ordering, <, and a “Groebner basis” will stand for a Groebner basis with respect to <. Note that in the following proposition, dH(y,x) represents the Hamming distance between vectors y and x.
Now let (u,v)∈M0(S(y)), and note that gcd(ω, σ)−1. If deg(v)>t≥deg(σ), then clearly LM(u,v)>LM(ω, σ)=(0, Xdeg(σ)). Similarly, if deg(u)>t−1≤deg(σ)−1, then LM(u,v)>LM(ω, σ). Hence, it may be assumed without loss of generality that deg(v)≤t and deg(u)≤t−1. The above claim then shows that (u,v)=f·(ω, σ) for some, F∈Fq[X]. If LM(u,v)≤LM(ω, σ), this must imply that f is a constant, as required. This also shows that LM(u,v)=LM(ω, σ).
It will also be useful to recall that the uniqueness in the previous proposition is an instance of a more general result:
An observation according to an embodiment is that the LFSR minimization task A[σi], disclosed on page 112 of Wu2012, incorporated above, does not define a module, and can be replaced by a module minimization task. The possibility of using Koetter's algorithm as an alternative to Wu's method follows almost immediately from the following theorem.
where in the second equation v(αj−1)=0 was used, and in the third equation βjαjv′(αj−1)=αju(αj−1) was used (note that βjαj≠0).
2. The proof is by induction on r. For r=0, the assertion is just Proposition 2.2, Suppose that r≥1, and the assertion holds for r−1. Let {tilde over (y)} be obtained from y by subtracting βr from coordinate αr. Let {tilde over (σ)}:=σ/(1−αrX), the error locator for {tilde over (y)}, and let {tilde over (ω)} be the error evaluator for {tilde over (y)}. By the induction hypothesis,
LM({tilde over (ω)},{tilde over (σ)})=min{LM(u,v)|(u,v)∈Mr−1} (3)
with
Mr−1:=Mr−1(S({tilde over (y)}),α1, . . . ,αr−1,β1, . . . ,βr−1).
The following lemma will be useful,
which proves the first assertion.
For the second assertion, note first that
and therefore
where “≡” stands for congruence modulo Xd−1, which implies that ({tilde over (h)}, {tilde over (v)}) satisfies the required congruence relation in the definition of Mr−1. Also, clearly {tilde over (v)}(αj−1)=0 for all j∈{1, . . . , r−1}. Finally, using v′=αr{tilde over (v)}+(1−αrX){tilde over (v)}′ again, it can be seen that for all j∈{1, . . . , r−1},
This proves that ψ maps Mr into Mr−1.
Finally, ψ(ω, σ)=({tilde over (h)}, {tilde over (σ)}) with {tilde over (h)}=(ω−βrαr{tilde over (σ)})/(1−αrX), and it is straightforward to verify that {tilde over (h)}={tilde over (ω)}. In detail, for ε:=t+r, let α′1, . . . , α′ε∈F*q be some enumeration of the error locators, let β′1, . . . , β′ε∈F*q be the corresponding error values, and let α′1, . . . , α′ε be the corresponding entries of the vector it {tilde over (α)}. Assume without loss of generality that α′ε=αr, and hence β′ε=βr. It follows that
This concludes the proof of the lemma.
Returning to the proof of the theorem, if (u,v)∈Mr and v=c·σ for some c∈F*q, then LM(u,v)≥(0, Xdeg(σ))=LM(ω, σ). Let (u,v)∈Mr\{0} be such that v≠cσ for all c∈F*q. Then, ψ(u,v)≠c({tilde over (ω)}, {tilde over (σ)}) for all c∈F*q, and hence
LM(ψ(u,v))>LM({tilde over (ω)},{tilde over (σ)})=(0,Xdeg(σ)−1), (4)
where the inequality can be obtained by the induction hypothesis and Proposition 2.3. If the leading monomial of ψ(u,v) is of the form (0, Xj) for some j, then LM(ψ(u,v))=(0, Xdeg(v)−1), and EQ. (4) implies deg(v)>deg(σ), so that certainly LM(u,v)>LM(Ω, σ).
Suppose therefore that LM(ψ(u,v)) is of the form (Xj, 0) for some j, that is, LM(ψ(u,v))=(Xdeg(h)−1, 0). In this case, EQ. (4) implies that deg(h)−1>deg(σ)−2, that is, deg(h)≥deg(σ). But since h=u−βrαr{tilde over (v)}, this implies that at least one of u and {tilde over (v)} must have a degree that is at least as large as deg(σ). Now, if deg(u)≥deg(σ), that is, if deg(u)>deg(σ)−1, then LM(u,v)>LM(ω, σ)=(0, Xdeg(σ))). Similarly, if deg({tilde over (v)})≥deg(σ), then deg(v)>deg(σ), and again LM(u,v)>LM(ω, σ). This completes the proof.
Using the terminology of Theorem 3.1, for a pair (u(X), v(X)∈Mr−1, embodiments define the r-th root condition on (u,v) as v(αr−1)=0, so that the root condition on (u,v) involves only v, and the r-th derivative condition as βrαrv′(αr−1)=−αru(αr−1). The above pair (u,v) is in Mr⊂Mr−1iff it satisfies both the r-th root condition and the r-th derivative condition. When moving from Mj to Mj+1, two additional functionals are zeroed. It was already proved in the theorem that each Mj is a K[X]-module. Also, the intersection of Mj with the set of pairs (u, v) for which v(αj+1−1)=0 is clearly a K[X]-module. Hence, if each “root condition” comes before the corresponding “derivative condition,” two iterations of Koetter's algorithm can be used to move from a Groebner basis for Mj to a Groebner basis for Mj+1.
A description of Koetter's iteration is presented in Appendix, below. Using the terminology of the appendix, in the current context l=1, and, as already mentioned, there are two types of Koetter iterations: one for a root condition, and the other for a derivative condition. For a fair comparison with Algorithm 1 of Wu2012, the version of Koetter's iteration presented herein does include inversions, in this version, the right-hand sides of the update rules are both divided by Δj*. Recall that multiplication of elements by non-zero constants takes a Groebner basis to a Groebner basis.
In the r-th root iteration, the linear functional D acts on a pair (u,v) as D(u,v)=v(αr−1), and hence on X·(u,v) as D(X·(u,v))=αr−1 D(u,v). In the r-th derivative iteration, which comes after the r-th root iteration,
D(u,v)=βrαrv′(αr−1)+αru(αr−1),
and therefore also
where (Xv)′=Xv′+v was used in the second equality and v(αr−1)=0. So, for both types of iterations, root condition and derivative condition, D(X·(u,v))/D(u,v)=αr−1 if D(u,v)≠0. Hence, the iteration corresponding to a single location αr has the following form.
Algorithm A: Koetter's Iteration for Adjoining Error Location αr:
The next error location, αr, and the corresponding error value, βr.
Regarding the j≠j* part of step 121, note that multiplication by a non-zero constant is possible in other embodiments. For example, an update of the form gj+=Δj*gj−Δjgj* is also allowed.
It should be noted that multiplying all elements of a Groebner basis by (possibly different) non-zero constants results in a Groebner basis. Hence, multiplying the outputs of Algorithm A by non-zero constants again gives a Groebner basis with the required properties. Moreover, in Algorithm A, if each update of the form
or g+j*:=(X−αr−1)gj* is replaced by
or g+j*:=c′(X−αr−1)gj*, respectively, where c, c′ are non-zero constants that may depend on j, then the output will still he a Groebner basis with the required properties.
A stopping criterion for a Koetter algorithm according to an embodiment for fast Chase decoding, implemented as steps 101, 109, and 111, is as follows. Suppose that (α1, β1), . . . , (αr, βr) are correct pairs of error locations and corresponding error values, and that, as above, r=ε−t, so that an error-locator polynomial is, up to non-zero multiplicative constant, the second coordinate of the output g1+ of the derivative step of Koetter's iteration for adjoining error-locator αr. However, it is expensive to perform a Chien search. However, suppose there exists one more erroneous location, αr+1, within the weak coordinates, with corresponding error value is βr+1. Then, according to embodiments of the disclosure, in Koetter's iteration for adjoining the pair (αr+1, βr+1) to (α1, β1), . . . , (αr, βr). Δ1=0 for both the root step and the derivative step. For the root step, this follows from the fact that αr+1−1 is a root of the ELP σ(X), and for the derivative step it follows from the fact that ω(X), σ(X) satisfy Forney's formula. Thus, checking if Δ1=0 for both the root step and the derivative step can serve as a stopping criterion. However, it is possible that Δ1=0 for both the root step and the derivative step even if there is not a correct error-locator polynomial, i.e., a false positive. The cost of handling a false positive is an increased complexity. However, even if the false positive rate is of the order 1/100, or even 1/10, the overall increase in complexity is negligible, and a Monte Carlo simulation can be used to obtain a reliable estimation in such situations. The cost of a stopping criterion according to an embodiment involves performing one more root step and half a derivative step for the discrepancy calculations for a sphere of radius r+1 when ε−t is only r. This reduces the overall complexity gain over a brute force Chien search. When ε−t=r, r+1 errors are needed in the weak coordinates, which slightly degrades the FER in comparison to a brute force Chien search. It is to be understood that the implementation of a stopping criteria according to an embodiment in steps 101, 109, and 111 is exemplary and non-limiting, and other embodiments of the disclosure can use different implementations to achieve a same result.
Next, according to an embodiment, consider some simplifications. The above scheme has two pairs of polynomials to be maintained, rather than just two polynomials. In the above form, the algorithm will work even if ε≥2t, where ε is the total number of errors. It should be noted that Wu's fast Chase algorithm does not have a version that supports more than 2t−1 errors. However, if ε≤2t−1, as supported by Wu's algorithm, there is no need to maintain the first coordinate of the Groebner basis. For this, two questions should be answered:
To answer the second question: introduce a variable d0 to track the degree of g00. Whenever j*=0, increase d0 by 1, and in all other cases keep d0 unchanged. Note that when 0∈J but 0≠j*, LM(g+0)=LM(g0), as shown in Appendix A, which justifies keeping d0 unchanged.
Recalling that the algorithm of
Turning to the first question, it is known that for all r and all (u,v)∈Mr(S(y), α1, . . . , αr, β1, . . . , βr), then u≡S(y)v mod (X2t), and hence one can calculate u(αr−1) directly from v if deg(u)≤2t−1 (see ahead). So, a first task is to verify that if ε≤2t−1, so that r≤2t−1−t=t−1, then deg(g10)≤2t−1 and deg(g20)≤2t−1 for all Koetter's iterations involved in fast Chase decoding, assuming the hypotheses of Theorem 3.1 hold.
First, however, recall the following proposition, which is just a re-phrasing of Prop. 2 of Beelen, et al., “On Rational Interpolation-Based List-Decoding And List-Decoding Binary Goppa Codes”, IEEE Trans. Inform. Theory, Vol. 59, No. 6, pp. 3269-3281, June 2013 the contents of which are herein incorporated by reference in their entirety. For the sake of completeness, a proof is included in Appendix B. From this point on, a monomial in K[X]2 will be said to be on the left if it contains the unit vector (1, 0), and on the right if it contains the unit vector (0, 1).
With Proposition 4.1, it can be proven that for all iterations of Koetter's algorithm, deg(g10)≤2t−1 and deg(g20)≤2t−1 when ε≤2t−1. Before the proof, it will be useful to introduce some additional notation.
Definition 4.2: For i=1, . . . , r, j∈{0, 1}, and T∈{root, der} write gj(i; T)=(gj0(i; T), gj1(i; T)) and g+j(i; T)=(g+j0(i; T), g+j1(i: T)) for the values in the root step (T=root) or the derivative step (T=der) of Algorithm A corresponding to adjoining error location αj. Explicitly, the notation g0(i; root) and gt(i; root) are the values of the input variables g0 and g1 respectively, during the root iteration of the application of algorithm A for adjoining αi. Similarly, g0(i; der) and g1(i; der) are the values of the input variables g0 and g1, respectively, during the derivative iteration of the application of algorithm A for adjoining αi. By convention, {g0(1; root), g1(1; root)} is a Groebner basis for M0 with LM(g0(1; root)) on the left and LM(g1(1; root)) on the right.
Turning to g0(i; T), note that for all i, j, and T, LM(g+j(i; T))>LM(gj(i; T)) for at most one j∈{0, 1}. Also, for j∈{0, 1} and for each i and T with LM(g+j (i; T))>LM(gj(i; T)), LM(g+j(i; T))=X LM(gj(i; T)) is true. Since the degree of the second coordinate of gj(i; T), the coordinate containing the leading monomial, must increase from deg(g1j(1; root)) for i=1 and T=root to deg(σ)=ε for i=r and T=der, it follows that
|{(i,T)|LM(g+1(i;T))>LM(g1(i;T))}|=ε−deg(g11(1;root)),
and therefore,
Hence, for all i and T,
Finally, since the leading monomial of g0(i; T) is on the left, it follows that deg(g01(i; T))−1<deg(g00(i; T)≤ε, which proves deg(g01(i; T))≤ε.
Using Proposition 4.3, gj0(αr−1) can be calculated in Algorithm A while maintaining only the right polynomials gj1(j∈{0, 1}). According to embodiments of the disclosure, an efficient O(t) method for calculating gj0(αr−1) is as follows.
For a polynomial v(X)∈K[X], assume that δ:=deg(v)≤ε≤2t−1, and write v(X)=v0+v1X+ . . . +v2t−1X2t−1. For short, write S(X)=S0+S1X+ . . . +S2t−1X2t−1:=S(y)(X). Then for β∈Fq, (Sv mod(X2t)) (β) can be expressed as
S0v0+(S0v1+S1v0)β+(S0v2+S1v1+S2v0)β2+ . . . (S0v2t−1+S1v2t−2+S2v2t−3+ . . . +S2t−1v0)β2t−1, (5)
For j∈{0, . . . , 2t−1}, let Aj(v, β) be the sum over the j-th column of EQ. (5). Then
Aj(v,β)=Sjβj(v0+v1β+ . . . +v2t−1−jβ2t−1−j),
If 2t−1−j≥δ(=deg(v)), then Aj(v, β)=Sjβfv(β). Hence if β is a root of v(X), then
(Sv mod(X2t))(β)=Σj=02t−1Aj(v,β)=Σj=2t−δ2t−1Aj(v,β) (6)
The sum on the right-hand side of EQ. (6) may be calculated recursively. For this, let
Ãj(v,β):=βjΣi=02t−1−jviβi,
so that Aj(v, β)=SjÃj(v, β). Then Ã2t−δ−1=0, and for all j∈{2t−δ−1, . . . , 2t−2},
Calculating, β2t takes O(log2(2t)) squarings and multiplications. In fact, this can be calculated once, before starting the depth-first search in Wu's tree, for all non-reliable coordinates, not just for those corresponding to a particular leaf. After that, each one of the iterations of EQ. (7) in the calculation of the sum of EQ. (6 requires 2 finite-field multiplications: two for moving from Ãj(v, β)/β2t to Ãj+1(v, β/β2t, and one for multiplying by Sj+1 before adding to an accumulated sum. Then, after the calculation of the accumulated sum, one additional multiplication by β2t is required.
Before starting an algorithm of
Next, at step 22, check whether the syndrome-based hard decision algorithm succeeded in finding an error vector of weight up to t, where t is the error-correction radius of the GRS code, i.e.,
If the syndrome-based hard decision algorithm is the BM algorithm, then one way of doing this is to let the output of the BM algorithm be a pair ({circumflex over (σ)}, L), where {circumflex over (σ)}={circumflex over (σ)}(X) is the estimated ELP, while L is the LFSR length calculated in the BM algorithm. The decoding is a success if the following condition holds: deg({circumflex over (σ)}(X))=L and {circumflex over (σ)}(X) has L distinct roots in Fq.
If, at step 28, the HD decoding is successful, let the estimated error locations be the inverses of the roots of the estimated ELP {circumflex over (σ)}(X), calculate the error values, and estimate ê for the error vector from the estimated error locations and error values, and output the estimate {circumflex over (x)}:=y+ê for x.
According to embodiments, error values can be calculated by finding the error evaluator polynomial (EEP) ω(X)∈Fq[X], by ω(X):=Σi=1εαiβiΠj≠i(1−αjX), by substituting {circumflex over (σ)}(X) as the ELP in the key equation ω≡S(y)σ mod (Xd−1). According to other embodiments, error values can be calculated using Forney's formula.
Otherwise, if the HD decoding is unsuccessful, the unreliable (“weak”) coordinates and their potential error values are identified at step 24, and an initial Groebner basis G based on the outputs of the syndrome-based hard decision algorithm is found at step 25.
According to embodiment, if the syndrome based hard decision algorithm is the BM algorithm, finding an initial Groebner basis G based on the BM algorithm outputs includes defining b1:=(Sσ mod Xd−1, σ), and b2:=(SXmB mod Xd−1, XmB), where B is a polynomial output from the BM algorithm that is a copy of the last ELP before L was updated, and outputting one of (1) c{b1, b2} as the Groebner basis if the leading monomials of b1 and b2 contain distinct unit vectors, where c is a non-zero constant; (2) d{b1−cXlb2, b2} as the Groebner basis if the leading monomials contain the same unit vector and the leading monomial of b1 is at least as large as that of b2, where c∈K* and l∈N are chosen such that the leading monomial of b1 is canceled, and d is a non-zero constant; or (3) {db1, d(b2−cXlb1)} as the Groebner basis if the leading monomials contain the same unit vector and the leading monomial of b2 is strictly larger than that of b1, where c∈K* and l∈N* are chosen such that the leading monomial of b2 is canceled, and d is a non-zero constant.
Next, a subset of all possible error patterns
on the unreliable coordinates is scanned, where n0 is the number of unreliable coordinates, and i1, . . . , in
At step 26, traverse the tree of error patterns until Δ1=0 for both the root and der steps, wherein moving from a vertex corresponding to an error pattern with error locations α1, . . . , αr−1 and corresponding error values β1, . . . , βr−1 to a child with one additional error location αr and corresponding error value βr corresponds to moving from a current Groebner basis G={g0=(g00, g01), g1=(g10, g11)} for Mr−1(S(y), αj, . . . , αr−1, β1, . . . , βr−1), with LM(gj) containing the j-th unit vector for j∈{0, 1} to a Groebner basis G+={g+0=(g+00, g+01)), g+1=(g+10, g+11)} for Mr(S(y), α1, . . . , αr, β1, . . . , βr) with LM(g+j) containing the j-th unit vector for j∈{0, 1}. According to embodiments, Koetter's iteration Algorithm A for adjoining error locations αr can be used to move from the Groebner basis G to the Groebner basis G+.
The correct error pattern is reached if there is a total t+r of erroneous coordinates in y, and if α1, . . . , αr are indeed error locations and β1, . . . , βr are indeed the corresponding error values, and it is guaranteed that the output g1+ of the algorithm satisfies g1+=c·(ω, σ) for some non-zero constant c, where ω is the EEP and σ is the ELP. To use a simplified stopping criterion according to an embodiment, the maximum tree depth should be increased by 1, and a Chien search is performed only in case Δ1=0 for both the root and the derivative iterations. If there is one additional error locator αr+1 in the weak coordinates and the set of potential error patterns for coordinate αr+1 includes the correct error value βr+1 for αr+1, then the stopping criterion will succeed.
If, at step 27, a valid estimated error value ê was found, {circumflex over (x)}=y+ê is output at step 28 as an estimate for the transmitted codeword x. Otherwise, at step 29. If no such ê is found, a decoding failure is output.
According to embodiments, the complexity of an algorithm according to an embodiment can be roughly compared with one iteration of Wu's Algorithm 1, pp. 114-115 of Y. Wu, “Fast Chase Decoding Algorithms and Architectures for Reed-Solomon Codes”, IEEE Trans. Inform. Theory, Vol. 58, No. 1, pp. 109-129, January 2012, incorporated by reference above.
In Wu's iteration, there are 2 substitutions in polynomials of degrees typically growing from t to ε, and two calculations of substitutions of the form (Sf mod X2t)(x) based on the knowledge of f, using Wu's, EQS. (23) and (24). Each of the last two substitutions takes about 2t multiplications, noting that the internal sums of Wu's, EQS. (23) and (24) were already calculated for the first two substitutions.
In an algorithm according to an embodiment, there are 2 substitutions in polynomials of degrees typically growing from t to ε, two calculations of substitutions of the form (Sf mod X2t)(x) based on the knowledge of f using the recursion EQ. (7), each requiring about 2t multiplications, and two substitutions in the derivative g′j1, which, in characteristic 2 has non-zero coefficients only for even powers of X.
In a typical application of Wu's algorithm, there are 3 multiplications of a vector by a scalar, where the vector length typically grows from t to ε. On the other hand, in an algorithm according to an embodiment, there are 4 such multiplications, 2 for each one of the root and der steps. However, this advantage of Wu's algorithm is balanced by the following item.
Wu's method requires a syndrome update step that updates about t syndrome coordinates with a total of about t multiplications, which is completely avoided in an algorithm according to an embodiment.
Considering the above, the complexity of an algorithm according to an embodiment is somewhat higher than that of Wu's iteration. However, it is conceptually simpler. Also, an algorithm according to an embodiment is suitable for working in the so-called transform domain, using evaluation vectors of both the and the formal derivatives of the gj1. Moreover, an algorithm according to an embodiment can work also for the case where the total number of errors is strictly above d−1, by maintaining two pairs of polynomials.
It is to be understood that embodiments of the present disclosure can be implemented in various forms of hardware, software, firmware, special purpose processes, or a combination thereof. In one embodiment, the present disclosure can be implemented in hardware as an application-specific integrated circuit (ASIC), or as a field programmable gate array (FPGA). In another embodiment, the present disclosure can be implemented in software as an application program tangible embodied on a computer readable program storage device. The application program can be uploaded to, and executed by, a machine comprising any suitable architecture.
The computer system 31 also includes an operating system and micro instruction code. The various processes and functions described herein can either be part of the micro instruction code or part of the application program (or combination thereof) which is executed via the operating system. In addition, various other peripheral devices can be connected to the computer platform such as an additional data storage device and a printing device.
It is to be further understood that, because some of the constituent system components and method steps depicted in the accompanying figures can be implemented in software, the actual connections between the systems components (or the process steps) may differ depending upon the manner in which the present invention is programmed. Given the teachings of the present invention provided herein, one of ordinary skill in the related art will be able to contemplate these and similar implementations or configurations of the present invention.
While the present invention has been described in detail with reference to exemplary embodiments, those skilled in the art will appreciate that various modifications and substitutions can be made thereto without departing from the spirit and scope of the invention as set forth in the appended claims.
A. Koetter's Algorithm
For completeness, a self-contained presentation of Koetter's algorithm is presented hereinbelow, taken from Sect. VII.C of R. J. McEliece, “The Guruswami-Sudan Decoding Algorithm for Reed-Solomon Codes”, IPN Progress Report, Vol. 42-453, May 2003, the contents of which are herein incorporated by reference in their entirety. For convenience, the current presentation of the algorithm is stated in the language of Groebner bases.
Let K be a field. Fork l∈N* and for a K[X]-submodule M of K[X]l+1 with rank(M)=l+1, suppose that there is a Groebner basis G={g0, . . . , gl} for M with respect to some monomial ordering < on K[X]l+1. In such a case, the leading monomials of the gj must contain distinct unit vectors, as otherwise, the leading monomial of two basis vectors would contain the same unit vector, so that the leading monomial of one vector divides the leading monomial of the other vector. In such a case, one of the basis vectors may be discarded which leaves a Groebner basis, which is, in particular, a set of less than l+1 generators for a free module of rank l+1, which is a contradiction. Thus, according to an embodiment, it may be assumed without loss of generality that the leading monomial of gj contains the j-th unit vector, for all j∈{0, . . . , l}, where coordinates of vectors are indexed by 0, . . . , l.
From this point on, according to an embodiment, < will stand for an arbitrary monomial ordering on K[X]l+1.
Now let D: K[X]l+1→K be a non-zero linear functional that satisfies the following property:
MOD M+:=M∩ker(D) is a K[X]-module,
Before proceeding, it may be useful to note that, as a consequence of the proof of validity of Koetter's algorithm appearing ahead, it holds that moving from M to M+ does not decrease the rank. The purpose of Koetter's algorithm is to convert the (l+1)-element Groebner basis G of M to an (l+1)-element Groebner basis G+−{g+0, . . . , g+l} of M+, while maintaining the property that LM(g+j) contains the f-th unit vector for all j∈{0, . . . , l}. From this point on, “Groebner basis” will mean a Groebner basis with respect to a fixed monomial ordering <.
Now, it can be proved that a single iteration of Koetter's algorithm has the required properties.
Koetter's Iteration without Inversions:
For j∈{0, . . . l}, write
Take some j∈{0, . . . , l}. If j∈J, then since g+j=gj and LM(gj) is minimal in LM(Mj) ⊆LM(M+j), then certainly LM(g+j) is minimal in LM(M+j). This minimality follows from the assumptions on G. Similarly, if j∈J and j≠j*, then
LM(g+j)=LM(Δj*gj−Δjgj*)=LM(gj),
and again, LM(g+j) is minimal in LM(M+j).
It remains to verify that if J≠Ø, then LM(g+j*)=min(LM(M+j*)). Note first that because < is a monomial ordering, LM(Xgj*)=X LM(gj*), and X LM(gj*)>LM(gj*). Hence, LM(g+j*)=X LM(gj*). In addition, X LM(gj*) is the immediate successor of LM(gj*) in LM(Mj*).
Suppose that there exists some hj*∈M+j* with LM(hj*)<LM(g+j*). It will be proven that this implies an infinite decreasing chain, and hence a contradiction. Because hj* is also in Mj*, then LM(hj*)≥LM(gj*) must be true, and therefore LM(gj*)≤LM(hj*)<LM(g+j*). But LM(g+j*) is the immediate successor of LM(gj*) in LM(Mj*), and therefore LM(hj*)=LM(gj*) must be true.
Let c∈K* be such that LM(gj*−chj*) is strictly smaller than LM(hj*)=LM(gj*) and set δ0:=gj*−chj*. Note that since gj*∉M+ while hj*∈M+, then δ0∉M+, and, in particular, δ0≠=0. Suppose that LM(δ0) contains the j0-th unit vector for some j0∈{0, . . . l}.
If j0∈J, then LM(δ0)<LM(gj*)≤LM(gj0), where the first inequality follows from the construction of δ0, and the second from the definition of j*. Since δ0∈Mj0, this contradicts the assumption on gj0.
It follows that j0∉J. By the minimality of LM(gj0) in LM(Mj0), there exists some d≥0 such that LM(δ0)=XdLM(gj0). Choose c∈K* such that the leading monomial cancels in δ1:=δ0−cXdgj0. Note that δ1∉M+, because δ0∉M+, while gj0∈M+ since j0∉J. Then by construction, δ1≠0, and LM(δ1)<LM(δ0)).
Suppose that LM(δ1) contains the j1-th unit vector. If j1∈J, then LM(δ1)<LM(δ0)<LM(gj*)≤LM(gj1), a contradiction, since δ1∈Mj1. Hence j1∉J. Continuing this way, an infinite strictly decreasing chain can be obtained, which is a contradiction.
B. Proof of Proposition 4.1
Since (S(y), 1) is in the Fq[X]-span of {h0, h1}, it follows that I∈(h01, h11), and hence that h01 and h11 are relatively prime. Now suppose that α(X), β(X)∈Fq[X] are such that α(X)h0−β(X)hj=(?, 0). Then α(X)h01(X)=β(X)h11(X), and because gcd(h01, h11)=1, this implies that h11(X)|α(X), h01(X)|β(X),
and these two equal rational functions are in fact a polynomial in Fq[X]. Write r(X)∈Fq[X] for this polynomial. Let π0: Fq[X]2→Fq[X] be the projection to the first coordinate. Now, the second coordinate of the vector
f:=h11(X)h0−h01(X)h1∈M0
is 0, and for α(X), β(X) as above, it follows from the above explanation that
α(X)h0−β(X)h1=r(X)f.
This shows that π0(f) has the lowest degree in π0 (M0∩{(?, 0)}). Now, as M0 is generated as an Fq[X]-module by {(X2t, 0), (S(y)(X), 1)}, this lowest degree is 2t. Hence deg(π0(f)) 2t. Now,
because by assumption deg(h11)≥deg(h10)+1 and deg(h00)>deg(h01)−1, so that
deg(h11h00)>deg(h01h10).
This concludes the proof.
Number | Name | Date | Kind |
---|---|---|---|
7254165 | Xie et al. | Aug 2007 | B2 |
7900122 | Shen et al. | Mar 2011 | B2 |
8149925 | Goldman et al. | Apr 2012 | B2 |
8209590 | Shen et al. | Jun 2012 | B2 |
8245117 | Wu | Aug 2012 | B1 |
8327241 | Wu et al. | Dec 2012 | B2 |
8495448 | Shen et al. | Jul 2013 | B2 |
8650466 | Wu | Feb 2014 | B2 |
8674860 | Wu | Mar 2014 | B2 |
8850298 | Wu | Sep 2014 | B2 |
8908810 | Arambepola et al. | Dec 2014 | B2 |
20070153724 | Cheon et al. | Jul 2007 | A1 |
20160301429 | Shany et al. | Oct 2016 | A1 |
Entry |
---|
Maria Bras-Amoros, et al., “From the Euclidean Algorithm for Solving a Key Equation for Dual Reed-Solomon Codes to the Berlekamp-Massey Algorithm,” AAECC 2009, LNCS 5527, pp. 32-42, 2009. |
Yingquan Wu, “Fast Chase Decoding Algorithms and Architecture for Reed-Solomon Codes,” IEEE Transaction on Information Theory, vol. 56, No. 1, Jan. 2012. |
Xinmiao Zhang, “Interpolation-Based Chase BCH Decoder,” Information Theory and Applications Workshop (ITA), 2014, pp. 1-5. |
Mostafa El-Khamy, et al., “Iterative Algebraic Soft-Decision List Decoding of Reed-Solomon Codes,”IEEE Journal on Selected Areas in Communications, vol. 24, No. 3, Mar. 2006. |
James L. Massey, “Shift-Register Synthesis and BCH Decoding,” IEEE Transactions on Information Theory, vol. IT-15, No. 1, Jan. 1969, pp. 122-127. |
Peter Beelen, et al., “On Rational-Interpolation Based List-Decoding and List-Decoding Binary Goppa Codes,” IEEE Transactions on Information Theory ( vol. 59, Issue: 6, Jun. 2013); pp. 1-16. |
David Chase, “A Class of Algorithms for Decoding Block Codes With Channel Measurement Information,” IEEE Transaction on Information Theory, vol. IT-18, No. 1, Jan. 1972, pp. 170-182. |
Patrick Fitzpatrick, “On the Key Equation.” IEEE Transaction on Information Theory, vol. 41, No. 5 Sep. 1995, pp. 1290-1302. |
Rachit Agarwal, “On Computation of Error Locations and Values in Hermitian Codes,”, Proc., IEEE Intl. Symp. Info. Theory, pp. 1-10, Dec. 11, 2007. |
Section 5.1 of R. M. Roth, Introduction to Coding Theory, Cambridge University Press, 2006. |
R. J. McEliece, “The Guruswami-Sudan decoding algorithm for Reed-Solomon codes,” IPN Progress Report, vol. 42-153, May 2003. |
Number | Date | Country | |
---|---|---|---|
20190068319 A1 | Feb 2019 | US |