Error Control Codes, Information Theory and Applied Cryptography
Org: Aiden Bruen (Calgary) and David Wehlau (Queens; RMC) [PDF]
 TIM ALDERSON, University of New Brunswick Saint John, 100 Tucker Park Rd., PO Box 5050, Saint John, New Brunswick, E2L 4L5
Maximal Projective Codes
[PDF] 
For n ³ k, an (n,k,d)_{q}code C is a collection of q^{k} ntuples (or codewords) over an alphabet A of size q such that the minimum (Hamming) distance between any two codewords of C is d. For such a code, the Singleton bound (C £ A^{nd+1}) gives d £ nk+1. The Singleton defect of C, S(C), is defined by S(C) = nk+1d. A code C¢ obtained by deleting some fixed coordinate from each codeword of C is called a punctured code of C. In the case that S(C¢)=S(C), C is said to be an extension of C¢, equivalently, C¢ is said to be extendable to the code C. A code is maximal if it admits no extensions.
In the special case that A = GF(q) and C is a vector space of dimension k, C is a linear (n,k,d)_{q}code. C then has an associated generator matrix G whose columns can be considered as a projective multiset G of n points in PG(k1,q) at most nd per hyperplanecalled a projective system associated with C. If the points in G are distinct (so that essentially there are no repeated coordinates), C is a projective code. Hence, complete (n,r)arcs in PG(k1,q) and projective (n,k,nr)_{q}codes that admit no projective extensions are equivalent objects. This begs the question:
Is a projective code corresponding to a complete arc necessarily maximal? We show that projective codes of reasonable length admit only projective extensions. Many examples of large complete arcs exist; our results show that in many cases the corresponding codes are maximal. The methods used are based on the BruenSilverman model of linear codes utilizing coprimitive sets as well as the theory of Rédei blocking sets.
Joint work with A. A. Bruen.
 ELWYN BERLEKAMP, University of California at Berkeley
History of Long Block Codes
[PDF] 
In the first two decades following Shannon's classic 1948 paper, there were numerous studies aimed at determining the theoretical limitations on the performance of long block codes over a variety of channels, with and without such embellishments as list decoding or noiseless feedback.
Concurrently, techniques to construct specific classes of block codes were introduced by Hamming, Elias, ReedMuller, BoseChaudhuriHocquenhem, ReedSolomon, and Gallager. Decoding algorithms, implementations, and applications came later.
This twopart talk will review some of the salient parts of this history, and identify a few of the problems which are still not completely solved.
 RICHARD BLAHUT, University of Illinois
Source Coding in Information Theory
[PDF] 
We survey some old results and discuss some new research in the general area of source coding in classical information theory.
 KELDON DRUDGE, Prism Valuations, Toronto
Existence and nonexistence results for "Extremal" line sets in PG(3,q)
[PDF] 
For a set of lines of PG(3,q) of a fixed cardinality, what are the maximum and minimum number of intersections between pairs of lines of the set? The question was posed (and answered) by J. Eisfeld in 1998. Both his upper and lower bounds are tight, but the sets meeting them have not been fully classified. In this talk we review the known results in the area and add a new example.
 PETER DUKES, University of Victoria
Directed complete bipartite graph decompositions and threestate sensor networks
[PDF] 
We examine edgedecompositions of the complete lfold directed graph [(K)\vec]_{n} into complete bipartite directed subgraphs [(K)\vec]_{a,b} as a model for communication in sensor or mobile ad hoc networks. In such a network, each node can be in one of three
states: asleep (powered down), listening, or transmitting. Communication is effective only when the sender is transmitting, the destination is listening, and no other node in proximity to the receiver is also transmitting. We associate the vertices of [(K)\vec]_{n} with nodes of the network, and blocks of the graph decomposition with time slots for communication.
A block with outvertices A and invertices B corresponds to a slot in which the nodes in A are transmitting, those in B are receiving, and all others are asleep. Thus, such a decomposition of l[(K)\vec]_{n} guarantees every ordered pair of nodes in the associated network can communicate in l time slots. However, it is also desirable to minimize interference by a third node. This talk will mention various constructions for these graph decompositions, with particular emphasis on properties minimizing interference.
 VINCENT GAUDET, University of Alberta, Edmonton, AB T6G 2V4
Energy Efficient Decoding Using Analog VLSI Techniques
[PDF] 
Lowdensity paritycheck (LDPC) codes have become one of the preferred methods for forward error control in digital communications systems.
These codes approach the Shannon capacity limit, and as such address the issue of transmit power. However, the use of such coding techniques also incurs a computational energy cost at the receiver that is not traditionally accounted for in the code design process. LDPC decoding is typically conducted using a messagepassing algorithm that runs over a graphical representation of the code. Typical graphs may have tens of thousands of connections, each requiring several multibit messages to be passed during a decoding cycle, and perhaps requiring aggregate signaling rates on the order of Terabits per second! Since dynamic power consumption in a VLSI chip is related to the signaling rate, this represents a considerable challenge. In this talk I will present messagepassing VLSI architectures that are guided by these computational energy constraints.
Analog decoders are message passing decoders that process LLR messages in continuoustime and using continuousvalued voltages and currents to represent likelihood messages. Only the outputs of decoders are binary, and as such analog decoders do not require highspeed analogtodigital converters as a front end. Such decoders, often based on the Gilbert multiplier using subthreshold mode CMOS transistors, have been shown in physical measurements to be computationally efficient. This talk will provide an introduction to the circuits used in such analog decoders, as well as the design challenges and limitations of the technology.
 MARTIN HASSNER, Hitachi Global Storage Technology Research
SelfReplicating Trellis Graphs
[PDF] 
Trellis Codes are described by Lie Algebra Root Lattices where the encoder redundancy is due to the choice of a Sublattice. In this talk we discuss Root Sublattice Coupling Algebras whose character multiplication has the property of "SelfReplication".
 OLOF HEDEN, Department of Mathematics, KTH, S100 44 Stockholm, Sweden
A tree of perfect codes
[PDF] 
There are now more than 20, or perhaps 30, different constructions of perfect codes. The classification and enumeration of all perfect codes of length n is still an open problem, even for such small lengths as n=15.
By considering tiles of Z_{2}^{k}, one may to any perfect 1error correcting binary code C of length n recursively associate a tree. The root of the tree will be the perfect code C and all vertices will be perfect codes of shorter length than n. The leaves will be either linear perfect codes or full rank perfect codes. (A perfect code of length n has full rank if the dimension of the linear span of the words of the code will be equal to n.) This will show that full rank perfect codes act like prime elements and that the classification of full rank perfect codes is the key to the classification of all perfect 1error correcting binary codes.
References
 [1]

O. Heden, The partial order of perfect codes associated to a perfect code.
Advances in Mathematics of Communications, to appear.
 PETER LISONEK, Simon Fraser University, Burnaby, BC
Steganography with linear codes
[PDF] 
Steganography is the science of information hiding. The sender embeds a secret message into a cover object (e.g., a multimedia file) by slightly distorting it in a way that enables the intended recipient to retrieve the hidden message; at the same time the very existence of the hidden message should be impossible to detect by any third party.
The main goal of steganography is to manage the tradeoff between the amount of communicated information and the amount of introduced distortion. We will show how linear codes can be used for this purpose. We will survey the recent results and list some open problems.
 JIM McQUILLAN, Western Illinois University, Department of Computer Science, 447 Stipes Hall, Macomb, IL 61455, USA
Codes and Hyperovals
[PDF] 
We investigate connections between codes and hyperovals. In PG(2,4), for example, we can exploit the even intersection equivalence relation amongst the hyperovals to help us construct a selfdual code.
 MICHELE MOSCA, Institute for Quantum Computing (UW) and Perimeter Institute
Selftesting Quantum Apparatus
[PDF] 
In order to execute any quantum cryptographic protocol in practice, one must somehow trust that their quantum apparatus is faithfully executing the protocol.
Quantum selftesting defines a framework for testing quantum apparatus.
I will show how a quantum circuit together with measurement apparatuses and EPR sources can be fully verified without any reference to some other trusted set of quantum devices (joint work with Magniez, Mayers and Ollivier). Our main assumption is that the physical system we are working with consists of several identifiable subsystems, on which we can apply some given gates locally. We design a test for any quantum circuit whose complexity is linear in the number of gates and qubits, and polynomial in the required precision.
This selftesting procedure applies to protocols that only require states and operations with realvalued coefficients. The reason for this restriction was an intuition that computations with complex amplitudes can be simulated using only real amplitudes, and the simulation would not be unitarily equivalent to the desired complex amplitude computation. Recent work (with Matthew McKague) gives a simulation of general quantum circuits using states and unitaries with real coefficients only.
 AIDAN ROY, University of Calgary
Highly nonlinear functions in terms of codes, graphs, and designs
[PDF] 
As well as having a number of applications in cryptography, some highly nonlinear functions over finite fields can be used to produce interesting graphs and errorcorrecting codes. In this talk we show that crooked functions can be characterized by both the distance of a Preparatalike code and the distanceregularity of a crooked graph. We then introduce another application for nonlinear functions, namely spherical designs, and show that differentially 1uniform functions over abelian groups can be characterized by weighted complex 2designs.
 CHRISTIAN SCHLEGEL, University of Alberta, Edmonton, AB T6G 2V4, Canada
Generalized Modulation and Iterative Demodulation
[PDF] 
Modulation is the process of mapping discrete signals onto basis waveforms suitable for transmission. These basis waveforms are typically engineered to be orthogonal. However, in many modern highdensity communications channels, orthogonality of these basis waveforms cannot be guaranteed and is often lost. In this talk we consider modulation where the signal waveforms are correlated.
While it is wellknown that for low spectral efficiencies linear separation via minimum meansquare error (MMSE) filtering provides close to optimal performance, linear approaches fail as higher spectral utilization is desired. The alternatives of approximations to maximumlikelihood decoders, such as sphere decoding quickly become practically infeasible due to complexity constraints. We propose an alternate method where the redundancy required to achieve reliability is achieved by increasing the number of signal functions used. It is shown that for the case of uniformly random signal functions, the capacity of the increased set of signal waveforms is nondecreasing and achieves the capacity of the Gaussian multiple access channel as it upper limit, when the number of waveforms becomes large. Furthermore, a simple iterative demodulator allows achievable spectral efficiencies beyond those achieved by linear processing, and it is proven that the capacity of the channel can be achieved to within less than 1 bit as the number of signal functions becomes large.
 CLAUDE TARDIF, Royal Military College of Canada, PO Box 17000, Station "Forces" Kingston, Ontario K7K 7B4, Canada
A dualistic approach to graph colouring
[PDF] 
It is possible to give an upper bound for the chromatic number or fractional chromatic number of a graph by finding a suitable orientation of its edges avoiding homomorphisms from certain prescribed paths. The classical example is given by the classical "GallaiRoy"
theorem, which states that any graph that admits an orientation with no homomorphic image of the directed path with n edges can be coloured with n colours. Apart from the directed path with n edges, there are other paths that lead to similar and independent (perhaps nonconstructive) certifications of ncolourability.
In this talk I will present some developments in this direction obtained jointly with Jaroslav Nesetril.
 DMITRY TRUKACHEV, University of Alberta, Edmonton, Alberta, Canada
Analyzing Capacity of Adhoc Wireless Networks
[PDF] 
Adhoc wireless networking is envisioned to be the next revolution in data communications with a number of applications ranging from peopletopeople to devicetodevice communication. Habitat monitoring and object tracking with sensors, distributed database synchronization, and communication in disaster recovery are a few examples. Such systems consist of nodepairs communicating without a fixed infrastructure.
Data packets are usually delivered from source to destination via multiple hops through other nodes helping to relay the information.
Despite huge interest in adhoc wireless networks little is known about the capability of these networks to carry information. Therefore, it is important to understand theoretical throughput and capacity limits and possible network operation strategies which can achieve these predicted limits.
In my lecture I will talk about network models, summarize early results on adhoc network capacity, describe common upper bounding techniques, and derivation of the achievability methods. In addition I will talk about the improvement of the scaling laws which can be obtained using multiple user detection techniques. Finally I will discuss the impact if traffic localization on the network capacity scaling laws.
