Contents
Academic literature on the topic 'Code correcteur d'erreurs'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Code correcteur d'erreurs.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Dissertations / Theses on the topic "Code correcteur d'erreurs"
Bieliczky, Peter. "Implantation vlsi d'un algorithme de code correcteur d'erreurs et validation formelle de la realisation." Paris 6, 1993. http://www.theses.fr/1993PA066670.
Full textKakakhail, Syed Shahkar. "Prédiction et estimation de très faibles taux d'erreurs pour les chaînes de communication codées." Cergy-Pontoise, 2010. http://www.theses.fr/2010CERG0437.
Full textThe time taken by standard Monte Carlo (MC) simulation to calculate the Frame Error Rate (FER) increases exponentially with the increase in Signal-to-Noise Ratio (SNR). Importance Sampling (IS) is one of the most successful techniques used to reduce the simulation time. In this thesis, we investigate an advanced version of IS, called Adaptive Importance Sampling (AIS) algorithm to efficiently evaluate the performance of Forward Error Correcting (FEC) codes at very low error rates. First we present the inspirations and motivations behind this work by analyzing different approaches currently in use, putting an emphasis on methods inspired by Statistical Physics. Then, based on this qualitative analysis, we present an optimized method namely Fast Flat Histogram (FFH) method, for the performance evaluation of FEC codes which is generic in nature. FFH method employs Wang Landau algorithm and is based on Markov Chain Monte Carlo (MCMC). It operates in an AIS framework and gives a good simulation gain. Sufficient statistical accuracy is ensured through different parameters. Extension to other types of error correcting codes is straight forward. We present the results for LDPC codes and turbo codes with different code lengths and rates showing that the FFH method is generic and is applicable for different families of FEC codes having any length, rate and structure. Moreover, we show that the FFH method is a powerful tool to tease out the pseudo-codewords at high SNR region using Belief Propagation as the decoding algorithm for the LDPC codes
Barbier, Johann. "Analyse de canaux de communication dans un contexte non coopératif : application aux codes correcteurs d'erreurs et à la stéganalyse." Phd thesis, Palaiseau, Ecole polytechnique, 2007. http://www.theses.fr/2007EPXX0039.
Full textBarbier, Johann. "Analyse de canaux de communication dans un contexte non coopératif." Phd thesis, Ecole Polytechnique X, 2007. http://pastel.archives-ouvertes.fr/pastel-00003711.
Full textLegeay, Matthieu. "Utilisation du groupe de permutations d'un code correcteur pour améliorer l'efficacité du décodage." Rennes 1, 2012. http://www.theses.fr/2012REN1S099.
Full textError correcting codes and the linked decoding problem are one of the variants considered in post-quantum cryptography. In general, a random code has oftenly a trivial permutation group. However, the codes involved in the construction of cryptosystems and cryptographic functions based on error correcting codes usually have a non-trivial permutation group. Moreover, few cryptanalysis articles use the information contained in these permutation groups. We aim at improving decoding algorithms by using the permutation group of error correcting codes. There are many ways to apply it. The first one we focus on in this thesis is the one that uses the cyclic permutation called “shift” on information set decoding. Thus, we dwell on a work initiated by MacWilliams and put forward a detailed analysis of the complexity. The other way we investigate is to use a permutation of order two to create algebraically a subcode of the first code. Decoding in this subcode, of smaller parameters, is easier and allows to recover information in a perspective of decoding in the first code. Finally, we study the last pattern on the well known correcting codes, i. E. Reed-Muller codes, which extends the work initiated by Sidel'nikov-Pershakov
Roux, Antoine. "Etude d’un code correcteur linéaire pour le canal à effacements de paquets et optimisation par comptage de forêts et calcul modulaire." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS337.
Full textReliably transmitting information over a transmission channel is a recurrent problem in Informatic Sciences. Whatever may be the channel used to transmit information, we automatically observe erasure of this information, or pure loss. Different solutions can be used to solve this problem, using forward error correction codes is one of them. In this thesis, we study a corrector code developped in 2014 and 2015 for Thales society during my second year of master of apprenticeship. It is currently used to ensure the reliability of a transmission based on the UDP protocole, and passing by a network diode, Elips-SD. Elip-SD is an optical diode that can be plugged on an optical fiber to physically ensure that the transmission is unidirectional. The main usecase of such a diode is to enable supervising a critical site, while ensuring that no information can be transmitted to this site. At the opposite, another usecase is the transmission from one or multiple unsecured emitters to one secured receiver who wants to ensure that no information can be robbed. The corrector code that we present is a linear corrector code for the binary erasure channel using packets, that obtained the NATO certification from the DGA ("Direction Générale de Armées" in French). We named it Fauxtraut, for "Fast algorithm using Xor to repair altered unidirectional transmissions". In order to study this code, presenting how it works, its performance and the modifications we added during this thesis, we first establish a state of the art of forward error correction, focusing on non-MDS linear codes such as LDPC codes. Then we present Fauxtraut behavior, and analyse it theorically and with simulations. Finally, we present different versions of this code that were developped during this thesis, leading to other usecases such as transmitting reliable information that can be altered instead of being erased, or on a bidirectionnal channel, such as the H-ARQ protocole, and different results on the number of cycles in particular graphs. In the last part, we present results that we obtained during this thesis and that finally lead to an article in the Technical Computer Science. It concerns a non-polynomial problema of Graphs theorie : maximum matching in temporal graphs. In this article, we propose two algorithms with polynomial complexity : a 2-approximation algorithm and a kernelisation algorithm forthis problema
Charaf, Akl. "Etudes de récepteurs MIMO-LDPC itératifs." Phd thesis, Télécom ParisTech, 2012. http://pastel.archives-ouvertes.fr/pastel-00913457.
Full textGoy, Guillaume. "Contribution à la sécurisation des implémentations cryptographiques basées sur les codes correcteurs d'erreurs face aux attaques par canaux auxiliaires." Electronic Thesis or Diss., Limoges, 2024. http://www.theses.fr/2024LIMO0036.
Full textSide-channel attacks are a threat for cryptographic security, including post-quantum cryptography (PQC) such as code-based cryptography. In order to twarth these attacks, it is necessary to identify vulnerabilities in implementations. In this thesis, we present three attacks against Hamming Quasi-Cyclic (HQC) scheme, a candidate in the NIST PQC standardization contest for the standardization of post-quantum schemes, along with countermeasures to protect against these attacks. The concatenated code structure of the publickly known HQC’s gives several targets for side-channel attacks. Firstly, we introduce a chosen ciphertext attack targeting HQC outer code, aiming at recovering the secret key. The physical behavior of the fast Hadamard transform (FHT), used during the Reed-Muller decoding step, allows to retrieve the secret key with less than 20,000 physical measurements of the decoding process. Next, we developed a theoretical attack against the inner code to recover the shared key at the end of the protocol. This attack targets the Reed-Solomon code and more specifically the physical leaks during the execution of a Galois field multiplication. These leaks, combined with a Correlation Power Analysis (CPA) strategy, allows us to show that the security of HQC shared key could be reduced from 2^128 to 2^96 operations with the knowledge of a single physical measurement. Finally, we used Belief Propagation tools to improve our attack and make it practically executable. This new approach allows us to practically recover HQC shared key within minutes for all security levels. These efforts also demonstrated that known state-of-the-art countermeasures are not effective against our attack. In order to twarth these attacks, we present maksing and shuffling countermeasures for the implementation of sensitive operations which manipulate secret data
Chaulet, Julia. "Etude de cryptosystèmes à clé publique basés sur les codes MDPC quasi-cycliques." Thesis, Paris 6, 2017. http://www.theses.fr/2017PA066064/document.
Full textConsidering the McEliece cryptosystem using quasi-cylcic MDPC (Moderate Density Parity Check matrix) codes allows us to build a post-quantum encryption scheme with nice features. Namely, it has reasonable key sizes and both encryption and decryption are performed using binary operations. Thus, this scheme seems to be a good candidate for embedded and lightweight implementations. In this case, any information obtained through side channels can lead to an attack. In the McEliece cryptosystem, the decryption process essentially consists in decoding. As we consider the use of an iterative and probabilistic algorithm, the number of iterations needed to decode depends on the instance considered and some of it may fail to be decoded. These behaviors are not suitable because they may be used to extract information about the secrets. One countermeasure could be to bound the number of encryptions using the same key. Another solution could be to employ a constant time decoder with a negligible decoding failure probability, that is to say which is about the expected security level of the cryptosystem. The main goal of this thesis is to present new methods to analyse decoder behavior in a cryptographic context.Second, we explain why a McEliece encryption scheme based on polar code does not ensure the expected level of security. To do so, we apply new techniques to resolve the code equivalence problem. This allows us to highlight several common properties shared by Reed-Muller codes and polar codes. We introduce a new family of codes, named decreasing monomial codes, containing both Reed-Muller and polar codes. These results are also of independent interest for coding theory
Dila, Gopal Krishna. "Motifs de codes circulaires dans les gènes codant les protéines et les ARN ribosomaux." Electronic Thesis or Diss., Strasbourg, 2020. http://www.theses.fr/2020STRAD027.
Full textThe thesis focuses on motifs of the circular code X, an error-correcting code found in protein-coding genes, which have the ability to synchronize the reading frame. We first investigated the evolutionary conservation of X motifs in genes of different species and identified specific selective pressures to maintain them. We also identified a set of universal X motifs in ribosomal RNAs, which are located in important functional regions of the ribosome and suggest that circular codes represented an important step in the emergence of the standard genetic code (SGC). Then, we investigated the functional role of X motifs in modern translation processes and identified a strong correlation between X motif enrichment in genes and translation levels. Finally, we compared the frameshift optimality of the circular code X with the SGC and other maximal circular codes, and identified a new functionality of the code X in minimizing the effects of translation errors after frameshift events
Books on the topic "Code correcteur d'erreurs"
1942-, Costello Daniel J., ed. Error control coding: Fundamentals and applications. 2nd ed. Upper Saddle River, N.J: Pearson-Prentice Hall, 2004.
Find full textPless, Vera. Introduction to the theory of error-correcting codes. 3rd ed. New York: Wiley, 1998.
Find full textPless, Vera. Introduction to the theory of error-correcting codes. 2nd ed. New York: Wiley, 1989.
Find full textBane, Vasic, ed. Advanced error control techniques for data storage systems. Boca Raton, FL: Taylor & Francis, 2005.
Find full textJohnson, Sarah J. Iterative error correction: Turbo, low-density parity-check and repeat-accumulate codes. New York: Cambridge University Press, 2009.
Find full textGuruswami, Venkatesan. List Decoding of Error-Correcting Codes: Winning Thesis of the 2002 ACM Doctoral Dissertation Competition. Springer London, Limited, 2004.
Find full textPless, Vera. Introduction to the Theory of Error-Correcting Codes. Wiley & Sons, Incorporated, John, 2011.
Find full textBook chapters on the topic "Code correcteur d'erreurs"
LEFÈVRE, Pascal, Philippe CARRÉ, and Philippe GABORIT. "Codes et tatouages." In Sécurité multimédia 1, 87–136. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9026.ch3.
Full text