Design and Analysis of a Concatenated Code for Intersymbol Interference Wiretap Channels
Pith reviewed 2026-05-23 05:09 UTC · model grok-4.3
The pith
A concatenated LDPC-trellis scheme achieves tight lower bounds on secrecy capacity for ISI wiretap channels while driving the leakage upper bound to zero.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The central claim is that the proposed concatenated scheme, built from outer LDPC codes nested inside inner trellis codes, attains tight lower bounds on the secrecy capacity of ISI wiretap channels; further, optimization of the irregular LDPC degree distributions reduces the upper bound on the information leakage rate to zero, meeting the weak secrecy criterion.
What carries the argument
The nested wiretap-code structure in which outer LDPC codes generate uniformly distributed words that inner trellis codes reshape into a Markov process whose transition probabilities achieve the secrecy-capacity lower bound.
If this is right
- Reliable rates arbitrarily close to the secrecy capacity become achievable with finite-length codes over ISI wiretap channels.
- The same concatenated architecture can be reused for any channel whose secrecy capacity is achieved by a Markov input distribution.
- Weak secrecy is obtained solely by degree optimization rather than by explicit randomness extraction at the encoder.
Where Pith is reading between the lines
- If the inner trellis stage can be made rate-preserving for other memory channels, the same outer-code optimization may extend to non-ISI wiretap models.
- The leakage-bound reduction to zero suggests that finite-length LDPC ensembles can be tuned to satisfy strong secrecy in the limit, though the paper stops at the weak criterion.
Load-bearing premise
A trellis code exists that maps any uniform LDPC codeword sequence into the exact Markov process required by the secrecy capacity without rate loss or extra leakage.
What would settle it
Numerical optimization of the LDPC degree distributions fails to drive the computed upper bound on leakage below a positive constant, or the designed trellis code produces a stationary distribution that deviates measurably from the capacity-achieving Markov chain.
Figures
read the original abstract
We propose a two-stage concatenated coding scheme for reliable and secure communication over intersymbol interference wiretap channels. We first establish the secrecy capacity. Then, motivated by the theoretical codes that achieve the secrecy capacity, our scheme integrates low-density parity-check (LDPC) codes in the outer stage, forming a nested structure of wiretap codes, with trellis codes in the inner stage to improve achievable secure rates. The trellis code is specifically designed to transform the uniformly distributed codewords produced by the LDPC code stage into a Markov process, achieving tight lower bounds on the secrecy capacity. We further estimate the information leakage rate of the proposed scheme using an upper bound. To meet the weak secrecy criterion, we optimize degree distributions of the irregular LDPC codes at the outer stage, essentially driving the estimated upper bound on the information leakage rate to zero.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript proposes a two-stage concatenated coding scheme for ISI wiretap channels: an outer nested irregular LDPC wiretap code followed by an inner trellis code that maps uniform LDPC outputs to a stationary Markov process. It first claims to establish the secrecy capacity, then asserts that the scheme achieves tight lower bounds on this capacity; degree-distribution optimization is used to drive an upper bound on the information leakage rate to zero, meeting the weak secrecy criterion.
Significance. If the trellis mapping preserves the exact input statistics required for the secrecy-capacity lower bound without rate loss and if the leakage bound is independent of the optimized degrees, the construction would supply a practical, optimizable coding scheme for a non-trivial class of wiretap channels with memory. The explicit use of nested wiretap codes and the Markov-motivated inner stage are concrete contributions that could be useful for further work on channels with ISI.
major comments (2)
- [Abstract / trellis inner code] Abstract and trellis-code design section: the central claim that the inner trellis code converts uniform i.i.d. LDPC codewords into the precise stationary Markov process that attains the secrecy-capacity lower bound, without rate loss or secrecy degradation, is load-bearing; no generator matrix, state diagram, transition-probability verification, or rate calculation is referenced to confirm that the marginal distribution and rate are exactly preserved.
- [Leakage bound and degree optimization] Leakage estimation and LDPC optimization: the information leakage rate is bounded above and the bound is then driven to zero by optimizing the free parameters (LDPC degree distributions); it is unclear whether the upper bound expression remains independent of these parameters or whether the optimization step effectively defines the reported leakage value, which would undermine the claim of an independently verified achievable rate.
minor comments (2)
- [Abstract] The abstract states that secrecy capacity is established but supplies no outline of the derivation or the channel model assumptions; a short paragraph in the introduction would improve readability.
- [Notation] Notation for the Markov process statistics and the resulting secrecy rate expressions should be introduced once and used consistently; several symbols appear without prior definition in the abstract-level description.
Simulated Author's Rebuttal
We thank the referee for the careful review and constructive feedback. Below we respond point-by-point to the major comments, indicating where revisions will be made to improve clarity.
read point-by-point responses
-
Referee: [Abstract / trellis inner code] Abstract and trellis-code design section: the central claim that the inner trellis code converts uniform i.i.d. LDPC codewords into the precise stationary Markov process that attains the secrecy-capacity lower bound, without rate loss or secrecy degradation, is load-bearing; no generator matrix, state diagram, transition-probability verification, or rate calculation is referenced to confirm that the marginal distribution and rate are exactly preserved.
Authors: The trellis code is constructed specifically to map the uniform i.i.d. outputs of the outer LDPC stage onto the exact stationary Markov process that attains the secrecy-capacity lower bound. We will revise the manuscript to include the generator matrix, state diagram, explicit transition-probability verification, and rate calculation demonstrating that the marginal distribution and rate are preserved without loss or secrecy degradation. revision: yes
-
Referee: [Leakage bound and degree optimization] Leakage estimation and LDPC optimization: the information leakage rate is bounded above and the bound is then driven to zero by optimizing the free parameters (LDPC degree distributions); it is unclear whether the upper bound expression remains independent of these parameters or whether the optimization step effectively defines the reported leakage value, which would undermine the claim of an independently verified achievable rate.
Authors: The upper bound on the information leakage rate is derived as an explicit function of the LDPC degree distributions (and other fixed parameters) prior to any optimization. The subsequent optimization identifies degree distributions for which the bound evaluates to zero, confirming that the weak secrecy criterion is met. The bound expression itself is independent of the particular optimized values; the optimization merely demonstrates that suitable parameters exist. We will add a clarifying sentence in the revised manuscript to emphasize this separation. revision: partial
Circularity Check
Derivation chain is self-contained with no circular reductions
full rationale
The paper first establishes the secrecy capacity of the ISI wiretap channel. It then constructs a concatenated scheme motivated by theoretical capacity-achieving codes, with the inner trellis code designed to map uniform LDPC outputs to the required Markov process and the outer irregular LDPC degree distributions optimized to drive an independent upper bound on leakage to zero. This is standard parameter optimization for meeting a design criterion rather than a fitted input renamed as prediction or any self-definitional reduction. No load-bearing self-citation, uniqueness theorem, or ansatz smuggling is present in the text. The central claims rest on explicit design choices whose correctness can be checked externally via the resulting rates and bounds.
Axiom & Free-Parameter Ledger
free parameters (1)
- LDPC degree distributions
axioms (1)
- domain assumption Secrecy capacity of the ISI wiretap channel can be established and used as a benchmark for the concatenated scheme.
Reference graph
Works this paper leans on
-
[1]
Matched information rate codes for binary- input intersymbol interference wiretap channels,
A. Nouri and R. Asvadi, “Matched information rate codes for binary- input intersymbol interference wiretap channels,” in Proc. IEEE Int. Symp. Inf. Theory , Espoo, Finland, June 2022, pp. 1163–1168
work page 2022
-
[2]
How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits,
C. Gidney and M. Eker ˚a, “How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits,” Quantum, vol. 5, p. 433, Apr. 2021
work page 2048
-
[3]
Advances in quantum cryptography,
S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani, J. L. Pereira, M. Razavi, J. S. Shaari, M. Tomamichel, V . C. Usenko, G. Vallone, P. Villoresi, and P. Wallden, “Advances in quantum cryptography,” Adv. Opt. Photon., vol. 12, no. 4, pp. 1012–1236, Dec. 2020
work page 2020
-
[4]
Quantum internet: A vision for the road ahead,
S. Wehner, D. Elkouss, and R. Hanson, “Quantum internet: A vision for the road ahead,” Science, vol. 362, no. 6412, Oct. 2018
work page 2018
-
[5]
When entanglement meets classical communications: Quantum teleportation for the quantum internet,
A. S. Cacciapuoti, M. Caleffi, R. Van Meter, and L. Hanzo, “When entanglement meets classical communications: Quantum teleportation for the quantum internet,” IEEE Trans. Commun. , vol. 68, no. 6, pp. 3808–3833, June 2020
work page 2020
-
[6]
Unconditionally secure quantum bit commitment is impos- sible,
D. Mayers, “Unconditionally secure quantum bit commitment is impos- sible,” Phys. Rev. Lett., vol. 78, pp. 3414–3417, Apr. 1997
work page 1997
-
[7]
A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355–1387, Oct. 1975
work page 1975
-
[8]
An overview of information-theoretic security and privacy: Metrics, limits and applications,
M. Bloch, O. G ¨unl¨u, A. Yener, F. Oggier, H. V . Poor, L. Sankar, and R. F. Schaefer, “An overview of information-theoretic security and privacy: Metrics, limits and applications,” IEEE J. Sel. Areas Inf. Theory , vol. 2, no. 1, pp. 5–22, Mar. 2021
work page 2021
-
[9]
Physical layer security—from theory to practice,
M. Mitev, T. M. Pham, A. Chorti, A. N. Barreto, and G. Fettweis, “Physical layer security—from theory to practice,” IEEE BITS Inf. Theory Mag., vol. 3, no. 2, pp. 67–79, Dec. 2023
work page 2023
-
[10]
Single-carrier index modulation for IoT uplink,
J. Choi, “Single-carrier index modulation for IoT uplink,” IEEE J. Sel. Top. Signal Process., vol. 13, no. 6, pp. 1237–1248, Oct. 2019
work page 2019
-
[11]
Inter-symbol interference in high data rate UWB communications using energy detector receivers,
M. Sahin and H. Arslan, “Inter-symbol interference in high data rate UWB communications using energy detector receivers,” in Proc. IEEE Int. Conf. on Ultra-Wideband, Zurich, Switzerland, Sept. 2005, pp. 176– 179
work page 2005
-
[12]
Intersymbol interference and equalization for large 5G phased arrays with wide scan angles,
Z. Zhang, Y . Yin, and G. M. Rebeiz, “Intersymbol interference and equalization for large 5G phased arrays with wide scan angles,” IEEE Trans. Microw. Theory Techn., vol. 69, no. 3, pp. 1955–1964, Mar. 2021
work page 1955
-
[13]
Y . Wu, C. Han, and Z. Chen, “DFT-spread orthogonal time frequency space system with superimposed pilots for terahertz integrated sensing and communication,” IEEE Trans. Wirel. Commun., vol. 22, no. 11, pp. 7361–7376, Nov. 2023
work page 2023
-
[14]
An overview of peak-to-average power ratio reduction techniques for multicarrier transmission,
S. H. Han and J. H. Lee, “An overview of peak-to-average power ratio reduction techniques for multicarrier transmission,” IEEE Wirel. Commun., vol. 12, no. 2, pp. 56–65, Apr. 2005
work page 2005
-
[15]
Symbol-level precoding for PAPR reduction in multi-user MISO-OFDM systems,
Y . Qin, A. Li, Y . Lyu, X. Liao, and C. Masouros, “Symbol-level precoding for PAPR reduction in multi-user MISO-OFDM systems,” IEEE Trans. Wirel. Commun. , vol. 23, no. 9, pp. 12 484–12 498, Sept. 2024
work page 2024
-
[16]
TS 38.101-1 (V18.9.0): 5G; NR; User equipment (UE) radio transmission and reception; (Release 18),
3rd Generation Partnership Project (3GPP), “TS 38.101-1 (V18.9.0): 5G; NR; User equipment (UE) radio transmission and reception; (Release 18),” 3GPP, Technical Specification 38.101-1, Apr. 2025
work page 2025
-
[17]
——, “TR 38.821 (V16.0.0): Technical specification group radio access network; Solutions for NR to support non-terrestrial networks (NTN) (Release 16),” 3GPP, Technical Specification 38.821, Dec. 2019
work page 2019
-
[18]
Non-Terrestrial Networks (NTN) Overview,
——, “Non-Terrestrial Networks (NTN) Overview,” https://www.3gpp. org/technologies/ntn-overview, Apr. 2025
work page 2025
-
[19]
Constrained secrecy capacity of finite-input intersymbol interference wiretap channels,
A. Nouri, R. Asvadi, J. Chen, and P. O. V ontobel, “Constrained secrecy capacity of finite-input intersymbol interference wiretap channels,”IEEE Trans. Commun., vol. 71, no. 6, pp. 3301–3316, June 2023
work page 2023
-
[20]
G. Forney, “Maximum-likelihood sequence estimation of digital se- quences in the presence of intersymbol interference,” IEEE Trans. Inf. Theory, vol. 18, no. 3, pp. 363–378, May 1972
work page 1972
-
[21]
Optimum soft-output detection for chan- nels with intersymbol interference,
Y . Li, B. Vucetic, and Y . Sato, “Optimum soft-output detection for chan- nels with intersymbol interference,” IEEE Trans. Inf. Theory , vol. 41, no. 3, pp. 704–713, May 1995
work page 1995
-
[22]
Iterative correction of intersymbol interference: Turbo-equalization,
C. Douillard, M. J ´ez´equel, C. Berrou, D. Electronique, A. Picart, P. Di- dier, and A. Glavieux, “Iterative correction of intersymbol interference: Turbo-equalization,” Eur. Trans. Telecommun., vol. 6, no. 5, pp. 507– 511, Sept. 1995
work page 1995
-
[23]
Turbo decoding for partial response channels,
T. V . Souvignier, M. Oberg, P. H. Siegel, R. E. Swanson, and J. K. Wolf, “Turbo decoding for partial response channels,” IEEE Trans. Commun., vol. 48, no. 8, pp. 1297–1308, Aug. 2000
work page 2000
-
[24]
Performance analysis of turbo-equalized partial response channels,
M. Oberg and P. H. Siegel, “Performance analysis of turbo-equalized partial response channels,” IEEE Trans. Commun. , vol. 49, no. 3, pp. 436–444, Mar. 2001
work page 2001
-
[25]
Joint message-passing decoding of LDPC codes and partial-response channels,
B. M. Kurkoski, P. H. Siegel, and J. K. Wolf, “Joint message-passing decoding of LDPC codes and partial-response channels,” IEEE Trans. Inf. Theory, vol. 48, no. 6, pp. 1410–1422, June 2002
work page 2002
-
[26]
A. Kav ˇci´c, X. Ma, and M. Mitzenmacher, “Binary intersymbol interfer- ence channels: Gallager codes, density evolution, and code performance bounds,” IEEE Trans. Inf. Theory , vol. 49, no. 7, pp. 1636–1652, July 2003
work page 2003
-
[27]
On the application of factor graphs and the sum-product algorithm to ISI channels,
G. Colavolpe and G. Germi, “On the application of factor graphs and the sum-product algorithm to ISI channels,” IEEE Trans. Commun., vol. 53, no. 5, pp. 818–825, May 2005
work page 2005
-
[28]
Iterative detection for channels with memory,
A. Anastasopoulos, K. M. Chugg, G. Colavolpe, G. Ferrari, and R. Ra- heli, “Iterative detection for channels with memory,”Proc. IEEE, vol. 95, no. 6, pp. 1272–1294, June 2007
work page 2007
-
[29]
PR-NN: RNN-based detection for coded partial-response channels,
S. Zheng, Y . Liu, and P. H. Siegel, “PR-NN: RNN-based detection for coded partial-response channels,” IEEE J. Sel. Areas Commun. , vol. 39, no. 7, pp. 1967–1982, July 2021
work page 1967
-
[30]
Near Shannon limit error-correcting coding and decoding: Turbo-codes. 1,
C. Berrou, A. Glavieux, and P. Thitimajshima, “Near Shannon limit error-correcting coding and decoding: Turbo-codes. 1,” in Proc. IEEE Int. Conf. Commun., vol. 2, Geneva, Switzerland, May 1993, pp. 1064– 1070 vol.2
work page 1993
-
[31]
Statistical inference for probabilistic func- tions of finite state Markov chains,
L. E. Baum and T. Petrie, “Statistical inference for probabilistic func- tions of finite state Markov chains,” Ann. Math. Stat., vol. 37, no. 6, pp. 1554–1563, Dec. 1966
work page 1966
-
[32]
M.A.P. bit decoding of convolutional codes,
P. L. McAdam, L. R. Welch, and C. L. Weber, “M.A.P. bit decoding of convolutional codes,” in Proc. IEEE Int. Symp. Information Theory , Asilomar, CA, USA, Dec. 1972, p. 91
work page 1972
-
[33]
Optimal decoding of linear codes for minimizing symbol error rate,
L. Bahl, J. Cocke, F. Jelinek, and J. Raviv, “Optimal decoding of linear codes for minimizing symbol error rate,” IEEE Trans. Inf. Theory, vol. 20, no. 2, pp. 284–287, Mar. 1974
work page 1974
-
[34]
Design of capacity-approaching irregular low-density parity-check codes,
T. J. Richardson, M. A. Shokrollahi, and R. L. Urbanke, “Design of capacity-approaching irregular low-density parity-check codes,” IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 619–637, Feb. 2001
work page 2001
-
[35]
Optimized low-density parity-check codes for partial response channels,
N. Varnica and A. Kav ˇci´c, “Optimized low-density parity-check codes for partial response channels,” IEEE Commun. Lett. , vol. 7, no. 4, pp. 168–170, Apr. 2003
work page 2003
-
[36]
Linear-complexity ADMM updates for decoding LDPC codes in partial response channels,
X. Jiao, J. Mu, Y . C. He, and W. Xu, “Linear-complexity ADMM updates for decoding LDPC codes in partial response channels,” IEEE Commun. Lett., vol. 23, no. 12, pp. 2200–2204, Dec. 2019
work page 2019
-
[37]
l2-box ADMM decoding for LDPC codes over ISI channels,
X. Jiao, H. Liu, J. Mu, and Y . C. He, “ l2-box ADMM decoding for LDPC codes over ISI channels,” IEEE Trans. Veh. Technol. , vol. 70, no. 4, pp. 3966–3971, Apr. 2021
work page 2021
-
[38]
Interior point decoding for linear vector channels based on convex optimization,
T. Wadayama, “Interior point decoding for linear vector channels based on convex optimization,” IEEE Trans. Inf. Theory , vol. 56, no. 10, pp. 4905–4921, Oct. 2010
work page 2010
-
[39]
S. Boyd, N. Parikh, E. Chu, B. Peleato, and J. Eckstein, “Distributed optimization and statistical learning via the alternating direction method of multipliers,” Found. Trends Mach. Learn. , vol. 3, no. 1, pp. 1–122, Jan. 2011
work page 2011
-
[40]
J. B. Soriaga, H. D. Pfister, and P. H. Siegel, “Determining and approaching achievable rates of binary intersymbol interference channels using multistage decoding,” IEEE Trans. Inf. Theory, vol. 53, no. 4, pp. 1416–1429, Apr. 2007
work page 2007
-
[41]
Matched information rate codes for partial response channels,
A. Kav ˇci´c, X. Ma, and N. Varnica, “Matched information rate codes for partial response channels,” IEEE Trans. Inf. Theory , vol. 51, no. 3, pp. 973–989, Mar. 2005
work page 2005
-
[42]
The Gaussian wire-tap chan- nel,
S. Leung-Yan-Cheong and M. Hellman, “The Gaussian wire-tap chan- nel,” IEEE Trans. Inf. Theory , vol. 24, no. 4, pp. 451–456, July 1978
work page 1978
-
[43]
Non-systematic codes for physical layer security,
M. Baldi, M. Bianchi, and F. Chiaraluce, “Non-systematic codes for physical layer security,” in Proc. IEEE Inf. Theory Workshop , Dublin, Ireland, Sept. 2010, pp. 1–5
work page 2010
-
[44]
LDPC codes for the Gaussian wiretap channel,
D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, and B. J. Kwak, “LDPC codes for the Gaussian wiretap channel,” IEEE Trans. Inf. Forensics Secur., vol. 6, no. 3, pp. 532–540, Sept. 2011
work page 2011
-
[45]
LDPC code design for the BPSK-constrained Gaussian wiretap channel,
C. W. Wong, T. F. Wong, and J. M. Shea, “LDPC code design for the BPSK-constrained Gaussian wiretap channel,” in Proc. IEEE Glob. Commun. Conf., San Antonio, TX, USA, Dec. 2011, pp. 898–902
work page 2011
-
[46]
M. Baldi, M. Bianchi, and F. Chiaraluce, “Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: A security gap analysis,” IEEE Trans. Inf. Forensics Secur., vol. 7, no. 3, pp. 883– 894, June 2012. DRAFT 23
work page 2012
-
[47]
Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel,
M. Baldi, G. Ricciutelli, N. Maturo, and F. Chiaraluce, “Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel,” in Proc. IEEE Int. Conf. Commun., London, UK, June 2015, pp. 435–440
work page 2015
-
[48]
On secure commu- nications over Gaussian wiretap channels via finite-length codes,
A. Nooraiepour, S. R. Aghdam, and T. M. Duman, “On secure commu- nications over Gaussian wiretap channels via finite-length codes,” IEEE Commun. Lett., vol. 24, no. 9, pp. 1904–1908, Sept. 2020
work page 1904
-
[49]
Finite state Markov wiretap channel with delayed feedback,
B. Dai, Z. Ma, and Y . Luo, “Finite state Markov wiretap channel with delayed feedback,” IEEE Trans. Inf. Forensics Secur., vol. 12, no. 3, pp. 746–760, Mar. 2017
work page 2017
-
[50]
Blind MIMO cooperative jamming: Secrecy via ISI heterogeneity without CSIT,
J. de Dieu Mutangana and R. Tandon, “Blind MIMO cooperative jamming: Secrecy via ISI heterogeneity without CSIT,” IEEE Trans. Inf. Forensics Secur., vol. 15, pp. 447–461, June 2020
work page 2020
-
[51]
Secrecy capacity of independent parallel channels,
Z. Li, R. Yates, and W. Trappe, “Secrecy capacity of independent parallel channels,” in Securing Wireless Communications at the Physical Layer , R. Liu and W. Trappe, Eds. New York: Springer, 2009
work page 2009
-
[52]
Secrecy capacity region of the degraded com- pound multi-receiver wiretap channel,
E. Ekrem and S. Ulukus, “Secrecy capacity region of the degraded com- pound multi-receiver wiretap channel,” in Proc. 47th Annual Allerton Conf. Commun. Control and Computing , Monticello, IL, USA, Sept. 2009, pp. 1278–1285
work page 2009
-
[53]
Wiretap channels with one-time state information: Strong secrecy,
T. S. Han, H. Endo, and M. Sasaki, “Wiretap channels with one-time state information: Strong secrecy,” IEEE Trans. Inf. Forensics Secur. , vol. 13, no. 1, pp. 224–236, Jan. 2018
work page 2018
-
[54]
Applications of LDPC codes to the wiretap channel,
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J. M. Merolla, “Applications of LDPC codes to the wiretap channel,” IEEE Trans. Inf. Theory , vol. 53, no. 8, pp. 2933–2945, Aug. 2007
work page 2007
-
[55]
C. B. Schlegel and L. C. Perez, Trellis and Turbo Coding: Iterative and Graph-Based Error Control Coding, 2nd Edition . Hoboken, NJ, USA: John Wiley & Sons, 2015
work page 2015
-
[56]
Trellis coding for partial-response chan- nels,
J. Wolf and G. Ungerboeck, “Trellis coding for partial-response chan- nels,” IEEE Trans. Commun. , vol. 34, no. 8, pp. 765–773, Aug. 1986
work page 1986
-
[57]
Codes on graphs: Normal realizations,
G. Forney, “Codes on graphs: Normal realizations,” IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 520–548, Feb. 2001
work page 2001
-
[58]
A generalization of the Blahut-Arimoto algorithm to finite-state channels,
P. O. V ontobel, A. Kav ˇci´c, D. M. Arnold, and H. A. Loeliger, “A generalization of the Blahut-Arimoto algorithm to finite-state channels,” IEEE Trans. Inf. Theory , vol. 54, no. 5, pp. 1887–1918, May 2008
work page 1918
-
[59]
R. G. Gallager, Information Theory and Reliable Communication . New York, NY , USA: John Wiley & Sons, 1968
work page 1968
-
[60]
Efficient encoding of low-density parity- check codes,
T. Richardson and R. Urbanke, “Efficient encoding of low-density parity- check codes,” IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 638–656, Feb. 2001
work page 2001
-
[61]
Simulation-based computation of information rates for channels with memory,
D. M. Arnold, H. A. Loeliger, P. O. V ontobel, A. Kav ˇci´c, and W. Zeng, “Simulation-based computation of information rates for channels with memory,” IEEE Trans. Inf. Theory, vol. 52, no. 8, pp. 3498–3508, Aug. 2006
work page 2006
-
[62]
Algorithm for continuous decoding of turbo codes,
S. Benedetto, D. Divsalar, G. Montorsi, and F. Pollara, “Algorithm for continuous decoding of turbo codes,” Electron. Lett., vol. 32, no. 4, pp. 314–315, Feb. 1996
work page 1996
-
[63]
The capacity of low-density parity- check codes under message-passing decoding,
T. J. Richardson and R. L. Urbanke, “The capacity of low-density parity- check codes under message-passing decoding,” IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 599–618, Feb. 2001
work page 2001
-
[64]
On the design of low-density parity-check codes within 0.0045 dB of the Shannon limit,
S. Y . Chung, G. D. Forney, T. J. Richardson, and R. Urbanke, “On the design of low-density parity-check codes within 0.0045 dB of the Shannon limit,” IEEE Commun. Lett. , vol. 5, no. 2, pp. 58–60, Feb. 2001
work page 2001
-
[65]
T. Richardson and R. Urbanke, “Thresholds for turbo codes,” in Proc. IEEE Int. Symp. Inf. Theory , Sorrento, Italy, June 2000
work page 2000
-
[66]
On the achievable information rates of finite state ISI channels,
H. Pfister, J. Soriaga, and P. Siegel, “On the achievable information rates of finite state ISI channels,” in Proc. IEEE Glob. Commun. Conf. , San Antonio, TX, USA, Nov. 2001, pp. 2992–2996
work page 2001
-
[67]
An explanation of ordinal optimization: Soft computing for hard problems,
Y . C. Ho, “An explanation of ordinal optimization: Soft computing for hard problems,” Inf. Sci., vol. 113, no. 3, pp. 169–192, Mar. 1999
work page 1999
-
[68]
A new multilevel coding method using error- correcting codes,
H. Imai and S. Hirakawa, “A new multilevel coding method using error- correcting codes,” IEEE Trans. Inf. Theory, vol. 23, no. 3, pp. 371–377, May 1977
work page 1977
-
[69]
3rd Generation Partnership Project (3GPP), “TS 36.212 (V18.1.0): LTE; Evolved universal terrestrial radio access (E-UTRA); Multiplexing and channel coding (Release 18),” 3GPP, Technical Specification 36.212, Jan. 2025
work page 2025
-
[70]
TS 38.212 (V18.6.0): 5G; NR; Multiplexing and channel coding (Release 18),
——, “TS 38.212 (V18.6.0): 5G; NR; Multiplexing and channel coding (Release 18),” 3GPP, Technical Specification 38.212, Apr. 2025
work page 2025
-
[71]
J. G. Proakis and M. Salehi, Digital Communications , 5th ed. New York, NY: McGraw-Hill Education, 2008
work page 2008
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.