Statistical physics of low density parity check error correcting codes

David Saad, Yoshiyuki Kabashima, Tatsuto Murayama, Renato Vicente

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

We study the performance of Low Density Parity Check (LDPC) error-correcting codes using the methods of statistical physics. LDPC codes are based on the generation of codewords using Boolean sums of the original message bits by employing two randomly-constructed sparse matrices. These codes can be mapped onto Ising spin models and studied using common methods of statistical physics. We examine various regular constructions and obtain insight into their theoretical and practical limitations. We also briefly report on results obtained for irregular code constructions, for codes with non-binary alphabet, and on how a finite system size effects the error probability.
Original languageEnglish
Title of host publicationCryptography and Coding
EditorsB. Honary
Place of PublicationBerlin / Heidelberg
PublisherSpringer
Pages307-316
Number of pages10
Volume2260
ISBN (Print)9783540430261
DOIs
Publication statusPublished - 1 Jan 2001
EventCryptography and Coding, 8-th IMA International Conference -
Duration: 1 Jan 20011 Jan 2001

Publication series

NameLecture Notes in Computer Science
PublisherSpringer-Verlag

Conference

ConferenceCryptography and Coding, 8-th IMA International Conference
Period1/01/011/01/01

Bibliographical note

The original publication is available at www.springerlink.com

Keywords

  • Low Density Parity Check (LDPC)
  • error correcting codes
  • statistical physics
  • boolean
  • sparse matrices
  • Ising spin models
  • irregular code
  • error probability

Fingerprint Dive into the research topics of 'Statistical physics of low density parity check error correcting codes'. Together they form a unique fingerprint.

  • Cite this

    Saad, D., Kabashima, Y., Murayama, T., & Vicente, R. (2001). Statistical physics of low density parity check error correcting codes. In B. Honary (Ed.), Cryptography and Coding (Vol. 2260, pp. 307-316). (Lecture Notes in Computer Science). Springer. https://doi.org/10.1007/3-540-45325-3_27