Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Peter Beelen is active.

Publication


Featured researches published by Peter Beelen.


Finite Fields and Their Applications | 2007

The order bound for general algebraic geometric codes

Peter Beelen

The order bound gives an in general very good lower bound for the minimum distance of one-point algebraic geometric codes coming from curves. This paper is about a generalization of the order bound to several-point algebraic geometric codes coming from curves.


Journal of Symbolic Computation | 2010

Key equations for list decoding of Reed-Solomon codes and how to solve them

Peter Beelen; Kristian Brander

A Reed-Solomon code of length n can be list decoded using the well-known Guruswami-Sudan algorithm. By a result of Alekhnovich (2005) the interpolation part in this algorithm can be done in complexity O(s^4l^4nlog^2nloglogn), where l denotes the designed list size and s the multiplicity parameter. The parameters l and s are sometimes considered to be constants in the complexity analysis, but for high rate Reed-Solomon codes, their values can be very large. In this paper we will combine ideas from Alekhnovich (2005) and the concept of key equations to get an algorithm that has complexity O(sl^4nlog^2nloglogn). This compares favorably to the complexities of other known interpolation algorithms.


international cryptology conference | 2012

On the Distribution of Linear Biases: Three Instructive Examples

Mohamed Ahmed Abdelraheem; Martin Ågren; Peter Beelen; Gregor Leander

Despite the fact that we evidently have very good block ciphers at hand today, some fundamental questions on their security are still unsolved. One such fundamental problem is to precisely assess the security of a given block cipher with respect to linear cryptanalysis. In by far most of the cases we have to make (clearly wrong) assumptions, e.g., assume independent round-keys. Besides being unsatisfactory from a scientific perspective, the lack of fundamental understanding might have an impact on the performance of the ciphers we use. As we do not understand the security sufficiently enough, we often tend to embed a security margin -- from an efficiency perspective nothing else than wasted performance. The aim of this paper is to stimulate research on these foundations of block ciphers. We do this by presenting three examples of ciphers that behave differently to what is normally assumed. Thus, on the one hand these examples serve as counter examples to common beliefs and on the other hand serve as a guideline for future work.


IEEE Journal of Solid-state Circuits | 2002

Pseudorandom sequences from elliptic curves

Peter Beelen; J.M. Doumen

In this article we will generalize some known constructions to produce pseudorandom sequences with the aid of elliptic curves. We will make use of both additive and multiplicative characters on elliptic curves.


theory and application of cryptographic techniques | 2015

Twisted Polynomials and Forgery Attacks on GCM

Mohamed Ahmed Abdelraheem; Peter Beelen; Andrey Bogdanov; Elmar Tischhauser

Polynomial hashing as an instantiation of universal hashing is a widely employed method for the construction of MACs and authenticated encryption (AE) schemes, the ubiquitous GCM being a prominent example. It is also used in recent AE proposals within the CAESAR competition which aim at providing nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naive approaches is crucial for these attacks, but still an open problem.


IEEE Transactions on Information Theory | 2013

On Rational Interpolation-Based List-Decoding and List-Decoding Binary Goppa Codes

Peter Beelen; Tom Høholdt; Johan Sebastian Rosenkilde Nielsen; Yingquan Wu

We derive the Wu list-decoding algorithm for generalized Reed-Solomon (GRS) codes by using Gröbner bases over modules and the Euclidean algorithm as the initial algorithm instead of the Berlekamp-Massey algorithm. We present a novel method for constructing the interpolation polynomial fast. We give a new application of the Wu list decoder by decoding irreducible binary Goppa codes up to the binary Johnson radius. Finally, we point out a connection between the governing equations of the Wu algorithm and the Guruswami-Sudan algorithm, immediately leading to equality in the decoding range and a duality in the choice of parameters needed for decoding, both in the case of GRS codes and in the case of Goppa codes.


IEEE Transactions on Information Theory | 2012

Duals of Affine Grassmann Codes and Their Relatives

Peter Beelen; Sudhir R. Ghorpade; Tom Høholdt

Affine Grassmann codes are a variant of generalized Reed-Muller codes and are closely related to Grassmann codes. These codes were introduced in a recent work by Beelen Here, we consider, more generally, affine Grassmann codes of a given level. We explicitly determine the dual of an affine Grassmann code of any level and compute its minimum distance. Further, we ameliorate the results by Beelen concerning the automorphism group of affine Grassmann codes. Finally, we prove that affine Grassmann codes and their duals have the property that they are linear codes generated by their minimum-weight codewords. This provides a clean analogue of a corresponding result for generalized Reed-Muller codes.


Advances in Mathematics of Communications | 2010

Efficient list decoding of a class of algebraic-geometry codes

Peter Beelen; Kristian Brander

We consider the problem of list decoding algebraic-geometry codes. We define a general class of one-point algebraic-geometry codes encompassing, among others, Reed-Solomon codes, Hermitian codes and norm-trace codes. We show how for such codes the interpolation constraints in the Guruswami-Sudan list-decoder, can be rephrased using a module formulation. We then generalize an algorithm by Alekhnovich [2], and show how this can be used to efficiently solve the interpolation problem in this module reformulation. The family of codes we consider has a number of well-known members, for which the interpolation part of the Guruswami-Sudan list decoder has been studied previously. For such codes the complexity of the interpolation algorithm we propose, compares favorably to the complexity of known algorithms.


Finite Fields and Their Applications | 2009

A generalization of Baker's theorem

Peter Beelen

Bakers theorem is a theorem giving an upper-bound for the genus of a plane curve. It can be obtained by studying the Newton-polygon of the defining equation of the curve. In this paper we give a different proof of Bakers theorem not using Newton-polygon theory, but using elementary methods from the theory of function fields (Theorem 2.4). Also we state a generalization to several variables that can be used if a curve is defined by several bivariate polynomials that all have one variable in common (Theorem 3.3). As a side result, we obtain a partial explicit description of certain Riemann-Roch spaces, which is useful for applications in coding theory. We give several examples and compare the bound on the genus we obtain, with the bound obtained from Castelnuovos inequality.


Applicable Algebra in Engineering, Communication and Computing | 2009

The Order Bound for Toric Codes

Peter Beelen; Diego Ruano

In this paper we investigate the minimum distance of generalized toric codes using an order bound like approach. We apply this technique to a family of codes that includes the Joyner code. For some codes in this family we are able to determine the exact minimum distance.

Collaboration


Dive into the Peter Beelen's collaboration.

Top Co-Authors

Avatar

Alp Bassa

Boğaziçi University

View shared research outputs
Top Co-Authors

Avatar

Tom Høholdt

Technical University of Denmark

View shared research outputs
Top Co-Authors

Avatar

Sudhir R. Ghorpade

Indian Institute of Technology Bombay

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Arnaldo Garcia

Instituto Nacional de Matemática Pura e Aplicada

View shared research outputs
Top Co-Authors

Avatar

Mrinmoy Datta

Technical University of Denmark

View shared research outputs
Top Co-Authors

Avatar

Kristian Brander

Technical University of Denmark

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nhut Nguyen

Technical University of Denmark

View shared research outputs
Top Co-Authors

Avatar

Nurdagül Anbar

Technical University of Denmark

View shared research outputs
Researchain Logo
Decentralizing Knowledge