Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sergey Bezzateev is active.

Publication


Featured researches published by Sergey Bezzateev.


IEEE Transactions on Information Theory | 2012

Decoding Cyclic Codes up to a New Bound on the Minimum Distance

Alexander Zeh; Antonia Wachter-Zeh; Sergey Bezzateev

A new lower bound on the minimum distance of q-ary cyclic codes is proposed. This bound improves upon the Bose-Chaudhuri-Hocquenghem bound and, for some codes, upon the Hartmann-Tzeng bound. Several Boston bounds are special cases of our bound. For some classes of codes, the bound on the minimum distance is refined. Furthermore, a quadratic-time decoding algorithm up to this new bound is developed. The determination of the error locations is based on the Euclidean algorithm and a modified Chien search. The error evaluation is done by solving a generalization of Forneys formula.


trust, security and privacy in computing and communications | 2015

Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular Connectivity

Aleksandr Ometov; Konstantin Zhidanov; Sergey Bezzateev; Roman Florea; Sergey Andreev; Yevgeni Koucheryavy

Network-assisted device-to-device (D2D) communication is a next-generation wireless technology enabling direct connectivity between proximate user devices under the control of cellular infrastructure. It couples together the centralized and the distributed network architectures, and as such requires respective enablers for secure, private, and trusted data exchange especially when cellular control link is not available at all times. In this work, we conduct the state-of-the-art overview and propose a novel algorithm to maintain security functions of proximate devices in case of unreliable cellular connectivity, whether a new device joins the secure group of users or an existing device leaves it. Our proposed solution and its rigorous mathematical implementation detailed in this work open door to a novel generation of secure proximity-based services and applications in future wireless communication systems.


Designs, Codes and Cryptography | 2014

A New Bound on the Minimum Distance of Cyclic Codes Using Small-Minimum-Distance Cyclic Codes

Alexander Zeh; Sergey Bezzateev

A new bound on the minimum distance of q-ary cyclic codes is proposed. It is based on the description by another cyclic code with small minimum distance. The connection to the BCH bound and the Hartmann–Tzeng (HT) bound is formulated explicitly. We show that for many cases our approach improves the HT bound. Furthermore, we refine our bound for several families of cyclic codes. We define syndromes and formulate a Key Equation that allows an efficient decoding up to our bound with the Extended Euclidean Algorithm. It turns out that lowest-code-rate cyclic codes with small minimum distances are useful for our approach. Therefore, we give a sufficient condition for binary cyclic codes of arbitrary length to have minimum distance two or three and lowest code-rate.


Designs, Codes and Cryptography | 2013

Class of generalized Goppa codes perfect in weighted Hamming metric

Sergey Bezzateev; Natalia A. Shekhunova

A weighted Hamming metric is considered. A class of binary linear codes consistent with the weighted Hamming metric is discussed. A class of binary generalized Goppa codes perfect in the weighted Hamming metric is offered.


IEEE Transactions on Information Theory | 2013

Subclass of Cyclic Goppa Codes

Sergey Bezzateev; Natalia A. Shekhunova

The subclass of cyclic Goppa codes is proposed. It is proved that this subclass contains all cyclic codes of length n|q<sup>m</sup>±1 with generator polynomial g(x), g(α<sup>i</sup>)=g(α<sup>-j</sup>)=0, i=0,1,..., s<sub>1</sub>, j=1,..., s<sub>2</sub>, α<sup>n</sup>=1, α ∈ GF(q<sup>2m</sup>).


2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems | 2012

Steganographic method on weighted container

Sergey Bezzateev; Natalia Voloshina; Konstantin Zhidanov

This paper discusses the approach to construction of steganographic method for the weighted container. To find the efficient solution, concept of Penalty Function is introduced. The analysis of the efficiency of the weighted embedding for the simple model of weighted container is shown.


IEEE Transactions on Information Theory | 2008

Chain of Separable Binary Goppa Codes and Their Minimal Distance

Sergey Bezzateev; Natalia A. Shekhunova

It is shown that subclasses of separable binary Goppa codes, <i>Gamma(L</i>,<i>G</i>) - codes, with <i>L</i>={alpha isin GF(2<sup>2l</sup>):<i>G</i>(alpha) ne 0 } and special Goppa polynomials <i>G</i>(<i>x</i>) can be presented as a chain of embedded and equivalent codes. The true minimal distance has been obtained for all codes of the chain.


international symposium on information theory | 2013

Generalizing bounds on the minimum distance of cyclic codes using cyclic product codes

Alexander Zeh; Antonia Wachter-Zeh; Maximilien Gadouleau; Sergey Bezzateev

Two generalizations of the Hartmann-Tzeng (HT) bound on the minimum distance of q-ary cyclic codes are proposed. The first one is proven by embedding the given cyclic code into a cyclic product code. Furthermore, we show that unique decoding up to this bound is always possible and outline a quadratic-time syndrome-based error decoding algorithm. The second bound is stronger and the proof is more involved. Our technique of embedding the code into a cyclic product code can be applied to other bounds, too and therefore generalizes them.


2013 13th Conference of Open Innovations Association (FRUCT) | 2013

Joint safety and security analysis for complex systems

Sergey Bezzateev; Natalia Voloshina; Petr Sankin

The problem of joint safety and security analysis is considered. For complex systems method of fault tree analysis for safety and security is proposed. The effectiveness of new approach of joint safety and security analysis is shown on example of the European Railway Traffic Management System (ERTMS).


international symposium on information theory | 2011

Efficient decoding of some classes of binary cyclic codes beyond the Hartmann-Tzeng bound

Alexander Zeh; Antonia Wachter; Sergey Bezzateev

A new bound on the distance of binary cyclic codes is proposed. The approach is based on the representation of a subset of the roots of the generator polynomial by a rational function. A new bound on the minimum distance is proven and several classes of binary cyclic codes are identified. For some classes of codes, this bound is better than the known bounds (e.g. BCH or Hartmann-Tzeng bound). Furthermore, a quadratic-time decoding algorithm up to this new bound is developed.

Collaboration


Dive into the Sergey Bezzateev's collaboration.

Top Co-Authors

Avatar

Natalia Voloshina

Saint Petersburg State University of Aerospace Instrumentation

View shared research outputs
Top Co-Authors

Avatar

Natalia A. Shekhunova

Saint Petersburg State University of Aerospace Instrumentation

View shared research outputs
Top Co-Authors

Avatar

Aleksandr Ometov

Tampere University of Technology

View shared research outputs
Top Co-Authors

Avatar

Sergey Andreev

Tampere University of Technology

View shared research outputs
Top Co-Authors

Avatar

Konstantin Zhidanov

Saint Petersburg State University of Aerospace Instrumentation

View shared research outputs
Top Co-Authors

Avatar

Alexander Zeh

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yevgeni Koucheryavy

Tampere University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge