Nian Li

Nian Li
Hubei University · Faculty of Mathematics and Statistics

PhD

About

88
Publications
5,213
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,471
Citations
Citations since 2017
53 Research Items
1195 Citations
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
Additional affiliations
January 2018 - present
Hubei University
Position
  • Professor (Associate)
January 2015 - January 2018
University of Bergen
Position
  • Researcher
March 2014 - August 2014
The Hong Kong University of Science and Technology
Position
  • PostDoc Position
Education
September 2009 - November 2013
Southwest Jiaotong University
Field of study
  • Information Security
September 2006 - July 2009
Hubei University
Field of study
  • Mathematics

Publications

Publications (88)
Article
Cyclic codes are an important class of linear codes, whose weight distribution have been extensively studied. Most previous results obtained so far were for cyclic codes with no more than three zeroes. Inspired by the works of Li et al. (Sci China Math 53:3279–3286, 2010; IEEE Trans Inf Theory 60:3903–3912, 2014), we study two families of cyclic co...
Article
Full-text available
In this paper, a class of functions from Niho exponents with four-valued Walsh transform is obtained for any prime by a uniform method, and the distribution of the Walsh transform values is also completely determined. In particular, this class of functions is proven to be bent for a special case. Although it is shown that the obtained bent function...
Article
Full-text available
Several new classes of binary and p-ary regular bent functions are obtained in this paper. The bentness of all these functions is determined by some exponential sums over finite fields, most of which have close relations with the well-known Kloosterman sums.
Article
Cyclic codes are an important subclass of linear codes and have wide applications in data storage systems, communication systems and consumer electronics. In this paper, two families of optimal ternary cyclic codes are presented. The first family of cyclic codes has parameters $[3^m-1, 3^m-1-2m, 4]$ and contains a class of conjectured cyclic codes...
Article
Full-text available
Three classes of binary sequences of period with optimalautocorrelationvalue/magnitudehavebeenconstructedby Tang and Gong based on interleaving certain kinds of sequences of period , i.e., the Legendre sequence, twin-prime sequence and generalized GMW sequence. In this paper, by means of sequence polynomials of the underlying sequences, the propert...
Preprint
Substitution boxes (S-boxes) play a significant role in ensuring the resistance of block ciphers against various attacks. The Difference Distribution Table (DDT), the Feistel Boomerang Connectivity Table (FBCT), the Feistel Boomerang Difference Table (FBDT) and the Feistel Boomerang Extended Table (FBET) of a given S-box are crucial tools to analyz...
Preprint
In this paper, we construct a large family of projective linear codes over ${\mathbb F}_{q}$ from the general simplicial complexes of ${\mathbb F}_{q}^m$ via the defining-set construction, which generalizes the results of [IEEE Trans. Inf. Theory 66(11):6762-6773, 2020]. The parameters and weight distribution of this class of codes are completely d...
Preprint
This paper deals with Niho functions which are one of the most important classes of functions thanks to their close connections with a wide variety of objects from mathematics, such as spreads and oval polynomials or from applied areas, such as symmetric cryptography, coding theory and sequences. In this paper, we investigate specifically the $c$-d...
Chapter
Boolean functions with n variables are functions from to . They play an important role in both cryptographic and error correcting coding activities. The important information about the cryptographic properties of Boolean functions can be obtained from the study of the Walsh transform. Generally speaking, it is difficult to construct functions with...
Chapter
In this paper, we construct two families of linear codes over the ring \({\mathbb F}_{q}+u{\mathbb F}_{q}\) by the defining set approach, where q is a prime power and \(u^2=0\). We completely determine their Lee weight distributions, which shows that these codes have few Lee weights. Via the Gray map, we obtain a family of near Griesmer codes over...
Chapter
The switching method is a powerful method to construct bent functions. In this paper, using this method, we present two generic constructions of piecewise bent functions from known ones, which generalize some earlier works. Further, based on these two generic constructions, we obtain several infinite families of bent functions from quadratic bent f...
Article
In this paper, we construct a large family of projective linear codes over F <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> q </sub> from the general simplicial complexes of F <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> m </sup> <sub xmlns:mml="http...
Preprint
Starting with the multiplication of elements in $\mathbb{F}_{q}^2$ which is consistent with that over $\mathbb{F}_{q^2}$, where $q$ is a prime power, via some identification of the two environments, we investigate the $c$-differential uniformity for bivariate functions $F(x,y)=(G(x,y),H(x,y))$. By carefully choosing the functions $G(x,y)$ and $H(x,...
Article
Let F2n be a finite field with 2n elements and fc_(x)=c0x2m(2k+1)+c1x2m+k+1+c2x2m+2k+c3x2k+1∈F2n[x], where n, m and k are positive integers with n=2m and gcd⁡(m,k)=e. In this paper, motivated by a recent work of Li, Xiong and Zeng (Li et al. (2021) [12]), we further study the boomerang uniformity of fc_(x) by using similar ideas and carrying out pa...
Article
Full-text available
Inspired by the works of Mesnager (IEEE Trans Inf Theory 60(7):4397–4407, 2014) and Tang et al. (IEEE Trans Inf Theory 63(10):6149–6157, 2017), we study a class of bent functions of the form f(x)=g(x)+F(f1(x),f2(x),…,\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy...
Preprint
In this article, we focus on the concept of locally-APN-ness (``APN" is the abbreviation of the well-known notion of Almost Perfect Nonlinear) introduced by Blondeau, Canteaut, and Charpin, which makes the corpus of S-boxes somehow larger regarding their differential uniformity and, therefore, possibly, more suitable candidates against the differen...
Article
In this paper, we construct four families of linear codes over finite fields from the complements of either the union of subfields or the union of cosets of a subfield, which can produce infinite families of optimal linear codes, including infinite families of (near) Griesmer codes. We also characterize the optimality of these four families of line...
Preprint
In this paper, we study the boomerang spectrum of the power mapping $F(x)=x^{k(q-1)}$ over ${\mathbb F}_{q^2}$, where $q=p^m$, $p$ is a prime, $m$ is a positive integer and $\gcd(k,q+1)=1$. We first determine the differential spectrum of $F(x)$ and show that $F(x)$ is locally-APN. This extends a result of [IEEE Trans. Inf. Theory 57(12):8127-8137,...
Article
Full-text available
Very recently, a class of cryptographically strong permutations with boomerang uniformity 4 and the best known nonlinearity is constructed from the closed butterfly structure in Li et al. (Des Codes Cryptogr 89(4):737–761, 2021). In this note, we provide two additional results concerning these permutations. We first represent the conditions of thes...
Article
Let \begin{document}$ {\mathcal{C}}_{(u, v)} $\end{document} denote the ternary cyclic code with two zeros \begin{document}$ \alpha^u $\end{document} and \begin{document}$ \alpha^v $\end{document}, where \begin{document}$ \alpha $\end{document} is a generator of \begin{document}$ {\mathbb F}_{3^m}^{*} $\end{document} and \begin{document}$ 1\leq u,...
Article
In this paper, we investigate the power function F ( x ) = x<sup>d</sup> over the finite field F<sub>2<sup>4 n </sup></sub>, where n is a positive integer and d = 2<sup>3 n </sup> + 2<sup>2 n </sup> + 2<sup> n </sup> - 1. We prove that this power function is AP c N with respect to all c ϵ F<sub>2<sup>4 n </sup></sub> \ {1} satisfying c <sup>2<sup>2...
Article
Motivated by a recent work of Zhang and Yan on the \begin{document}$ c $\end{document}-differential spectrum of some power functions over finite fields, we further study an AP\begin{document}$ c $\end{document}N function and express its \begin{document}$ c $\end{document}-differential spectrum in terms of \begin{document}$ (i, j, k)_2 $\end{documen...
Article
This article focuses on the so-called locally-APN power functions introduced by Blondeau, Canteaut and Charpin, which generalize the well-known notion of APN functions and possibly more suitable candidates against differential attacks. Specifically, given two coprime positive integers $m$ and $k$ such that $\gcd (2^{m}+1,2^{k}+1)=1$ , we inve...
Article
In this paper, permutation polynomials of the form xd+L(xs) over finite fields Fq3 are investigated, where q=2m and m is a positive integer. By means of the iterative method, the multivariate method and the resultant elimination, six classes of permutation trinomials are obtained from certain integers d, s and linearized polynomials L(x). It is als...
Article
Linear codes with few weights have applications in data storage systems, secret sharing schemes and authentication codes. In this paper, inspired by the butterfly structure [6], [29] and the works of Li, Yue and Fu [21] and Jian, Lin and Feng [19], we introduce a new defining set with the form of the closed butterfly structure and consequently we o...
Article
Full-text available
Functions with low c-differential uniformity were proposed in 2020 and attracted lots of attention, especially the PcN and APcN functions, due to their applications in cryptography. The objective of this paper is to study PcN and APcN functions. As a consequence, we propose two classes of PcN functions and three classes of APcN functions by using t...
Preprint
In this paper, we construct four families of linear codes over finite fields from the complements of either the union of subfields or the union of cosets of a subfield, which can produce infinite families of optimal linear codes, including infinite families of (near) Griesmer codes. We also characterize the optimality of these four families of line...
Preprint
Let $\mathbb{F}_{p^{n}}$ be the finite field with $p^n$ elements and $\operatorname{Tr}(\cdot)$ be the trace function from $\mathbb{F}_{p^{n}}$ to $\mathbb{F}_{p}$, where $p$ is a prime and $n$ is an integer. Inspired by the works of Mesnager (IEEE Trans. Inf. Theory 60(7): 4397-4407, 2014) and Tang et al. (IEEE Trans. Inf. Theory 63(10): 6149-6157...
Article
Extending previous results, we study a class of general quadrinomials over the field of size 2 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2m</sup> with odd m and characterize conditions under which they are permutations with 4-uniform BCT, a new and important parameter related to boomerang-style a...
Preprint
Differential uniformity is a significant concept in cryptography as it quantifies the degree of security of S-boxes respect to differential attacks. Power functions of the form $F(x)=x^d$ with low differential uniformity have been extensively studied in the past decades due to their strong resistance to differential attacks and low implementation c...
Preprint
Functions with low $c$-differential uniformity were proposed in $2020$ and attracted lots of attention, especially the P$c$N and AP$c$N functions, due to their applications in cryptography. The objective of this paper is to study P$c$N and AP$c$N functions. As a consequence, we propose a class of P$c$N functions and four classes of AP$c$N functions...
Article
Full-text available
Linear codes have a wide range of applications in the data storage systems, communication systems, consumer electronics products since their algebraic structure can be analyzed and they are easy to implement in hardware. How to construct linear codes with excellent properties to meet the demands of practical systems becomes a research topic, and it...
Article
Full-text available
A class of quadratic vectorial bent functions having the form F(x)=Trmn(ax2s1+1)+Tr1n(bx2s2+1) is investigated, where n; m; s1; s2 are positive integers and the coefficients a, b belong to the finite field F2ⁿ. Through some discussions on the permutation property of certain linearized polynomials over F2ⁿ, several classes of quadratic vectorial ben...
Article
Full-text available
Linear codes with few weights constructed from defining sets have been extensively studied due to their applications in data storage systems, secret sharing schemes and authentication codes. In this paper, inspired by the works of Li et al. (Appl Algebra Eng Commun Comput 28(1):11–30, 2017) and Jian et al. (Finite Fields Appl 57:92–107, 2019), we p...
Article
Linear codes with few weights have applications in data storage systems, secret sharing schemes and authentication codes. In this paper, inspired by the works of Heng and Yue (2016) [14] and Tan, Zhou, Tang and Helleseth (2017) [25], we extend Tan, Zhou, Tang and Helleseth's work to obtain a class of optimal 1-weight binary linear codes, new classe...
Article
In Eurocrypt'18, Cid et al. proposed a new cryptanalysis tool called Boomerang Connectivity Table (BCT), to evaluate S-boxes of block ciphers. Later, Boura and Canteaut further investigated the new parameter Boomerang uniformity for cryptographic S-boxes. It is of great interest to find new S-boxes with low Boomerang uniformity for even dimensions....
Preprint
As a generalization of Dillon's APN permutation, butterfly structure and generalizations have been of great interest since they generate permutations with the best known differential and nonlinear properties over the field of size $2^{4k+2}$. Complementary to these results, we show in this paper that butterfly structure, more precisely the closed b...
Preprint
We study a class of general quadrinomials over the field of size $2^{2m}$ with odd $m$ and characterize conditions under which they are permutations with the best boomerang uniformity, a new and important parameter related to boomerang-style attacks. This vastly extends previous results from several recent papers.
Article
In this paper, a class of p-ary 3-weight linear codes and a class of binary 2-weight linear codes are proposed respectively by virtue of the properties of the perfect nonlinear functions over F <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">p(m)</sub> and (m, s)-bent functions from F <sub xmlns:mml="h...
Article
An involution over finite fields is a permutation polynomial whose inverse is itself. Owing to this property, involutions over finite fields have been widely used in applications such as cryptography and coding theory. Following the idea in [28] to characterize the involutory behavior of the generalized cyclotomic mappings, this paper gives a more...
Article
Full-text available
The Niho exponent was introduced by Yoji Niho, who investigated the cross-correlation function between an m-sequence and its decimation sequence in 1972. Since then, Niho exponents have been used in other research areas such as in cryptography and coding theory. In this paper, we introduce some research problems related to Niho exponents and survey...
Article
Full-text available
In this paper, a class of permutation trinomials of Niho type over finite fields with even characteristic is further investigated. New permutation trinomials from Niho exponents are obtained from linear fractional polynomials over finite fields, and it is shown that the presented results are the generalizations of some earlier works.
Article
Rotation symmetric bent functions are a special class of Boolean functions, and their construction is of theoretical and practical interest. In this paper, we propose a generic construction of rotation symmetric bent functions by modifying the support of a known class of quadratic rotation symmetric bent functions, which generalizes some earlier wo...
Article
Three classes of (balanced) Boolean functions with few Walsh transform values derived from bent functions, Gold functions and the product of linearized polynomials are obtained in this paper. Further, the value distributions of their Walsh transform are also determined by virtue of the property of bent functions, the Walsh transform property of Gol...
Article
In this paper, based on the theory of \begin{document}$ \mathbb{Z}_{4} $\end{document}-valued quadratic forms we propose several classes of generalized Boolean bent functions over \begin{document}$ \mathbb{Z}_{4} $\end{document}, and new families of codebooks are constructed from these functions. The codebooks constructed in this paper are nearly o...
Preprint
An involution over finite fields is a permutation polynomial whose inverse is itself. Owing to this property, involutions over finite fields have been widely used in applications such as cryptography and coding theory. As far as we know, there are not many involutions, and there isn't a general way to construct involutions over finite fields. This...
Preprint
In this paper, by analyzing the quadratic factors of an $11$-th degree polynomial over the finite field $\ftwon$, a conjecture on permutation trinomials over $\ftwon[x]$ proposed very recently by Deng and Zheng is settled, where $n=2m$ and $m$ is a positive integer with $\gcd(m,5)=1$.
Preprint
Cyclic codes are an important class of linear codes, whose weight distribution have been extensively studied. Most previous results obtained so far were for cyclic codes with no more than three zeroes. Inspired by the works \cite{Li-Zeng-Hu} and \cite{gegeng2}, we study two families of cyclic codes over $\mathbb{F}_p$ with arbitrary number of zeroe...
Article
Full-text available
Motivated by recent results on the constructions of permutation polynomials with few terms over the finite field 𝔽2n\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}${\mat...
Article
We study the problem of existence of APN functions of algebraic degree n over F2n. We characterize such functions by means of derivatives and power moments of the Walsh transform. We deduce several non-existence results which imply, in particular, that for most of the known APN functions F over F2n the function x2n−1+F(x) is not APN, and changing a...
Article
Permutation polynomials having the form over finite fields of even characteristic are investigated in this paper. Eight classes of such polynomials are proved to be permutations.
Article
A family IP8 of sequences over the 8-ary quadrature-pulse amplitude modulation (Q-PAM) constellation with asymptotically optimal correlation property was presented by Anand and Kumar in 2008. This is the only known family of sequences over the quadrature amplitude modulation (QAM) constellation whose correlation magnitude asymptotically achieves th...
Conference Paper
In this paper, we determine the Walsh spectra of three classes of quadratic APN functions and we prove that the class of quadratic trinomial APN functions constructed by Göloğlu is affine equivalent to Gold functions.
Article
Full-text available
The construction of permutation trinomials over finite fields attracts people’s interest recently due to their simple form and some additional properties. Motivated by some results on the construction of permutation trinomials with Niho exponents, in this paper, by constructing some new fractional polynomials that permute the set of the (q + 1)-th...
Article
In this paper, a class of binary cyclic codes with three generalized Niho-type nonzeros is introduced. Based on some techniques in solving certain equations over finite fields, the proposed cyclic codes are shown to have six nonzero weights and the weight distribution is also completely determined.
Article
In this paper, let $n=2m$ and $d=3^{m+1}-2$ with $m\geq2$ and $\gcd(d,3^n-1)=1$. By studying the weight distribution of the ternary Zetterberg code and counting the numbers of solutions of some equations over the finite field $\mathbb{F}_{3^n}$, the correlation distribution between a ternary $m$-sequence of period $3^n-1$ and its $d$-decimation seq...
Article
Full-text available
Linear codes with few weights have applications in secrete sharing, authentication codes, association schemes, and strongly regular graphs. In this paper, several classes of p-ary linear codes with two or three weights are constructed from quadratic Bent functions over the finite field Fp\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackag...
Article
Permutation polynomials with few terms attracts researchers' interest in recent years due to their simple algebraic form and some additional extraordinary properties. In this paper, by analyzing the quadratic factors of a fifth-degree polynomial and a seventh-degree polynomial over the finite field $\mathbb{F}_{3^{2k}}$, two conjectures on permutat...
Article
In this paper, let n = 2k and d = 3 · 2 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">k</sup> - 2 with k ≥ 3 and gcd(d, 2 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">n</sup> - 1) = 1. Based on some analysis of certain equations over finite fields and...
Article
Negabent functions as a class of generalized bent functions have attracted a lot of attention recently due to their applications in cryptography and coding theory. In this paper, we consider the constructions of negabent functions over finite fields. First, by using the compositional inverses of certain binomial and trinomial permutations, we prese...
Article
Linear codes with a few weights have applications in consumer electronics, communication, data storage system, secret sharing, authentication codes, association schemes, and strongly regular graphs. This paper first generalizes the method of constructing two-weight and three-weight linear codes of Ding et al. and Zhou et al. to general weakly regul...
Article
Cyclic codes have been an important topic of both mathematics and engineering for decades. They have been widely used in consumer electronics, data transmission technologies, broadcast systems, and computer applications as they have efficient encoding and decoding algorithms. The objective of this paper is to provide a survey of three-weight cyclic...
Article
Cyclic codes are a subclass of linear codes and have applications in consumer electronics, data storage systems, and communication systems as they have efficient encoding and decoding algorithms. Let $m=2\ell+1$ for an integer $\ell\geq 1$ and $\pi$ be a generator of $\gf(3^m)^*$. In this paper, a class of cyclic codes $\C_{(u,v)}$ over $\gf(3)$ wi...
Conference Paper
Cyclic codes are an important class of linear codes and have been widely used in many areas such as consumer electronics, data storage and communication systems. Let C(1,e) denote the cyclic code with generator polynomial mα(x)mαe (x), where α is a primitive element of F3m and mαi (x) denotes the minimal polynomial of αi over F3 for 1 ≤ i ≤ 3m − 1....
Article
A class of quaternary sequences Sλ had been proven to be optimal for some special values of λ. In this note, Sλ is investigated for all λ by virtue of the ℤ4-valued quadratic forms over Galois rings. As a consequence, a new class of quaternary sequences with low correlation is obtained and the correlation distribution is also completely determined....
Article
Full-text available
In this paper we extend the works \cite{gegeng2,XLZD} further in two directions and compute the weight distribution of these cyclic codes under more relaxed conditions. It is interesting to note that many cyclic codes in the family are optimal and have only a few non-zero weights. Besides using similar ideas from \cite{gegeng2,XLZD}, we carry out s...
Article
Full-text available
By using a powerful criterion for permutation polynomials, we give several classes of complete permutation polynomials over finite fields. First, two classes of complete permutation monomials whose exponents are of Niho type are presented. Second, for any odd prime p, we give a sufficient and necessary condition for a −1x d to be a complete permuta...
Article
In this paper, a construction of codebooks based on a set of bent functions satisfying certain conditions is introduced. It includes some earlier constructions of codebooks meeting the Levenstein bound as special cases. With this construction, two new families of codebooks achieving the Levenstein bound are obtained. The codebooks constructed in th...
Article
Let p and q be two odd primes with p=Mf+1 and M is even. A new construction of M -ary sequences of period pq with low periodic autocorrelation is presented in this paper based on interleaving the M -ary power residue sequence of period p according to the quadratic residue with respect to q. This construction can generate the well-known twin-prime s...
Article
New quadratic bent functions in polynomial form are constructed in this paper. The constructions give new Boolean bent, generalized Boolean bent and (p) -ary bent functions. Based on (boldsymbol {mathbb {Z}}_{4}) -valued quadratic forms, a simple method provides several new constructions of generalized Boolean bent functions. From these generalized...
Article
In this paper, four classes of complete permutation polynomials over finite fields of characteristic two are presented. To consider the permutation property of the first three classes, Dickson polynomials play a key role. The fourth class is a generalization of a known result. In addition, we also calculate the inverses of these bijective monomials...
Article
Full-text available
In this paper, by using a powerful criterion for permutation polynomials given by Zieve, and some low degree permutation polynomials over $\F_{q}$, we give several classes of complete permutation monomials over $\F_{q^r}$. In addition, we present a class of complete permutation multinomials, which is a generalization of recent work.
Article
Full-text available
Let $m\geq 3$ be an odd integer and $p$ be an odd prime. % with $p-1=2^rh$, where $h$ is an odd integer. In this paper, many classes of three-weight cyclic codes over $\mathbb{F}_{p}$ are presented via an examination of the condition for the cyclic codes $\mathcal{C}_{(1,d)}$ and $\mathcal{C}_{(1,e)}$, which have parity-check polynomials $m_1(x)m_d...
Article
A class of permutation polynomials with given form over finite fields is investigated in this paper, which is a further study on a recent work of Zha and Hu. Based on some particular techniques over finite fields, two results obtained by Zha and Hu are improved and new permutation polynomials are also obtained.
Article
Full-text available
Bipolar complementary sequence pairs of Types II and III are defined, enumerated for n ≤ 28, and classified. Type-II pairs are shown to exist only at lengths 2 m , and necessary conditions for Type-III pairs lead to a non-existence conjecture regarding their length.
Conference Paper
New quadratic bent functions in polynomial forms are constructed in this paper. The constructions give new boolean bent and generalized boolean bent functions. Based on Z4-valued quadratic forms, a simple method provides several new constructions of generalized boolean bent functions. From these generalized boolean bent functions a method is presen...
Article
Let m and k be positive integers with m/gcd(m,k) being odd, for a ∈ R and b ∈ L, the exponential sum Σx∈LiTr(ax+2bx2k+1) is studied systematically in this paper, where i=√(-1), R = GR (4,m) is a Galois ring, L is the Teichmüller set of R and Tr(·) is the trace function from the Galois ring R to Z4. Through the discussions on the solutions of certai...
Article
Recently, new optimal Families S and U of quaternary sequences have been presented, and the optimal binary sequence Family V obtained from Family S under Gray map has been investigated as well. The two sequence Families U and V are optimal with respect to the well-known Sidelnikov bound and Welch bound, but their exact correlation distributions are...
Article
Full-text available
In this paper, we follow the recent work of Helleseth, Kholosha, Johanssen and Ness to study the cross correlation between an $m$-sequence of period $2^m-1$ and the $d$-decimation of an $m$-sequence of shorter period $2^{n}-1$ for an even number $m=2n$. Assuming that $d$ satisfies $d(2^l+1)=2^i({\rm mod} 2^n-1)$ for some $l$ and $i$, we prove the c...
Conference Paper
In this paper, for an even integer n ≥ 4 and any positive integer k with gcd(n/2,k) = gcd(n/2 − k,2k) = d being odd, a class of p-ary codes Ck\mathcal{C}^k is defined and the weight distribution is completely determined, where p is an odd prime. A class of nonbinary sequence families is constructed from these codes, and the correlation distributio...
Article
Based on cyclic difference sets, sequences with two-valued autocorrelation can be constructed. Using these constructed sequences, two classes of binary constant weight codes are presented. Some codes proposed in this paper are proven to be optimal.
Article
Full-text available
In this paper, for an even integer $n\geq 4$ and any positive integer $k$ with ${\rm gcd}(n/2,k)={\rm gcd}(n/2-k,2k)=d$ being odd, a class of $p$-ary codes $\mathcal{C}^k$ is defined and their weight distribution is completely determined, where $p$ is an odd prime. As an application, a class of nonbinary sequence families is constructed from these...

Questions

Question (1)
Question
For a given sequence, a cyclic code can be obtained if one defines the generator polynomial of the code as the minimal polynomial of the sequence. Recently, this method has been used as another way to construct optimal codes. However, it seems that it is difficult to obtained optimal codes from this approach.

Network

Cited By