Publications
My major research interests lie in the area of information technology and communication (ICT), paritucluarly on
waveform design for wireless communications: waveforms/signals with desirable periodic and aperiodic correlations
feedback shift register (FRS) sequences: the max-length FSR sequences and complexity measures of pseudo-random sequences
coding theory: algebraic codes in Hamming metric and rank metric and their applications in communications, storage and cryptography
cryptography: symmetric cryptographic primitives, homomorphic encryptions, searchable encryptions, code-based cryptography
blockchain: design and applications of blockchain
discrete mathematics: permutations polynomials and cryptographically strong functions
Author | Title | Year | Journal/Proceedings | Reftype | DOI/URL |
Franch, E. and Li, C. |
Two new algorithms for error support recovery of low rank parity check codes [Abstract] [BibTeX] |
2023 |
IEEE International Symposium on Information Theory, ISIT 2023, Taipei, Taiwan, June 25-30, 2023, pp. 2368-2373 |
inproceedings |
DOI URL |
Abstract: Due to their weak algebraic structure, low rank parity check (LRPC) codes have been employed in several post-quantum cryptographic schemes. In this paper we propose new improved decoding algorithms for [ n,text k ]_q^m LRPC codes of dual rank weight d. The proposed algorithms can efficiently decode LRPC codes with the parameters satisfying n − k = rd − c, where r is the dimension of the error support and c ≤ d − 2. They outperform the original decoding algorithm of LRPC codes when d > 2 and allow for decoding LRPC codes with a higher code rate and smaller values m. |
BibTeX:
@inproceedings{DBLP:conf/isit/FranchL23,
author = {Ermes Franch and Chunlei Li},
title = {Two new algorithms for error support recovery of low rank parity check codes},
booktitle = {IEEE International Symposium on Information Theory, ISIT 2023, Taipei, Taiwan, June 25-30, 2023},
publisher = {IEEE},
year = {2023},
pages = {2368--2373},
url = {https://doi.org/10.1109/ISIT54713.2023.10206683},
doi = {https://doi.org/10.1109/ISIT54713.2023.10206683}
}
|
Pai, C., Liu, Z.L., Li, C. and Chen, C. |
Sparse Complementary Pairs with Additional Aperiodic ZCZ Property [Abstract] [BibTeX] |
2023 |
IEEE International Symposium on Information Theory, ISIT 2023, Taipei, Taiwan, June 25-30, 2023, pp. 672-677 |
inproceedings |
DOI URL |
Abstract: This paper presents a novel class of complex-valued sparse complementary pairs (SCPs), each consisting of a number of zero values and with additional zero-correlation zone (ZCZ) property for the aperiodic autocorrelations and crosscorrelations of the two constituent sequences. Direct constructions of SCPs and their mutually-orthogonal mates based on restricted generalized Boolean functions are proposed. It is shown that such SCPs exist with arbitrary lengths and controllable sparsity levels, making them a disruptive sequence candidate for modern low-complexity, low-latency, and low-storage signal processing applications. |
BibTeX:
@inproceedings{DBLP:conf/isit/PaiLLC23,
author = {Cheng-Yu Pai and Zi Long Liu and Chunlei Li and Chao-Yu Chen},
title = {Sparse Complementary Pairs with Additional Aperiodic ZCZ Property},
booktitle = {IEEE International Symposium on Information Theory, ISIT 2023, Taipei, Taiwan, June 25-30, 2023},
publisher = {IEEE},
year = {2023},
pages = {672--677},
url = {https://doi.org/10.1109/ISIT54713.2023.10206805},
doi = {https://doi.org/10.1109/ISIT54713.2023.10206805}
}
|
Franch, E., Gaborit, P. and Li, C. |
Generalized low rank parity check codes [Abstract] [BibTeX] |
2023 |
IEEE Information Theory Workshop, ITW 2023, Saint-Malo, France, April 23-28, 2023, pp. 248-253 |
inproceedings |
DOI URL |
Abstract: In this work we propose a family of Fq-linear lowrank parity check (LRPC) codes based on a bilinear product over Fqm defined by a generic 3-tensor over Fq. A particular choice of this tensor corresponds to the classical Fqm-linear LRPC codes; and other tensors yield Fq-linear codes, which, with some caveats, can be efficiently decoded with the same idea of decoding LRPC codes. The proposed codes contribute to the diversity of rank metric codes for cryptographic applications, particularly for the cases where attacks utilize Fqm-linearity to reduce decoding complexity. |
BibTeX:
@inproceedings{DBLP:conf/itw/FranchGL23,
author = {Ermes Franch and Philippe Gaborit and Chunlei Li},
title = {Generalized low rank parity check codes},
booktitle = {IEEE Information Theory Workshop, ITW 2023, Saint-Malo, France, April 23-28, 2023},
publisher = {IEEE},
year = {2023},
pages = {248--253},
url = {https://doi.org/10.1109/ITW55543.2023.10160243},
doi = {https://doi.org/10.1109/ITW55543.2023.10160243}
}
|
Li, K., Li, C., Helleseth, T. and Qu, L. |
Further investigations on permutation based constructions of bent functions [Abstract] [BibTeX] |
2023 |
J. Comb. Theory, Ser. A Vol. 199, pp. 105779 |
article |
DOI URL |
Abstract: Constructing bent functions by composing a Boolean function with a permutation was introduced by Hou and Langevin in 1997. The approach appears simple but heavily depends on the construction of desirable permutations. In this paper, we further study this approach by investigating the exponential sums of certain monomials and permutations. We propose several classes of bent functions from quadratic permutations and permutations with (generalized) Niho exponents, and also a class of bent functions from a generalization of the Maiorana-McFarland class. The relations among the proposed bent functions and the known families of bent function are studied. Numerical results show that our constructions include bent functions that are not contained in the completed Maiorana-McFarland class M#, the class PSap or the class H. |
BibTeX:
@article{DBLP:journals/jcta/Li0HQ23,
author = {Kangquan Li and Chunlei Li and Tor Helleseth and Longjiang Qu},
title = {Further investigations on permutation based constructions of bent functions},
journal = {J. Comb. Theory, Ser. A},
year = {2023},
volume = {199},
pages = {105779},
url = {https://doi.org/10.1016/j.jcta.2023.105779},
doi = {https://doi.org/10.1016/j.jcta.2023.105779}
}
|
Li, D., Li, C. and Sarkar, P. |
Asymptotically Optimal Quasi-Complementary Code Sets of Length p1m1p2m2 [Abstract] [BibTeX] |
2022 |
10th International Workshop on Signal Design and Its Applications in Communications, IWSDA 2022, Colchester, UK, August 1-5, 2022, pp. 1-5 |
inproceedings |
DOI URL |
Abstract: In this paper we propose a construction of quasi-complementary code sets (QCCSs) of length p1m1p2m2, where p1,p2 are primes and m1, m2 are positive integers, and show that the proposed QCCSs achieve optimality asymptotically. The construction generalizes a recent work by Sarkar et al. on QCCSs of length pm, which has more flexible alphabet size. |
BibTeX:
@inproceedings{DBLP:conf/iwsda/LiLS22,
author = {Dian Li and Chunlei Li and Palash Sarkar},
title = {Asymptotically Optimal Quasi-Complementary Code Sets of Length
booktitle = {10th International Workshop on Signal Design and Its Applications in Communications, IWSDA 2022, Colchester, UK, August 1-5, 2022},
publisher = {IEEE},
year = {2022},
pages = {1--5},
url = {https://doi.org/10.1109/IWSDA50346.2022.9870581},
doi = {https://doi.org/10.1109/IWSDA50346.2022.9870581}
}
|
Kadir, W.K., Li, C. and Zullo, F. |
Encoding and decoding of several optimal rank metric codes [Abstract] [BibTeX] |
2022 |
Cryptogr. Commun. Vol. 14(6), pp. 1281-1300 |
article |
DOI URL |
Abstract: This paper presents encoding and decoding algorithms for several families of optimal rank metric codes whose codes are in restricted forms of symmetric, alternating and Hermitian matrices. First, we show the evaluation encoding is the right choice for these codes and then we provide easily reversible encoding methods for each family. Later unique decoding algorithms for the codes are described. The decoding algorithms are interpolation-based and can uniquely correct errors for each code with rank up to (d − 1)/2 in polynomial-time, where d is the minimum distance of the code. |
BibTeX:
@article{DBLP:journals/ccds/KadirLZ22,
author = {Wrya K. Kadir and Chunlei Li and Ferdinando Zullo},
title = {Encoding and decoding of several optimal rank metric codes},
journal = {Cryptogr. Commun.},
year = {2022},
volume = {14},
number = {6},
pages = {1281--1300},
url = {https://doi.org/10.1007/s12095-022-00578-3},
doi = {https://doi.org/10.1007/s12095-022-00578-3}
}
|
Man, Y., Xia, Y., Li, C. and Helleseth, T. |
On the differential properties of the power mapping xpm+2 [Abstract] [BibTeX] |
2022 |
Finite Fields Their Appl. Vol. 84, pp. 102100 |
article |
DOI URL |
Abstract: Let m be a positive integer and p a prime. In this paper, we investigate the differential properties of the power mapping xpm+2 over Fpn, where n=2m or n=2m−1. For the case n=2m, by transforming the derivative equation of xpm+2 and studying some related equations, we completely determine the differential spectrum of this power mapping. For the case n=2m−1, the derivative equation can be transformed to a polynomial of higher degree p+3. The problem is more difficult and we only obtain partial results about the differential spectrum of xpm+2. |
BibTeX:
@article{DBLP:journals/ffa/ManXLH22,
author = {Yuying Man and Yongbo Xia and Chunlei Li and Tor Helleseth},
title = {On the differential properties of the power mapping xpm+2},
journal = {Finite Fields Their Appl.},
year = {2022},
volume = {84},
pages = {102100},
url = {https://doi.org/10.1016/j.ffa.2022.102100},
doi = {https://doi.org/10.1016/j.ffa.2022.102100}
}
|
Li, K., Zhou, Y., Li, C. and Qu, L. |
Two New Families of Quadratic APN Functions [Abstract] [BibTeX] |
2022 |
IEEE Trans. Inf. Theory Vol. 68(7), pp. 4761-4769 |
article |
DOI URL |
Abstract: In this paper, we present two new families of APN functions. The first family is in bivariate form (x^3+xy^2+ y^3+xy, x^5+x^4y+y^5+xy+x^2y^2 ) over mathbb F_2^m^2. It is obtained by adding certain terms of the form x_i(a_ix^2^iy^2^i,b_ix^2^iy^2^i to a family of APN functions recently proposed by Gölo&gcaron;lu. The vphantom _∫ _∫ second family has the form L(z)^2^m+1+vz^2^m+1 over mathbb F_2^3m , which generalizes a family of APN functions by Bracken et al. from 2011. By calculating the Γ -rank of the constructed APN functions over mathbb F_2^8 and mathbb F_2^9 , we demonstrate that the two families are CCZ-inequivalent to all known families. In addition, the two new families cover two known sporadic APN instances over mathbb F_2^8 and mathbb F_2^9$ , which were found by Edel and Pott in 2009 and by Beierle and Leander in 2021, respectively. |
BibTeX:
@article{DBLP:journals/tit/LiZLQ22,
author = {Kangquan Li and Yue Zhou and Chunlei Li and Longjiang Qu},
title = {Two New Families of Quadratic APN Functions},
journal = {IEEE Trans. Inf. Theory},
year = {2022},
volume = {68},
number = {7},
pages = {4761--4769},
url = {https://doi.org/10.1109/TIT.2022.3157810},
doi = {https://doi.org/10.1109/TIT.2022.3157810}
}
|
Yan, H., Xia, Y., Li, C., Helleseth, T., Xiong, M. and Luo, J. |
The Differential Spectrum of the Power Mapping xpn-3 [Abstract] [BibTeX] |
2022 |
IEEE Trans. Inf. Theory Vol. 68(8), pp. 5535-5547 |
article |
DOI URL |
Abstract: Let n be a positive integer and p a prime. The power mapping x^p^n-3 over mathbb F-pn has desirable differential properties, and its differential spectra for p=2,,3 have been determined. In this paper, for any odd prime p , by investigating certain quadratic character sums and some equations over mathbb F-p^n , we determine the differential spectrum of x^p^n-3 with a unified approach. The obtained result shows that for any given odd prime p , the differential spectrum can be expressed explicitly in terms of n. Compared with previous results, a special elliptic curve over mathbb F-p plays an important role in our computation for the general case p ge 5. |
BibTeX:
@article{DBLP:journals/tit/YanX0HXL22,
author = {Haode Yan and Yongbo Xia and Chunlei Li and Tor Helleseth and Maosheng Xiong and Jinquan Luo},
title = {The Differential Spectrum of the Power Mapping x(^p\({}^{\mbox{n}}\))(^-3)},
journal = {IEEE Trans. Inf. Theory},
year = {2022},
volume = {68},
number = {8},
pages = {5535--5547},
url = {https://doi.org/10.1109/TIT.2022.3162334},
doi = {https://doi.org/10.1109/TIT.2022.3162334}
}
|
Kadir, W.K., Li, C. and Zullo, F. |
On interpolation-based decoding of a class of maximum rank distance codes [Abstract] [BibTeX] |
2021 |
IEEE International Symposium on Information Theory, ISIT 2021, Melbourne, Australia, July 12-20, 2021, pp. 31-36 |
inproceedings |
DOI URL |
Abstract: In this paper we present an interpolation-based decoding algorithm to decode a family of maximum rank distance codes proposed recently by Trombetti and Zhou. We employ the properties of the Dickson matrix associated with a linearized polynomial with a given rank and the modified Berlekamp-Massey algorithm in decoding. When the rank of the error vector attains the unique decoding radius, the problem is converted to solving a quadratic polynomial, which ensures that the proposed decoding algorithm has polynomial-time complexity. |
BibTeX:
@inproceedings{DBLP:conf/isit/Kadir0Z21,
author = {Wrya K. Kadir and Chunlei Li and Ferdinando Zullo},
title = {On interpolation-based decoding of a class of maximum rank distance codes},
booktitle = {IEEE International Symposium on Information Theory, ISIT 2021, Melbourne, Australia, July 12-20, 2021},
publisher = {IEEE},
year = {2021},
pages = {31--36},
url = {https://doi.org/10.1109/ISIT45174.2021.9517980},
doi = {https://doi.org/10.1109/ISIT45174.2021.9517980}
}
|
Canteaut, A., Kölsch, L., Li, C., Li, C., Li, K., Qu, L. and Wiemer, F. |
Autocorrelations of Vectorial Boolean Functions [Abstract] [BibTeX] |
2021 |
Vol. 12912Progress in Cryptology - LATINCRYPT 2021 - 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6-8, 2021, Proceedings, pp. 233-253 |
inproceedings |
DOI URL |
Abstract: Recently, Bar-On et al. introduced at Eurocrypt’19 a new tool, called the differential-linear connectivity table (DLCT), which allows for taking into account the dependency between the two subciphers and involved in differential-linear attacks. This paper presents a theoretical characterization of the DLCT, which corresponds to an autocorrelation table (ACT) of a vectorial Boolean function. We further provide some new theoretical results on ACTs of vectorial Boolean functions. |
BibTeX:
@inproceedings{DBLP:conf/latincrypt/CanteautK00LQW21,
author = {Anne Canteaut and Lukas Kölsch and Chao Li and Chunlei Li and Kangquan Li and Longjiang Qu and Friedrich Wiemer},
title = {Autocorrelations of Vectorial Boolean Functions},
booktitle = {Progress in Cryptology - LATINCRYPT 2021 - 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6-8, 2021, Proceedings},
publisher = {Springer},
year = {2021},
volume = {12912},
pages = {233--253},
url = {https://doi.org/10.1007/978-3-030-88238-9_12},
doi = {https://doi.org/10.1007/978-3-030-88238-9%5C_%7B1%7D%7B2%7D}
}
|
Yang, G., Li, C. and Marstein, K.E. |
A blockchain-based architecture for securing electronic health record systems [Abstract] [BibTeX] |
2021 |
Concurr. Comput. Pract. Exp. Vol. 33(14) |
article |
DOI URL |
Abstract: This paper presents a blockchain-based architecture for our current electronic health record (EHR) systems. Being built on top of existing databases maintained by health providers, the architecture implements a blockchain solution to ensure the integrity of data records and improve interoperability of the systems through tracking all events that happen to the data in the databases. In this proposed architecture, we also introduce a new incentive mechanism for the creation of new blocks on the blockchain. The architecture is independent of any specific blockchain platforms and open to further extensions; hence, it potentially fits in with other electronic record systems that require protection against data misuse. |
BibTeX:
@article{DBLP:journals/concurrency/YangLM21,
author = {Guang Yang and Chunlei Li and Kjell E. Marstein},
title = {A blockchain-based architecture for securing electronic health record systems},
journal = {Concurr. Comput. Pract. Exp.},
year = {2021},
volume = {33},
number = {14},
url = {https://doi.org/10.1002/cpe.5479},
doi = {https://doi.org/10.1002/cpe.5479}
}
|
Li, K., Li, C., Helleseth, T. and Qu, L. |
Cryptographically strong permutations from the butterfly structure [Abstract] [BibTeX] |
2021 |
Des. Codes Cryptogr. Vol. 89(4), pp. 737-761 |
article |
DOI URL |
Abstract: Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functions against boomerang attacks. Consequently, a cryptographic function is desired to have boomerang uniformity as low as its differential uniformity. Based on generalized butterfly structures recently introduced by Canteaut, Duval and Perrin, this paper presents infinite families of permutations of for a positive odd integer n, which have the best known nonlinearity and boomerang uniformity 4. Both open and closed butterfly structures are considered. The open butterflies, according to experimental results, appear not to produce permutations with boomerang uniformity 4. On the other hand, from the closed butterflies we derive a condition on coefficients such that the functions permutate GF(2^n)^2 and have boomerang uniformity 4. |
BibTeX:
@article{DBLP:journals/dcc/LiLHQ21,
author = {Kangquan Li and Chunlei Li and Tor Helleseth and Longjiang Qu},
title = {Cryptographically strong permutations from the butterfly structure},
journal = {Des. Codes Cryptogr.},
year = {2021},
volume = {89},
number = {4},
pages = {737--761},
url = {https://doi.org/10.1007/s10623-020-00837-5},
doi = {https://doi.org/10.1007/s10623-020-00837-5}
}
|
Helleseth, T., Katz, D.J. and Li, C. |
The Resolution of Niho's Last Conjecture Concerning Sequences, Codes, and Boolean Functions [Abstract] [BibTeX] |
2021 |
IEEE Trans. Inf. Theory Vol. 67(10), pp. 6952-6962 |
article |
DOI URL |
Abstract: A new method is used to resolve a long-standing conjecture of Niho concerning the crosscorrelation spectrum of a pair of maximum length linear recursive sequences of length 2 2m -1 with relative decimation d=2 m+2 -3, where m is even. The result indicates that there are at most five distinct crosscorrelation values. Equivalently, the result indicates that there are at most five distinct values in the Walsh spectrum of the power permutation f(x)=x d over a finite field of order 2 2m and at most five distinct nonzero weights in the cyclic code of length 2 2m -1 with two primitive nonzeros α and α d . The method used to obtain this result proves constraints on the number of roots that certain seventh degree polynomials can have on the unit circle of a finite field. The method also works when m is odd, in which case the associated crosscorrelation and Walsh spectra have at most six distinct values. |
BibTeX:
@article{DBLP:journals/tit/HellesethKL21,
author = {Tor Helleseth and Daniel J. Katz and Chunlei Li},
title = {The Resolution of Niho's Last Conjecture Concerning Sequences, Codes, and Boolean Functions},
journal = {IEEE Trans. Inf. Theory},
year = {2021},
volume = {67},
number = {10},
pages = {6952--6962},
url = {https://doi.org/10.1109/TIT.2021.3098342},
doi = {https://doi.org/10.1109/TIT.2021.3098342}
}
|
Li, K., Li, C., Helleseth, T. and Qu, L. |
Binary Linear Codes With Few Weights From Two-to-One Functions [Abstract] [BibTeX] |
2021 |
IEEE Trans. Inf. Theory Vol. 67(7), pp. 4263-4275 |
article |
DOI URL |
Abstract: In this paper, we apply two-to-one functions over b F 2n in two generic constructions of binary linear codes. We consider two-to-one functions in two forms: (1) generalized quadratic functions; and (2) (x 2t +x) e with gcd(t, n)=gcd(e, 2 n -1)=1. Based on the study of the Walsh transforms of those functions or their variants, we present many classes of linear codes with few nonzero weights, including one weight, three weights, four weights, and five weights. The weight distributions of the proposed codes with one weight and with three weights are determined. In addition, we discuss the minimum distance of the dual of the constructed codes and show that some of them achieve the sphere packing bound. Moreover, examples show that some codes in this paper have best-known parameters. |
BibTeX:
@article{DBLP:journals/tit/LiLHQ21,
author = {Kangquan Li and Chunlei Li and Tor Helleseth and Longjiang Qu},
title = {Binary Linear Codes With Few Weights From Two-to-One Functions},
journal = {IEEE Trans. Inf. Theory},
year = {2021},
volume = {67},
number = {7},
pages = {4263--4275},
url = {https://doi.org/10.1109/TIT.2021.3068743},
doi = {https://doi.org/10.1109/TIT.2021.3068743}
}
|
Li, K., Li, C., Helleseth, T. and Qu, L. |
A Complete Characterization of the APN Property of a Class of Quadrinomials [Abstract] [BibTeX] |
2021 |
IEEE Trans. Inf. Theory Vol. 67(11), pp. 7535-7549 |
article |
DOI URL |
Abstract: In this paper, by the Hasse-Weil bound, we determine the necessary and sufficient condition on coefficients a_1,a_2,a_3∊ mathbb F _2^n with n=2m such that f(x) = x^3⋅ 2^m + a_1x^2^m+1+1 + a_2 x^2^m+2 + a_3x^3 is an APN function over mathbb F_2^n . Our work together with the follow-up work by Chase and Lisoněk indicates that all such APN quadrinomials f(x) are affine equivalent to two instances of Gold functions, which resolves the first half of an open problem by Carlet at the International Workshop on the Arithmetic of Finite Fields, 83-107, 2014. |
BibTeX:
@article{DBLP:journals/tit/LiLHQ21a,
author = {Kangquan Li and Chunlei Li and Tor Helleseth and Longjiang Qu},
title = {A Complete Characterization of the APN Property of a Class of Quadrinomials},
journal = {IEEE Trans. Inf. Theory},
year = {2021},
volume = {67},
number = {11},
pages = {7535--7549},
url = {https://doi.org/10.1109/TIT.2021.3102872},
doi = {https://doi.org/10.1109/TIT.2021.3102872}
}
|
Sun, Z., Zeng, X., Li, C., Zhang, Y. and Yi, L. |
The Expansion Complexity of Ultimately Periodic Sequences Over Finite Fields [Abstract] [BibTeX] |
2021 |
IEEE Trans. Inf. Theory Vol. 67(11), pp. 7550-7560 |
article |
DOI URL |
Abstract: The expansion complexity is a new figure of merit for cryptographic sequences. In this paper, we present an explicit formula of the (irreducible) expansion complexity of ultimately periodic sequences over finite fields. We also provide improved upper and lower bounds on the N th irreducible expansion complexity when they are not explicitly determined. In addition, for some infinite sequences with given nonlinear complexity, a tighter upper bound of their N th expansion complexity is given. |
BibTeX:
@article{DBLP:journals/tit/SunZLZY21,
author = {Zhimin Sun and Xiangyong Zeng and Chunlei Li and Yi Zhang and Lin Yi},
title = {The Expansion Complexity of Ultimately Periodic Sequences Over Finite Fields},
journal = {IEEE Trans. Inf. Theory},
year = {2021},
volume = {67},
number = {11},
pages = {7550--7560},
url = {https://doi.org/10.1109/TIT.2021.3112824},
doi = {https://doi.org/10.1109/TIT.2021.3112824}
}
|
Kadir, W.K. and Li, C. |
On decoding additive generalized twisted Gabidulin codes [Abstract] [BibTeX] |
2020 |
Cryptogr. Commun. Vol. 12(5), pp. 987-1009 |
article |
DOI URL |
Abstract: In this paper, we consider an interpolation-based decoding algorithm for a large family of maximum rank distance codes, known as the additive generalized twisted Gabidulin codes, over the finite field F_q for any prime power q. This paper extends the work of the conference paper Li and Kadir (2019) presented at the International Workshop on Coding and Cryptography 2019, which decoded these codes over finite fields in characteristic two. |
BibTeX:
@article{DBLP:journals/ccds/KadirL20,
author = {Wrya K. Kadir and Chunlei Li},
title = {On decoding additive generalized twisted Gabidulin codes},
journal = {Cryptogr. Commun.},
year = {2020},
volume = {12},
number = {5},
pages = {987--1009},
url = {https://doi.org/10.1007/s12095-020-00449-9},
doi = {https://doi.org/10.1007/s12095-020-00449-9}
}
|
Li, C. and Yang, Y. |
On three conjectures of binary sequences with low odd-periodic autocorrelation [Abstract] [BibTeX] |
2020 |
Cryptogr. Commun. Vol. 12(3), pp. 427-442 |
article |
DOI URL |
Abstract: This paper provides a complete answer to three conjectures of Parker about low odd-periodic autocorrelation of sixteen cyclotomic binary sequences in Parker (2001), and also gives new binary sequences with low odd-periodic autocorrelation. |
BibTeX:
@article{DBLP:journals/ccds/LiY20,
author = {Chunlei Li and Yang Yang},
title = {On three conjectures of binary sequences with low odd-periodic autocorrelation},
journal = {Cryptogr. Commun.},
year = {2020},
volume = {12},
number = {3},
pages = {427--442},
url = {https://doi.org/10.1007/s12095-019-00393-3},
doi = {https://doi.org/10.1007/s12095-019-00393-3}
}
|
Yang, Y. and Li, C. |
New quaternary sequences with optimal odd-periodic autocorrelation magnitude [Abstract] [BibTeX] |
2020 |
Cryptogr. Commun. Vol. 12(3), pp. 363-374 |
article |
DOI URL |
Abstract: A quaternary sequence is said to be optimal if its odd-periodic autocorrelation magnitude equal to 2 for even length, and 1 for odd length. In this paper, we propose three constructions of optimal quaternary sequences: the first construction applies the inverse Gray mapping to four component binary sequences, which could be chosen from GMW sequence pair, twin-prime sequence pair, Legendre sequence pair, and ideal sequences; the second one generates optimal sequences from quaternary sequences with optimal even-periodic autocorrelation magnitude; the third one gives new optimal quaternary sequences by applying the sign alternation transform and Gray mapping to GMW sequence pair and twin-prime sequence pair. In particular, some proposed sequences have new parameters. |
BibTeX:
@article{DBLP:journals/ccds/YangL20,
author = {Yang Yang and Chunlei Li},
title = {New quaternary sequences with optimal odd-periodic autocorrelation magnitude},
journal = {Cryptogr. Commun.},
year = {2020},
volume = {12},
number = {3},
pages = {363--374},
url = {https://doi.org/10.1007/s12095-019-00407-0},
doi = {https://doi.org/10.1007/s12095-019-00407-0}
}
|
Xia, Y., Zhang, X., Li, C. and Helleseth, T. |
The differential spectrum of a ternary power mapping [BibTeX] |
2020 |
Finite Fields Their Appl. Vol. 64, pp. 101660 |
article |
DOI URL |
BibTeX:
@article{DBLP:journals/ffa/XiaZLH20,
author = {Yongbo Xia and Xianglai Zhang and Chunlei Li and Tor Helleseth},
title = {The differential spectrum of a ternary power mapping},
journal = {Finite Fields Their Appl.},
year = {2020},
volume = {64},
pages = {101660},
url = {https://doi.org/10.1016/j.ffa.2020.101660},
doi = {https://doi.org/10.1016/j.ffa.2020.101660}
}
|
Li, C., Rong, C. and Jaatun, M.G. |
A Cost-efficient Protocol for Open Blockchains [Abstract] [BibTeX] |
2019 |
2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019, pp. 1-7 |
inproceedings |
DOI URL |
Abstract: Current proof-of-work blockchains are not sustainable in terms of energy needed to run them. In this paper we propose a new scheme that avoids wasted proof-of-work by a dynamic probabilistic method, where the consensus algorithm can be adjusted according to the parties' required assurance levels. |
BibTeX:
@inproceedings{DBLP:conf/cybersecpods/0001RJ19,
author = {Chunlei Li and Chunming Rong and Martin Gilje Jaatun},
title = {A Cost-efficient Protocol for Open Blockchains},
booktitle = {2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019},
publisher = {IEEE},
year = {2019},
pages = {1--7},
url = {https://doi.org/10.1109/CyberSecPODS.2019.8885043},
doi = {https://doi.org/10.1109/CyberSecPODS.2019.8885043}
}
|
Li, C. |
Interpolation-based Decoding of Nonlinear Maximum Rank Distance Codes [Abstract] [BibTeX] |
2019 |
IEEE International Symposium on Information Theory, ISIT 2019, Paris, France, July 7-12, 2019, pp. 2054-2058 |
inproceedings |
DOI URL |
Abstract: In this paper, we formulate a generic construction of MRD codes that covers almost all the newly found MRD codes. Among those MRD codes, we particularly investigate the encoding and decoding of a family of nonlinear MRD codes recently by Otal and Özbudak. |
BibTeX:
@inproceedings{DBLP:conf/isit/Li19,
author = {Chunlei Li},
title = {Interpolation-based Decoding of Nonlinear Maximum Rank Distance Codes},
booktitle = {IEEE International Symposium on Information Theory, ISIT 2019, Paris, France, July 7-12, 2019},
publisher = {IEEE},
year = {2019},
pages = {2054--2058},
url = {https://doi.org/10.1109/ISIT.2019.8849472},
doi = {https://doi.org/10.1109/ISIT.2019.8849472}
}
|
Budaghyan, L., Li, C. and Parker, M.G. |
Editorial: Special Issue on Mathematical Methods for Cryptography [Abstract] [BibTeX] |
2019 |
Cryptogr. Commun. Vol. 11(3), pp. 363-365 |
article |
DOI URL |
Abstract: Information processing by electronic devices leads to a multitude of security relevant challenges many of which can be solved with the help of cryptography. Modern cryptography is based on and uses mathematical methods some of which have been specifically developed for cryptographic applications while many of them are taken from the classical mathematical canon. The present special issue is dedicated to mathematical methods for cryptography. |
BibTeX:
@article{DBLP:journals/ccds/BudaghyanLP19,
author = {Lilya Budaghyan and Chunlei Li and Matthew Geoffrey Parker},
title = {Editorial: Special Issue on Mathematical Methods for Cryptography},
journal = {Cryptogr. Commun.},
year = {2019},
volume = {11},
number = {3},
pages = {363--365},
url = {https://doi.org/10.1007/s12095-019-00356-8},
doi = {https://doi.org/10.1007/s12095-019-00356-8}
}
|
Edemskiy, V., Li, C., Zeng, X. and Helleseth, T. |
The linear complexity of generalized cyclotomic binary sequences of period pn [Abstract] [BibTeX] |
2019 |
Des. Codes Cryptogr. Vol. 87(5), pp. 1183-1197 |
article |
DOI URL |
Abstract: This paper examines the linear complexity of a family of generalized cyclotomic binary sequences of period recently proposed by Xiao et al. (Des Codes Cryptogr, 2017, https://doi.org/10.1007/s10623-017-0408-7), where a conjecture about the linear complexity in the special case that for a positive integer r was made. We prove the conjecture and also extend the result to more general even integers f. |
BibTeX:
@article{DBLP:journals/dcc/EdemskiyLZH19,
author = {Vladimir Edemskiy and Chunlei Li and Xiangyong Zeng and Tor Helleseth},
title = {The linear complexity of generalized cyclotomic binary sequences of period p(^n)},
journal = {Des. Codes Cryptogr.},
year = {2019},
volume = {87},
number = {5},
pages = {1183--1197},
url = {https://doi.org/10.1007/s10623-018-0513-2},
doi = {https://doi.org/10.1007/s10623-018-0513-2}
}
|
Li, L., Li, C., Li, C. and Zeng, X. |
New classes of complete permutation polynomials [Abstract] [BibTeX] |
2019 |
Finite Fields Their Appl. Vol. 55, pp. 177-201 |
article |
DOI URL |
Abstract: In this paper, we propose several classes of complete permutation polynomials over a finite field based on certain polynomials over its subfields or subsets. In addition, a class of complete permutation trinomials with Niho exponents is studied, and the number of these complete permutation trinomials is also determined. |
BibTeX:
@article{DBLP:journals/ffa/LiLLZ19,
author = {Lisha Li and Chaoyun Li and Chunlei Li and Xiangyong Zeng},
title = {New classes of complete permutation polynomials},
journal = {Finite Fields Their Appl.},
year = {2019},
volume = {55},
pages = {177--201},
url = {https://doi.org/10.1016/j.ffa.2018.10.001},
doi = {https://doi.org/10.1016/j.ffa.2018.10.001}
}
|
Xu, X., Li, C. and Zeng, X. |
Nonsingular Polynomials from Feedback Shift Registers [Abstract] [BibTeX] |
2019 |
Int. J. Found. Comput. Sci. Vol. 30(3), pp. 469-487 |
article |
DOI URL |
Abstract: In this paper, we present nonsingular permutation polynomials from nonsingular feedback shift registers and examine nonlinearity and algebraic degree of nonsingular polynomials of certain forms. The upper bound on the nonlinearity of nonsingular Boolean functions is investigated. We also present n-variable nonsingular Boolean functions with algebraic degree n−1 and highest possible nonlinearity for odd n. . |
BibTeX:
@article{DBLP:journals/ijfcs/XuLZ19,
author = {Xiaofang Xu and Chunlei Li and Xiangyong Zeng},
title = {Nonsingular Polynomials from Feedback Shift Registers},
journal = {Int. J. Found. Comput. Sci.},
year = {2019},
volume = {30},
number = {3},
pages = {469--487},
url = {https://doi.org/10.1142/S0129054119500151},
doi = {https://doi.org/10.1142/S0129054119500151}
}
|
Yang, G. and Li, C. |
A Design of Blockchain-Based Architecture for the Security of Electronic Health Record (EHR) Systems [Abstract] [BibTeX] |
2018 |
2018 IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2018, Nicosia, Cyprus, December 10-13, 2018, pp. 261-265 |
inproceedings |
DOI URL |
Abstract: This paper presents a blockchain-based architecture for electronic health record (EHR) systems. The architecture is built on top of existing databases maintained by health providers, implements a blockchain solution to improve interoperability of the current EHR systems, prevent tampering and malicious misuse of EHRs by means of tracking all events that happened to the data in the databases. This proposed architecture also introduces a new incentive mechanism for the creation of new blocks in the blockchain. The architecture is independent of any specific blockchain platforms and open to further extensions, hence potentially fits in with other electronic record systems that require protection against tampering and misuse. |
BibTeX:
@inproceedings{DBLP:conf/cloudcom/YangL18,
author = {Guang Yang and Chunlei Li},
title = {A Design of Blockchain-Based Architecture for the Security of Electronic Health Record (EHR) Systems},
booktitle = {2018 IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2018, Nicosia, Cyprus, December 10-13, 2018},
publisher = {IEEE Computer Society},
year = {2018},
pages = {261--265},
url = {https://doi.org/10.1109/CloudCom2018.2018.00058},
doi = {https://doi.org/10.1109/CloudCom2018.2018.00058}
}
|
Xiao, Z., Zeng, X., Li, C. and Helleseth, T. |
New generalized cyclotomic binary sequences of period p2 [Abstract] [BibTeX] |
2018 |
Des. Codes Cryptogr. Vol. 86(7), pp. 1483-1497 |
article |
DOI URL |
Abstract: New generalized cyclotomic binary sequences of period p^2 are proposed in this paper, where p is an odd prime. The sequences are almost balanced and their linear complexity is determined. The result shows that the proposed sequences have very large linear complexity if p is a non-Wieferich prime. |
BibTeX:
@article{DBLP:journals/dcc/XiaoZLH18,
author = {Zibi Xiao and Xiangyong Zeng and Chunlei Li and Tor Helleseth},
title = {New generalized cyclotomic binary sequences of period p(^2)},
journal = {Des. Codes Cryptogr.},
year = {2018},
volume = {86},
number = {7},
pages = {1483--1497},
url = {https://doi.org/10.1007/s10623-017-0408-7},
doi = {https://doi.org/10.1007/s10623-017-0408-7}
}
|
Xu, X., Li, C., Zeng, X. and Helleseth, T. |
Constructions of complete permutation polynomials [Abstract] [BibTeX] |
2018 |
Des. Codes Cryptogr. Vol. 86(12), pp. 2869-2892 |
article |
DOI URL |
Abstract: Based on the Feistel and MISTY structures, this paper presents several new constructions of complete permutation polynomials (CPPs) of the finite field F_2^n^2 for a positive integer n and three constructions of CPPs over F_p^n^m for any prime p and positive integer m>1. In addition, we investigate the upper bound on the algebraic degree of these CPPs and show that some of them can have nearly optimal algebraic degree. |
BibTeX:
@article{DBLP:journals/dcc/XuLZH18,
author = {Xiaofang Xu and Chunlei Li and Xiangyong Zeng and Tor Helleseth},
title = {Constructions of complete permutation polynomials},
journal = {Des. Codes Cryptogr.},
year = {2018},
volume = {86},
number = {12},
pages = {2869--2892},
url = {https://doi.org/10.1007/s10623-018-0480-7},
doi = {https://doi.org/10.1007/s10623-018-0480-7}
}
|
Ding, C., Li, C. and Xia, Y. |
Another generalisation of the binary Reed-Muller codes and its applications [Abstract] [BibTeX] |
2018 |
Finite Fields Their Appl. Vol. 53, pp. 144-174 |
article |
DOI URL |
Abstract: The punctured binary Reed–Muller code is cyclic and was generalised into the punctured generalised Reed–Muller code over F_q in the literature. The first objective of this paper is to present another generalisation of the punctured binary Reed–Muller code and the binary Reed–Muller code, and analyse these codes. The second objective of this paper is to consider two applications of the new codes in constructing LCD codes and 2-designs. The major motivation of constructing and studying the new codes and their extended codes is the construction of 2-designs, which is an interesting topic in combinatorics. |
BibTeX:
@article{DBLP:journals/ffa/DingLX18,
author = {Cunsheng Ding and Chunlei Li and Yongbo Xia},
title = {Another generalisation of the binary Reed-Muller codes and its applications},
journal = {Finite Fields Their Appl.},
year = {2018},
volume = {53},
pages = {144--174},
url = {https://doi.org/10.1016/j.ffa.2018.06.006},
doi = {https://doi.org/10.1016/j.ffa.2018.06.006}
}
|
Tu, Z., Zeng, X., Li, C. and Helleseth, T. |
A class of new permutation trinomials [Abstract] [BibTeX] |
2018 |
Finite Fields Their Appl. Vol. 50, pp. 178-195 |
article |
DOI URL |
Abstract: In this paper we characterize the coefficients of a trinomial f consisting of terms with Niho-exponents to be a permutation of F_q^2. We transform the problem into studying some low-degree equations with variable in the unit circle, which are intensively investigated with some parameterization techniques. From the numerical results, the coefficients that lead f(x) to be a permutation appear to be completely characterized in this paper. It is also demonstrated that some permutations proposed in this paper are quasi-multiplicative (QM) inequivalent to the previously known permutation trinomials. |
BibTeX:
@article{DBLP:journals/ffa/TuZLH18,
author = {Ziran Tu and Xiangyong Zeng and Chunlei Li and Tor Helleseth},
title = {A class of new permutation trinomials},
journal = {Finite Fields Their Appl.},
year = {2018},
volume = {50},
pages = {178--195},
url = {https://doi.org/10.1016/j.ffa.2017.11.009},
doi = {https://doi.org/10.1016/j.ffa.2017.11.009}
}
|
Shan, J., Hu, L., Zeng, X. and Li, C. |
A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties [Abstract] [BibTeX] |
2018 |
J. Syst. Sci. Complex. Vol. 31(4), pp. 1042-1064 |
article |
DOI URL |
Abstract: This paper proposes a general method to construct 1-resilient Boolean functions by modifying the Tu-Deng and Tang-Carlet-Tang functions. Cryptographic properties such as algebraic degree, nonlinearity and algebraic immunity are also considered. A sufficient condition of the modified functions with optimal algebraic degree in terms of the Siegenthaler bound is proposed. The authors obtain a lower bound on the nonlinearity of the Tang-Carlet-Tang functions, which is slightly better than the known result. If the authors do not break the “continuity” of the support and zero sets, the functions constructed in this paper have suboptimal algebraic immunity. Finally, four specific classes of 1-resilient Boolean functions constructed from this construction and with the mentioned good cryptographic properties are proposed. Experimental results show that there are many 1-resilient Boolean functions have higher nonlinearities than known 1-resilient functions modified by Tu-Deng and Tang-Carlet-Tang functions. |
BibTeX:
@article{DBLP:journals/jossac/ShanHZL18,
author = {Jinyong Shan and Lei Hu and Xiangyong Zeng and Chunlei Li},
title = {A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties},
journal = {J. Syst. Sci. Complex.},
year = {2018},
volume = {31},
number = {4},
pages = {1042--1064},
url = {https://doi.org/10.1007/s11424-017-6177-6},
doi = {https://doi.org/10.1007/s11424-017-6177-6}
}
|
Xia, Y. and Li, C. |
Three-weight ternary linear codes from a family of power functions [Abstract] [BibTeX] |
2017 |
Finite Fields Their Appl. Vol. 46, pp. 17-37 |
article |
DOI URL |
Abstract: Based on a generic construction, two classes of ternary three-weight linear codes are obtained from a family of power functions, including some APN power functions. The weight distributions of these linear codes are determined by studying the properties of some exponential sums related to the power functions. |
BibTeX:
@article{DBLP:journals/ffa/XiaL17,
author = {Yongbo Xia and Chunlei Li},
title = {Three-weight ternary linear codes from a family of power functions},
journal = {Finite Fields Their Appl.},
year = {2017},
volume = {46},
pages = {17--37},
url = {https://doi.org/10.1016/j.ffa.2017.03.003},
doi = {https://doi.org/10.1016/j.ffa.2017.03.003}
}
|
Alahmadi, A., Alhazmi, H., Ali, S., Helleseth, T., Hijazi, R., Li, C. and Solé, P. |
An analogue of the Z_4-Goethals code in non-primitive length [Abstract] [BibTeX] |
2017 |
J. Syst. Sci. Complex. Vol. 30(4), pp. 950-966 |
article |
DOI URL |
Abstract: This paper constructs a cyclic Z_4-code with a parity-check matrix similar to that of Goethals code but in length 2m + 1, for all m ≥ 4. This code is a subcode of the lifted Zetterberg code for m even. Its minimum Lee weight is shown to be at least 10, in general, and exactly 12 in lengths 33, 65. The authors give an algebraic decoding algorithm which corrects five errors in these lengths for m = 5, 6 and four errors for m > 6. |
BibTeX:
@article{DBLP:journals/jossac/AlahmadiAAHHLS17,
author = {Adel Alahmadi and Hussain Alhazmi and Shakir Ali and Tor Helleseth and Rola Hijazi and Chunlei Li and Patrick Solé},
title = {An analogue of the Z_4-Goethals code in non-primitive length},
journal = {J. Syst. Sci. Complex.},
year = {2017},
volume = {30},
number = {4},
pages = {950--966},
url = {https://doi.org/10.1007/s11424-017-5244-3},
doi = {https://doi.org/10.1007/s11424-017-5244-3}
}
|
Sun, Z., Zeng, X., Li, C. and Helleseth, T. |
Investigations on Periodic Sequences With Maximum Nonlinear Complexity [Abstract] [BibTeX] |
2017 |
IEEE Trans. Inf. Theory Vol. 63(10), pp. 6188-6198 |
article |
DOI URL |
Abstract: The nonlinear complexity of a periodic sequence s is the length of the shortest feedback shift register that can generate s, and its value is upper bounded by the least period of s minus 1. In this paper, a recursive approach that generates all periodic sequences with maximum nonlinear complexity is presented, and the total number of such sequences is determined. The randomness properties of these sequences are also examined. |
BibTeX:
@article{DBLP:journals/tit/SunZLH17,
author = {Zhimin Sun and Xiangyong Zeng and Chunlei Li and Tor Helleseth},
title = {Investigations on Periodic Sequences With Maximum Nonlinear Complexity},
journal = {IEEE Trans. Inf. Theory},
year = {2017},
volume = {63},
number = {10},
pages = {6188--6198},
url = {https://doi.org/10.1109/TIT.2017.2714681},
doi = {https://doi.org/10.1109/TIT.2017.2714681}
}
|
Chen, X., Li, C. and Rong, C. |
Perfect Gaussian integer sequences from cyclic difference sets [Abstract] [BibTeX] |
2016 |
IEEE International Symposium on Information Theory, ISIT 2016, Barcelona, Spain, July 10-15, 2016, pp. 115-119 |
inproceedings |
DOI URL |
Abstract: A Gaussian integer is a complex number whose real and imaginary parts are both integers. This paper proposed a unified construction of perfect Gaussian integer sequences based on cyclic difference sets. It turns out that this construction produces an abundance of perfect Gaussian integer sequences. The proposed construction includes all the sequences recently given by Lee et. al as special cases, and many new families of Gaussian integer sequences. To illustrate, two classes of perfect Gaussian integer sequences defined from Kasami-Welch functions and Helleseth-Gong functions are given. |
BibTeX:
@inproceedings{DBLP:conf/isit/ChenLR16,
author = {Xinjiao Chen and Chunlei Li and Chunming Rong},
title = {Perfect Gaussian integer sequences from cyclic difference sets},
booktitle = {IEEE International Symposium on Information Theory, ISIT 2016, Barcelona, Spain, July 10-15, 2016},
publisher = {IEEE},
year = {2016},
pages = {115--119},
url = {https://doi.org/10.1109/ISIT.2016.7541272},
doi = {https://doi.org/10.1109/ISIT.2016.7541272}
}
|
Li, C. and Helleseth, T. |
Quasi-perfect linear codes from planar and APN functions [Abstract] [BibTeX] |
2016 |
Cryptogr. Commun. Vol. 8(2), pp. 215-227 |
article |
DOI URL |
Abstract: In this paper we studied the covering radius of a class of linear codes defined from planar and APN functions, and presented a number of quasi-perfect linear codes. From the calculation and numerical results, it appears that the proposed p-ary linear codes are quasi-perfect for all APN functions when p = 2 and planar functions when p is an odd prime. |
BibTeX:
@article{DBLP:journals/ccds/LiH16,
author = {Chunlei Li and Tor Helleseth},
title = {Quasi-perfect linear codes from planar and APN functions},
journal = {Cryptogr. Commun.},
year = {2016},
volume = {8},
number = {2},
pages = {215--227},
url = {https://doi.org/10.1007/s12095-015-0132-y},
doi = {https://doi.org/10.1007/s12095-015-0132-y}
}
|
Ding, C., Li, C., Li, N. and Zhou, Z. |
Three-weight cyclic codes and their weight distributions [Abstract] [BibTeX] |
2016 |
Discret. Math. Vol. 339(2), pp. 415-427 |
article |
DOI URL |
Abstract: In this paper we studied the covering radius of a class of linear codes defined from planar and APN functions, and presented a number of quasi-perfect linear codes. From the calculation and numerical results, it appears that the proposed p-ary linear codes are quasi-perfect for all APN functions when p = 2 and planar functions when p is an odd prime. |
BibTeX:
@article{DBLP:journals/dm/DingLLZ16,
author = {Cunsheng Ding and Chunlei Li and Nian Li and Zhengchun Zhou},
title = {Three-weight cyclic codes and their weight distributions},
journal = {Discret. Math.},
year = {2016},
volume = {339},
number = {2},
pages = {415--427},
url = {https://doi.org/10.1016/j.disc.2015.09.001},
doi = {https://doi.org/10.1016/j.disc.2015.09.001}
}
|
Li, C., Zeng, X., Li, C., Helleseth, T. and Li, M. |
Construction of de Bruijn Sequences From LFSRs With Reducible Characteristic Polynomials [Abstract] [BibTeX] |
2016 |
IEEE Trans. Inf. Theory Vol. 62(1), pp. 610-624 |
article |
DOI URL |
Abstract: In this paper, a family of new de Bruijn sequences is proposed through the construction of maximum-length nonlinear feedback shift registers (NFSRs). We determine the cycle structure and adjacency graphs of linear feedback shift registers (LFSRs) with characteristic polynomial that is a product of primitive polynomials. |
BibTeX:
@article{DBLP:journals/tit/LiZLHL16,
author = {Chaoyun Li and Xiangyong Zeng and Chunlei Li and Tor Helleseth and Ming Li},
title = {Construction of de Bruijn Sequences From LFSRs With Reducible Characteristic Polynomials},
journal = {IEEE Trans. Inf. Theory},
year = {2016},
volume = {62},
number = {1},
pages = {610--624},
url = {https://doi.org/10.1109/TIT.2015.2496946},
doi = {https://doi.org/10.1109/TIT.2015.2496946}
}
|
Xia, Y., Helleseth, T. and Li, C. |
Some new classes of cyclic codes with three or six weights [Abstract] [BibTeX] |
2015 |
Adv. Math. Commun. Vol. 9(1), pp. 23-36 |
article |
DOI URL |
Abstract: In this paper, a class of three-weight cyclic codes over prime fields F_p of odd order whose duals have two zeros, and a class of six-weight cyclic codes whose duals have three zeros are presented. The weight distributions of these cyclic codes are derived. |
BibTeX:
@article{DBLP:journals/amco/XiaHL15,
author = {Yongbo Xia and Tor Helleseth and Chunlei Li},
title = {Some new classes of cyclic codes with three or six weights},
journal = {Adv. Math. Commun.},
year = {2015},
volume = {9},
number = {1},
pages = {23--36},
url = {https://doi.org/10.3934/amc.2015.9.23},
doi = {https://doi.org/10.3934/amc.2015.9.23}
}
|
Li, J., Carlet, C., Zeng, X., Li, C., Hu, L. and Shan, J. |
Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks [Abstract] [BibTeX] |
2015 |
Des. Codes Cryptogr. Vol. 76(2), pp. 279-305 |
article |
DOI URL |
Abstract: In this paper, two constructions of Boolean functions with optimal algebraic immunity are proposed. They generalize previous ones respectively given by Rizomiliotis (IEEE Trans Inf Theory 56:4014–4024, 2010) and Zeng et al. (IEEE Trans Inf Theory 57:6310–6320, 2011) and some new functions with desired properties are obtained. The functions constructed in this paper can be balanced and have optimal algebraic degree. Further, a new lower bound on the nonlinearity of the proposed functions is established, and as a special case, it gives a new lower bound on the nonlinearity of the Carlet-Feng functions, which is slightly better than the best previously known ones. For n<20, the numerical results reveal that among the constructed functions in this paper, there always exist some functions with nonlinearity higher than or equal to that of the Carlet-Feng functions. These functions are also checked to have good behavior against fast algebraic attacks at least for small numbers of input variables. |
BibTeX:
@article{DBLP:journals/dcc/LiCZLHS15,
author = {Jiao Li and Claude Carlet and Xiangyong Zeng and Chunlei Li and Lei Hu and Jinyong Shan},
title = {Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks},
journal = {Des. Codes Cryptogr.},
year = {2015},
volume = {76},
number = {2},
pages = {279--305},
url = {https://doi.org/10.1007/s10623-014-9949-1},
doi = {https://doi.org/10.1007/s10623-014-9949-1}
}
|
Tu, Z., Zeng, X., Li, C. and Helleseth, T. |
Permutation polynomials of the form (x(^p\({}^{\mbox{m}}\))-x+(δ))(^s)+L(x) over the finite field (_F)(_p)(_2)(_m) of odd characteristic [Abstract] [BibTeX] |
2015 |
Finite Fields Their Appl. Vol. 34, pp. 20-35 |
article |
DOI URL |
Abstract: In this paper, we propose several classes of permutation polynomials with a speical form. The main method used in this paper is to determine the number of solutions of some equations over finite fields of odd characteristic. |
BibTeX:
@article{DBLP:journals/ffa/TuZLH15,
author = {Ziran Tu and Xiangyong Zeng and Chunlei Li and Tor Helleseth},
title = {Permutation polynomials of the form (x(^p\({}^{\mbox{m}}\))-x+(δ))(^s)+L(x) over the finite field (_F)(_p)(_2)(_m) of odd characteristic},
journal = {Finite Fields Their Appl.},
year = {2015},
volume = {34},
pages = {20--35},
url = {https://doi.org/10.1016/j.ffa.2015.01.002},
doi = {https://doi.org/10.1016/j.ffa.2015.01.002}
}
|
Li, N., Li, C., Helleseth, T., Ding, C. and Tang, X. |
Optimal ternary cyclic codes with minimum distance four and five [Abstract] [BibTeX] |
2014 |
Finite Fields Their Appl. Vol. 30, pp. 100-120 |
article |
DOI URL |
Abstract: Cyclic codes are an important subclass of linear codes and have wide applications in data storage systems, communication systems and consumer electronics. In this paper, two families of optimal ternary cyclic codes are presented. |
BibTeX:
@article{DBLP:journals/ffa/LiLHDT14,
author = {Nian Li and Chunlei Li and Tor Helleseth and Cunsheng Ding and Xiaohu Tang},
title = {Optimal ternary cyclic codes with minimum distance four and five},
journal = {Finite Fields Their Appl.},
year = {2014},
volume = {30},
pages = {100--120},
url = {https://doi.org/10.1016/j.ffa.2014.06.001},
doi = {https://doi.org/10.1016/j.ffa.2014.06.001}
}
|
Xia, Y., Chen, S., Helleseth, T. and Li, C. |
Cross-Correlation between a p-ary m-Sequence and Its All Decimated Sequences for d=((pm+1)(pm+p-1))/(p+1) [BibTeX] |
2014 |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Vol. 97-A(4), pp. 964-969 |
article |
DOI URL |
BibTeX:
@article{DBLP:journals/ieicet/XiaCHL14,
author = {Yongbo Xia and Shaoping Chen and Tor Helleseth and Chunlei Li},
title = {Cross-Correlation between a p-ary m-Sequence and Its All Decimated Sequences for d=((p(^m)+1)(p(^m)+p-1))/(p+1)},
journal = {IEICE Trans. Fundam. Electron. Commun. Comput. Sci.},
year = {2014},
volume = {97-A},
number = {4},
pages = {964--969},
url = {https://doi.org/10.1587/transfun.E97.A.964},
doi = {https://doi.org/10.1587/transfun.E97.A.964}
}
|
Li, C., Li, N., Helleseth, T. and Ding, C. |
The Weight Distributions of Several Classes of Cyclic Codes From APN Monomials [Abstract] [BibTeX] |
2014 |
IEEE Trans. Inf. Theory Vol. 60(8), pp. 4710-4721 |
article |
DOI URL |
Abstract: This paper investigates two class of cyclic codes which have zeros , , and have zeros , alpha^e and , respectively. The proposed cyclic coodes cover several code families in the literature. Moreover, the weight spectrum of the proposed code families are completely determined. |
BibTeX:
@article{DBLP:journals/tit/LiLHD14,
author = {Chunlei Li and Nian Li and Tor Helleseth and Cunsheng Ding},
title = {The Weight Distributions of Several Classes of Cyclic Codes From APN Monomials},
journal = {IEEE Trans. Inf. Theory},
year = {2014},
volume = {60},
number = {8},
pages = {4710--4721},
url = {https://doi.org/10.1109/TIT.2014.2329694},
doi = {https://doi.org/10.1109/TIT.2014.2329694}
}
|
Li, C., Zeng, X., Helleseth, T., Li, C. and Hu, L. |
The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs [Abstract] [BibTeX] |
2014 |
IEEE Trans. Inf. Theory Vol. 60(5), pp. 3052-3061 |
article |
DOI URL |
Abstract: In this paper, the cycle structure and adjacency graphs of a class of linear feedback shift registers (LFSRs) are determined. By recursively applying the D-morphism to the maximum-length LFSRs and representing the cycles by generating functions, a new family of maximum-length nonlinear feedback shift registers (NFSRs) are proposed based on the properties of these LFSRs. The number of NFSRs in the proposed family is also considered. |
BibTeX:
@article{DBLP:journals/tit/LiZHLH14,
author = {Chaoyun Li and Xiangyong Zeng and Tor Helleseth and Chunlei Li and Lei Hu},
title = {The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs},
journal = {IEEE Trans. Inf. Theory},
year = {2014},
volume = {60},
number = {5},
pages = {3052--3061},
url = {https://doi.org/10.1109/TIT.2014.2310748},
doi = {https://doi.org/10.1109/TIT.2014.2310748}
}
|
Li, C., Zeng, X., Li, C. and Helleseth, T. |
A Class of de Bruijn Sequences [Abstract] [BibTeX] |
2014 |
IEEE Trans. Inf. Theory Vol. 60(12), pp. 7955-7969 |
article |
DOI URL |
Abstract: In this paper, a class of linear feedback shift registers (LFSRs) with characteristic polynomial (1 + x 3 )p(x) is discussed, where p(x) is a primitive polynomial of degree n > 2. The cycle structure and adjacency graphs of the LFSRs are determined. A new class of de Bruijn sequences is constructed from these LFSRs, and the number of de Bruijn sequences in the class is also considered. |
BibTeX:
@article{DBLP:journals/tit/LiZLH14,
author = {Chaoyun Li and Xiangyong Zeng and Chunlei Li and Tor Helleseth},
title = {A Class of de Bruijn Sequences},
journal = {IEEE Trans. Inf. Theory},
year = {2014},
volume = {60},
number = {12},
pages = {7955--7969},
url = {https://doi.org/10.1109/TIT.2014.2361522},
doi = {https://doi.org/10.1109/TIT.2014.2361522}
}
|
Xia, Y., Li, C., Zeng, X. and Helleseth, T. |
Some Results on Cross-Correlation Distribution Between a p-ary Sequence and Its Decimated Sequences [Abstract] [BibTeX] |
2014 |
IEEE Trans. Inf. Theory Vol. 60(11), pp. 7368-7381 |
article |
DOI URL |
Abstract: In this paper, the cross-correlation between a p-ary m-sequence and its d-decimated sequences is investigated, and the cross correlation distribution is completely determined. The relationship between the decimations d considered in this paper and some known ones is also studied. This paper generalizes some previous results, and also gives new decimations, which lead to low cross correlation. |
BibTeX:
@article{DBLP:journals/tit/XiaLZH14,
author = {Yongbo Xia and Chunlei Li and Xiangyong Zeng and Tor Helleseth},
title = {Some Results on Cross-Correlation Distribution Between a p-ary Sequence and Its Decimated Sequences},
journal = {IEEE Trans. Inf. Theory},
year = {2014},
volume = {60},
number = {11},
pages = {7368--7381},
url = {https://doi.org/10.1109/TIT.2014.2350775},
doi = {https://doi.org/10.1109/TIT.2014.2350775}
}
|
Tu, Z., Zeng, X., Hu, L. and Li, C. |
A Class of Binomial Permutation Polynomials [Abstract] [BibTeX] |
2013 |
CoRR Vol. abs/1310.0337 |
article |
URL |
Abstract: In this paper a criterion for a class of binomials to be permutation polynomials is proposed. As a consequence, many classes of binomial permutation polynomials and monomial complete permutation polynomials are obtained. The exponents in these monomials are of Niho type. |
BibTeX:
@article{DBLP:journals/corr/TuZHL13,
author = {Ziran Tu and Xiangyong Zeng and Lei Hu and Chunlei Li},
title = {A Class of Binomial Permutation Polynomials},
journal = {CoRR},
year = {2013},
volume = {abs/1310.0337},
url = {http://arxiv.org/abs/1310.0337}
}
|
Li, J., Zeng, X., Tang, X. and Li, C. |
A family of quadriphase sequences of period 4(2n-1) with low correlation and large linear span [Abstract] [BibTeX] |
2013 |
Des. Codes Cryptogr. Vol. 67(1), pp. 19-35 |
article |
DOI URL |
Abstract: In this paper, a new family of quadriphase sequences with period 4(2n − 1) is proposed for n = me, where m is an odd integer. The correlation values of the family, their distribution, and the linear spans of the proposed sequences are completely determined under two situations. |
BibTeX:
@article{DBLP:journals/dcc/LiZTL13,
author = {Jie Li and Xiangyong Zeng and Xiaohu Tang and Chunlei Li},
title = {A family of quadriphase sequences of period 4(2 n - 1) with low correlation and large linear span},
journal = {Des. Codes Cryptogr.},
year = {2013},
volume = {67},
number = {1},
pages = {19--35},
url = {https://doi.org/10.1007/s10623-011-9583-0},
doi = {https://doi.org/10.1007/s10623-011-9583-0}
}
|
Li, C. and Helleseth, T. |
New nonbinary sequence families with low correlation and large linear span [Abstract] [BibTeX] |
2012 |
Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012, pp. 1411-1415 |
inproceedings |
DOI URL |
Abstract: In this paper, for an odd prime p and positive integers n, m and e, we present two families of p-ary sequences from decimated Helleseth-Gong sequences and m-sequences and examine their correlation properties. The proposed families of sequences possess low correlation and large linear complexity properties. |
BibTeX:
@inproceedings{DBLP:conf/isit/LiH12,
author = {Chunlei Li and Tor Helleseth},
title = {New nonbinary sequence families with low correlation and large linear span},
booktitle = {Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012},
publisher = {IEEE},
year = {2012},
pages = {1411--1415},
url = {https://doi.org/10.1109/ISIT.2012.6283494},
doi = {https://doi.org/10.1109/ISIT.2012.6283494}
}
|
Gong, G., Helleseth, T., Hu, H. and Li, C. |
New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences [Abstract] [BibTeX] |
2012 |
Vol. 7280Sequences and Their Applications - SETA 2012 - 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings, pp. 327-337 |
inproceedings |
DOI URL |
Abstract: Recently, starting from Helleseth-Gong sequences, Gong, Helleseth, and Hu found many decimation numbers which yield three-valued Walsh transforms by computer search. They proved two cases. In this paper, we prove two more cases with new observations. |
BibTeX:
@inproceedings{DBLP:conf/seta/GongHHL12,
author = {Guang Gong and Tor Helleseth and Honggang Hu and Chunlei Li},
title = {New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences},
booktitle = {Sequences and Their Applications - SETA 2012 - 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings},
publisher = {Springer},
year = {2012},
volume = {7280},
pages = {327--337},
url = {https://doi.org/10.1007/978-3-642-30615-0_30},
doi = {https://doi.org/10.1007/978-3-642-30615-0%5C_%7B3%7D%7B0%7D}
}
|
Li, C., Li, N. and Parker, M.G. |
Complementary Sequence Pairs of Types II and III [BibTeX] |
2012 |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Vol. 95-A(11), pp. 1819-1826 |
article |
DOI URL |
BibTeX:
@article{DBLP:journals/ieicet/LiLP12,
author = {Chunlei Li and Nian Li and Matthew Geoffrey Parker},
title = {Complementary Sequence Pairs of Types II and III},
journal = {IEICE Trans. Fundam. Electron. Commun. Comput. Sci.},
year = {2012},
volume = {95-A},
number = {11},
pages = {1819--1826},
url = {https://doi.org/10.1587/transfun.E95.A.1819},
doi = {https://doi.org/10.1587/transfun.E95.A.1819}
}
|
Jia, W., Zeng, X., Helleseth, T. and Li, C. |
A Class of Binomial Bent Functions Over the Finite Fields of Odd Characteristic [Abstract] [BibTeX] |
2012 |
IEEE Trans. Inf. Theory Vol. 58(9), pp. 6054-6063 |
article |
DOI URL |
Abstract: This paper studies a class of binomial functions over the finite fields of odd characteristic and characterizes their bentness in terms of the Kloosterman sums. Numerical results show that the proposed class contains bent functions that are affinely inequivalent to all known monomial and binomial ones. |
BibTeX:
@article{DBLP:journals/tit/JiaZHL12,
author = {Wenjie Jia and Xiangyong Zeng and Tor Helleseth and Chunlei Li},
title = {A Class of Binomial Bent Functions Over the Finite Fields of Odd Characteristic},
journal = {IEEE Trans. Inf. Theory},
year = {2012},
volume = {58},
number = {9},
pages = {6054--6063},
url = {https://doi.org/10.1109/TIT.2012.2199736},
doi = {https://doi.org/10.1109/TIT.2012.2199736}
}
|
Zhang, H., Li, C. and Tang, M. |
Capability of evolutionary cryptosystems against differential cryptanalysis [BibTeX] |
2011 |
Sci. China Inf. Sci. Vol. 54(10), pp. 1991-2000 |
article |
DOI URL |
BibTeX:
@article{DBLP:journals/chinaf/ZhangLT11,
author = {Huanguo Zhang and Chunlei Li and Ming Tang},
title = {Capability of evolutionary cryptosystems against differential cryptanalysis},
journal = {Sci. China Inf. Sci.},
year = {2011},
volume = {54},
number = {10},
pages = {1991--2000},
url = {https://doi.org/10.1007/s11432-011-4430-5},
doi = {https://doi.org/10.1007/s11432-011-4430-5}
}
|
Zhang, H., Li, C. and Tang, M. |
Evolutionary cryptography against multidimensional linear cryptanalysis [BibTeX] |
2011 |
Sci. China Inf. Sci. Vol. 54(12), pp. 2565-2577 |
article |
DOI URL |
BibTeX:
@article{DBLP:journals/chinaf/ZhangLT11a,
author = {Huanguo Zhang and Chunlei Li and Ming Tang},
title = {Evolutionary cryptography against multidimensional linear cryptanalysis},
journal = {Sci. China Inf. Sci.},
year = {2011},
volume = {54},
number = {12},
pages = {2565--2577},
url = {https://doi.org/10.1007/s11432-011-4494-2},
doi = {https://doi.org/10.1007/s11432-011-4494-2}
}
|
Wang, H., Zhang, H., Wu, Q., Zhang, Y., Li, C. and Zhang, X. |
Design theory and method of multivariate hash function [BibTeX] |
2010 |
Sci. China Inf. Sci. Vol. 53(10), pp. 1977-1987 |
article |
DOI URL |
BibTeX:
@article{DBLP:journals/chinaf/WangZWZLZ10,
author = {Houzhen Wang and Huanguo Zhang and Qianhong Wu and Yu Zhang and Chunlei Li and Xinyu Zhang},
title = {Design theory and method of multivariate hash function},
journal = {Sci. China Inf. Sci.},
year = {2010},
volume = {53},
number = {10},
pages = {1977--1987},
url = {https://doi.org/10.1007/s11432-010-4062-1},
doi = {https://doi.org/10.1007/s11432-010-4062-1}
}
|
Carlet, C., Zeng, X., Li, C. and Hu, L. |
Further properties of several classes of Boolean functions with optimum algebraic immunity [Abstract] [BibTeX] |
2009 |
Des. Codes Cryptogr. Vol. 52(3), pp. 303-338 |
article |
DOI URL |
Abstract: Based on a method proposed by the first author, several classes of balanced Boolean functions with optimum algebraic immunity are constructed, and they have nonlinearities significantly larger than the previously best known nonlinearity of functions with optimal algebraic immunity. By choosing suitable parameters, the constructed n-variable functions have high nonlinearity. The algebraic degrees of the constructed functions are also discussed. |
BibTeX:
@article{DBLP:journals/dcc/CarletZLH09,
author = {Claude Carlet and Xiangyong Zeng and Chunlei Li and Lei Hu},
title = {Further properties of several classes of Boolean functions with optimum algebraic immunity},
journal = {Des. Codes Cryptogr.},
year = {2009},
volume = {52},
number = {3},
pages = {303--338},
url = {https://doi.org/10.1007/s10623-009-9284-0},
doi = {https://doi.org/10.1007/s10623-009-9284-0}
}
|
|