UP - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1 2 3 4 5
hits: 312
1.
  • Optimal Ternary Cyclic Code... Optimal Ternary Cyclic Codes From Monomials
    Cunsheng Ding; Helleseth, Tor IEEE transactions on information theory, 09/2013, Volume: 59, Issue: 9
    Journal Article
    Peer reviewed
    Open access

    Cyclic codes are a subclass of linear codes and have applications in consumer electronics, data storage systems, and communication systems as they have efficient encoding and decoding algorithms. ...
Full text

PDF
2.
  • New permutation trinomials ... New permutation trinomials from Niho exponents over finite fields with even characteristic
    Li, Nian; Helleseth, Tor Cryptography and communications, 2019/1, Volume: 11, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    In this paper, a class of permutation trinomials of Niho type over finite fields with even characteristic is further investigated. New permutation trinomials from Niho exponents are obtained from ...
Full text

PDF
3.
  • New Results on the −1 Conje... New Results on the −1 Conjecture on Cross-Correlation of m-Sequences Based on Complete Permutation Polynomials
    Wu, Gaofei; Feng, Keqin; Li, Nian ... IEEE transactions on information theory, 2023-June, 2023-6-00, Volume: 69, Issue: 6
    Journal Article
    Peer reviewed

    The cross-correlation between two maximum length sequences (<inline-formula> <tex-math notation="LaTeX">m </tex-math></inline-formula>-sequences) of the same period has been studied since the end of ...
Full text
4.
  • Several classes of permutat... Several classes of permutation trinomials from Niho exponents
    Li, Nian; Helleseth, Tor Cryptography and communications, 11/2017, Volume: 9, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    Motivated by recent results on the constructions of permutation polynomials with few terms over the finite field 𝔽 2 n , where n is a positive even integer, we focus on the construction of ...
Full text

PDF
5.
  • Cryptographically strong pe... Cryptographically strong permutations from the butterfly structure
    Li, Kangquan; Li, Chunlei; Helleseth, Tor ... Designs, codes, and cryptography, 04/2021, Volume: 89, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functions against boomerang attacks. Consequently, a cryptographic function is desired to have boomerang ...
Full text

PDF
6.
  • Quadratic residue codes, ra... Quadratic residue codes, rank three groups and PBIBDs
    Shi, Minjia; Wang, Shukai; Helleseth, Tor ... Designs, codes, and cryptography, 11/2022, Volume: 90, Issue: 11
    Journal Article
    Peer reviewed
    Open access

    The automorphism group of the Zetterberg code Z of length 17 (also a quadratic residue code) is a rank three group whose orbits on the coordinate pairs determine two strongly regular graphs ...
Full text

PDF
7.
  • On the Correlation Distribu... On the Correlation Distribution for a Niho Decimation
    Yongbo Xia; Nian Li; Xiangyong Zeng ... IEEE transactions on information theory, 11/2017, Volume: 63, Issue: 11
    Journal Article
    Peer reviewed

    Let p be a prime, n = 2m and d = 3p m - 2 with m ≥ 2, and gcd(d, p n - 1) = 1. In this paper, the correlation distribution between a p-ary m-sequence of period p n - 1 and its d-decimation sequence ...
Full text
8.
  • An Open Problem on the Dist... An Open Problem on the Distribution of a Niho-Type Cross-Correlation Function
    Yongbo Xia; Nian Li; Xiangyong Zeng ... IEEE transactions on information theory, 2016-Dec., 2016-12-00, 20161201, Volume: 62, Issue: 12
    Journal Article
    Peer reviewed

    In this paper, let n = 2k and d = 3 · 2 k - 2 with k ≥ 3 and gcd(d, 2 n - 1) = 1. Based on some analysis of certain equations over finite fields and the number of codewords with Hamming weight five ...
Full text
9.
  • Strongly regular graphs fro... Strongly regular graphs from reducible cyclic codes
    Shi, Minjia; Helleseth, Tor; Solé, Patrick Journal of algebraic combinatorics, 02/2022, Volume: 55, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Let p be a prime number. Reducible cyclic codes of rank 2 over Z p m are shown to have exactly two Hamming weights in some cases. Their weight distribution is computed explicitly. When these codes ...
Full text

PDF
10.
  • New Constructions of Quadra... New Constructions of Quadratic Bent Functions in Polynomial Form
    Li, Nian; Tang, Xiaohu; Helleseth, Tor IEEE transactions on information theory, 09/2014, Volume: 60, Issue: 9
    Journal Article
    Peer reviewed
    Open access

    New quadratic bent functions in polynomial form are constructed in this paper. The constructions give new Boolean bent, generalized Boolean bent and p-ary bent functions. Based on Z 4 -valued ...
Full text

PDF
1 2 3 4 5
hits: 312

Load filters