Keqin Feng
Tsinghua University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Keqin Feng.
international conference on the theory and application of cryptology and information security | 2008
Claude Carlet; Keqin Feng
After the improvement by Courtois and Meier of the algebraic attacks on stream ciphers and the introduction of the related notion of algebraic immunity, several constructions of infinite classes of Boolean functions with optimum algebraic immunity have been proposed. All of them gave functions whose algebraic degrees are high enough for resisting the Berlekamp-Massey attack and the recent Ronjom-Helleseth attack, but whose nonlinearities either achieve the worst possible value (given by Lobanovs bound) or are slightly superior to it. Hence, these functions do not allow resistance to fast correlation attacks. Moreover, they do not behave well with respect to fast algebraic attacks. In this paper, we study an infinite class of functions which achieve an optimum algebraic immunity. We prove that they have an optimum algebraic degree and a much better nonlinearity than all the previously obtained infinite classes of functions. We check that, at least for small values of the number of variables, the functions of this class have in fact a very good nonlinearity and also a good behavior against fast algebraic attacks.
IEEE Transactions on Information Theory | 2008
Jinquan Luo; Keqin Feng
Let q=p<sup>m</sup> where p is an odd prime, mges2, and 1lesklesm-1. Let Tr be the trace mapping from F<sub>q</sub> to F<sub>p</sub> and zeta<sub>p</sub>=e<sup>2pii/p</sup> be a primitive pth root of unity. In this paper, we determine the value distribution of the following exponential sums: Sigma<sub>xisinF</sub> <sub>q</sub>chi(alphax<sup>p</sup> <sup>k</sup> <sup>+1</sup>+betax<sup>2</sup>) (alpha, betaisinF<sub>q</sub>) where chi(x)=zeta<sub>p</sub> <sup>Tr(x)</sup> is the canonical additive character of F<sub>q</sub>. As applications, we have the following. 1) We determine the weight distribution of the cyclic codes C<sub>1</sub> and C<sub>2</sub> over F<sub>p</sub>t with parity-check polynomial h<sub>2</sub>(x)h<sub>3</sub>(x) and h<sub>1</sub>(x)h<sub>2</sub>(x)h<sub>3</sub>(x), respectively, where t is a divisor of d=gcd(m, k), and h<sub>1</sub>(x), h<sub>2</sub>(x) , and h<sub>3</sub>(x) are the minimal polynomials of pi<sup>-1</sup>, pi<sup>-2</sup>, and pi<sup>-(p</sup> <sup>k</sup> <sup>+1)</sup> over F<sub>p</sub>t, respectively, for a primitive element pi of F<sub>q</sub>. 2) We determine the correlation distribution between two m-sequences of period q-1. Moreover, we find a new class of p-ary bent functions. This paper extends the results in Feng and Luo (2008).
IEEE Transactions on Information Theory | 2007
Keqin Feng; Jinquan Luo
In this paper we present a unified way to determine the values and their multiplicities of the exponential sums Sigma<sub>xisinF(q)</sub>zeta<sub>p</sub> <sup>Tr(af(x)+bx)</sup>(a,bisinF<sub>q</sub>,q=p<sup>m</sup>,pges3) for all perfect nonlinear functions f which is a Dembowski-Ostrom polynomial or p = 3,f=<sup>x(3(k)+1)/2</sup> where k is odd and (k,m)=1. As applications, we determine (1) the correlation distribution of the m-sequence {a<sub>lambda</sub>=Tr(gamma<sup>lambda</sup>)}(lambda=0,1,...) and the sequence {b<sub>lambda</sub>=Tr(f(gamma<sup>lambda</sup>))}(lambda=0,1,...) over F<sub>p</sub> where gamma is a primitive element of F<sub>q</sub> and (2) the weight distributions of the linear codes over F<sub>p</sub> defined by f.
IEEE Transactions on Information Theory | 2009
Longjiang Qu; Keqin Feng; Feng Liu; Lei Wang
Symmetric Boolean functions with even variables 2k and maximum algebraic immunity AI(f) = k have been constructed in Braekens thesis (2006). In this paper, we show more constructions of such Boolean functions including the generalization of a result and prove a conjecture raised in Braekens thesis (2006).
IEEE Transactions on Information Theory | 2006
Keqin Feng; San Ling; Chaoping Xing
We generalize a characterization of p-ary (p is a prime) quantum codes given by Feng and Xing to q-ary (q is a prime power) quantum codes. This characterization makes it possible to convert an asymptotic bound of Stichtenoth and Xing for nonlinear algebraic geometry codes to a quantum asymptotic bound. Besides, we also investigate the asymptotic behavior of quantum codes
IEEE Transactions on Information Theory | 2004
Keqin Feng; Zhi Ma
A finite Gilbert-Varshamov (GV) bound for pure stabilizer (binary and nonbinary) quantum error correcting codes is presented in analogy to the GV bound for classical codes by using several enumerative results in finite unitary geometry. From this quantum GV bound we obtain several new binary quantum codes in a nonconstructive way having better parameters than the known codes.
IEEE Transactions on Information Theory | 2007
Longjiang Qu; Chao Li; Keqin Feng
In this note, it is proved that for each odd positive integer n there are exactly two n-variable symmetric Boolean functions with maximum algebraic immunity.
IEEE Transactions on Information Theory | 2010
Long Wang; Keqin Feng; San Ling; Chaoping Xing
The stabilizer method for constructing a class of asymmetric quantum codes (AQC), called additive AQC, has been established by Aly et.al. In this paper, we present a new characterization of AQC, which generalizes a result of the symmetric case known previously. As an application of the characterization, we establish a relationship of AQC with classical error-correcting codes and show a few examples of good AQC with specific parameters. By using this relationship, we obtain an asymptotic bound on AQCs from algebraic geometry codes.
Designs, Codes and Cryptography | 2009
Keqin Feng; Qunying Liao; Jing Yang
The notion of algebraic immunity of Boolean functions has been generalized in several ways to vector-valued functions and/or over arbitrary finite fields and reasonable upper bounds for such generalized algebraic immunities has been proved in Armknecht and Krause (Proceedings of ICALP 2006, LNCS, vol. 4052, pp 180–191, 2006), Ars and Faugere (Algebraic immunity of functions over finite fields, INRIA, No report 5532, 2005) and Batten (Canteaut, Viswanathan (eds.) Progress in Cryptology—INDOCRYPT 2004, LNCS, vol. 3348, pp 84–91, 2004). In this paper we show that the upper bounds can be reached as the maximal values of algebraic immunities for most of generalizations by using properties of Reed–Muller codes.
Finite Fields and Their Applications | 2006
Keqin Feng; Lanju Xu; Fred J. Hickernell
A linear error-block code is a natural generalization of the classical error-correcting code and has applications in experimental design, high-dimensional numerical integration and cryptography. This article formulates the concept of a linear error-block code and derives basic results for this kind of code by direct analogy to the classical case. Some problems for further research are raised.