Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Keqin Feng is active.

Publication


Featured researches published by Keqin Feng.


international conference on the theory and application of cryptology and information security | 2008

An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity

Claude Carlet; Keqin Feng

After the improvement by Courtois and Meier of the algebraic attacks on stream ciphers and the introduction of the related notion of algebraic immunity, several constructions of infinite classes of Boolean functions with optimum algebraic immunity have been proposed. All of them gave functions whose algebraic degrees are high enough for resisting the Berlekamp-Massey attack and the recent Ronjom-Helleseth attack, but whose nonlinearities either achieve the worst possible value (given by Lobanovs bound) or are slightly superior to it. Hence, these functions do not allow resistance to fast correlation attacks. Moreover, they do not behave well with respect to fast algebraic attacks. In this paper, we study an infinite class of functions which achieve an optimum algebraic immunity. We prove that they have an optimum algebraic degree and a much better nonlinearity than all the previously obtained infinite classes of functions. We check that, at least for small values of the number of variables, the functions of this class have in fact a very good nonlinearity and also a good behavior against fast algebraic attacks.


IEEE Transactions on Information Theory | 2008

On the Weight Distributions of Two Classes of Cyclic Codes

Jinquan Luo; Keqin Feng

Let q=p<sup>m</sup> where p is an odd prime, mges2, and 1lesklesm-1. Let Tr be the trace mapping from F<sub>q</sub> to F<sub>p</sub> and zeta<sub>p</sub>=e<sup>2pii/p</sup> be a primitive pth root of unity. In this paper, we determine the value distribution of the following exponential sums: Sigma<sub>xisinF</sub> <sub>q</sub>chi(alphax<sup>p</sup> <sup>k</sup> <sup>+1</sup>+betax<sup>2</sup>) (alpha, betaisinF<sub>q</sub>) where chi(x)=zeta<sub>p</sub> <sup>Tr(x)</sup> is the canonical additive character of F<sub>q</sub>. As applications, we have the following. 1) We determine the weight distribution of the cyclic codes C<sub>1</sub> and C<sub>2</sub> over F<sub>p</sub>t with parity-check polynomial h<sub>2</sub>(x)h<sub>3</sub>(x) and h<sub>1</sub>(x)h<sub>2</sub>(x)h<sub>3</sub>(x), respectively, where t is a divisor of d=gcd(m, k), and h<sub>1</sub>(x), h<sub>2</sub>(x) , and h<sub>3</sub>(x) are the minimal polynomials of pi<sup>-1</sup>, pi<sup>-2</sup>, and pi<sup>-(p</sup> <sup>k</sup> <sup>+1)</sup> over F<sub>p</sub>t, respectively, for a primitive element pi of F<sub>q</sub>. 2) We determine the correlation distribution between two m-sequences of period q-1. Moreover, we find a new class of p-ary bent functions. This paper extends the results in Feng and Luo (2008).


IEEE Transactions on Information Theory | 2007

Value Distributions of Exponential Sums From Perfect Nonlinear Functions and Their Applications

Keqin Feng; Jinquan Luo

In this paper we present a unified way to determine the values and their multiplicities of the exponential sums Sigma<sub>xisinF(q)</sub>zeta<sub>p</sub> <sup>Tr(af(x)+bx)</sup>(a,bisinF<sub>q</sub>,q=p<sup>m</sup>,pges3) for all perfect nonlinear functions f which is a Dembowski-Ostrom polynomial or p = 3,f=<sup>x(3(k)+1)/2</sup> where k is odd and (k,m)=1. As applications, we determine (1) the correlation distribution of the m-sequence {a<sub>lambda</sub>=Tr(gamma<sup>lambda</sup>)}(lambda=0,1,...) and the sequence {b<sub>lambda</sub>=Tr(f(gamma<sup>lambda</sup>))}(lambda=0,1,...) over F<sub>p</sub> where gamma is a primitive element of F<sub>q</sub> and (2) the weight distributions of the linear codes over F<sub>p</sub> defined by f.


IEEE Transactions on Information Theory | 2009

Constructing Symmetric Boolean Functions With Maximum Algebraic Immunity

Longjiang Qu; Keqin Feng; Feng Liu; Lei Wang

Symmetric Boolean functions with even variables 2k and maximum algebraic immunity AI(f) = k have been constructed in Braekens thesis (2006). In this paper, we show more constructions of such Boolean functions including the generalization of a result and prove a conjecture raised in Braekens thesis (2006).


IEEE Transactions on Information Theory | 2006

Asymptotic bounds on quantum codes from algebraic geometry codes

Keqin Feng; San Ling; Chaoping Xing

We generalize a characterization of p-ary (p is a prime) quantum codes given by Feng and Xing to q-ary (q is a prime power) quantum codes. This characterization makes it possible to convert an asymptotic bound of Stichtenoth and Xing for nonlinear algebraic geometry codes to a quantum asymptotic bound. Besides, we also investigate the asymptotic behavior of quantum codes


IEEE Transactions on Information Theory | 2004

A finite Gilbert-Varshamov bound for pure stabilizer quantum codes

Keqin Feng; Zhi Ma

A finite Gilbert-Varshamov (GV) bound for pure stabilizer (binary and nonbinary) quantum error correcting codes is presented in analogy to the GV bound for classical codes by using several enumerative results in finite unitary geometry. From this quantum GV bound we obtain several new binary quantum codes in a nonconstructive way having better parameters than the known codes.


IEEE Transactions on Information Theory | 2007

A Note on Symmetric Boolean Functions With Maximum Algebraic Immunity in Odd Number of Variables

Longjiang Qu; Chao Li; Keqin Feng

In this note, it is proved that for each odd positive integer n there are exactly two n-variable symmetric Boolean functions with maximum algebraic immunity.


IEEE Transactions on Information Theory | 2010

Asymmetric Quantum Codes: Characterization and Constructions

Long Wang; Keqin Feng; San Ling; Chaoping Xing

The stabilizer method for constructing a class of asymmetric quantum codes (AQC), called additive AQC, has been established by Aly et.al. In this paper, we present a new characterization of AQC, which generalizes a result of the symmetric case known previously. As an application of the characterization, we establish a relationship of AQC with classical error-correcting codes and show a few examples of good AQC with specific parameters. By using this relationship, we obtain an asymptotic bound on AQCs from algebraic geometry codes.


Designs, Codes and Cryptography | 2009

Maximal values of generalized algebraic immunity

Keqin Feng; Qunying Liao; Jing Yang

The notion of algebraic immunity of Boolean functions has been generalized in several ways to vector-valued functions and/or over arbitrary finite fields and reasonable upper bounds for such generalized algebraic immunities has been proved in Armknecht and Krause (Proceedings of ICALP 2006, LNCS, vol. 4052, pp 180–191, 2006), Ars and Faugere (Algebraic immunity of functions over finite fields, INRIA, No report 5532, 2005) and Batten (Canteaut, Viswanathan (eds.) Progress in Cryptology—INDOCRYPT 2004, LNCS, vol. 3348, pp 84–91, 2004). In this paper we show that the upper bounds can be reached as the maximal values of algebraic immunities for most of generalizations by using properties of Reed–Muller codes.


Finite Fields and Their Applications | 2006

Linear error-block codes

Keqin Feng; Lanju Xu; Fred J. Hickernell

A linear error-block code is a natural generalization of the classical error-correcting code and has applications in experimental design, high-dimensional numerical integration and cryptography. This article formulates the concept of a linear error-block code and derives basic results for this kind of code by direct analogy to the classical case. Some problems for further research are raised.

Collaboration


Dive into the Keqin Feng's collaboration.

Top Co-Authors

Avatar

Jin Li

Hefei University of Technology

View shared research outputs
Top Co-Authors

Avatar

Minghui Yang

Hefei University of Technology

View shared research outputs
Top Co-Authors

Avatar

Chunming Tang

China West Normal University

View shared research outputs
Top Co-Authors

Avatar

Aixian Zhang

Capital Normal University

View shared research outputs
Top Co-Authors

Avatar

Can Xiang

South China Agricultural University

View shared research outputs
Top Co-Authors

Avatar

Chaoping Xing

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge