Search Results - "Wen, Jiejing"
-
1
Linear codes of 2-designs as subcodes of the generalized Reed-Muller codes
Published in Cryptography and communications (01-05-2021)“…This paper is devoted to the affine-invariant ternary codes defined by Hermitian functions. We first compute the incidence matrices of the 2-designs supported…”
Get full text
Journal Article -
2
Cyclotomic construction of strong external difference families in finite fields
Published in Designs, codes, and cryptography (01-05-2018)“…Strong external difference families (SEDFs) and their generalizations GSEDFs and BGSEDFs in a finite abelian group G are combinatorial designs introduced by…”
Get full text
Journal Article -
3
Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks
Published in IACR Transactions on Symmetric Cryptology (01-01-2020)“…Recent works of Cogliati et al. (CRYPTO 2018) have initiated provable treatments of Substitution-Permutation Networks (SPNs), one of the most popular approach…”
Get full text
Journal Article -
4
Quantum MDS codes with new length and large minimum distance
Published in Discrete mathematics (01-01-2024)“…According to the well-known CSS construction, constructing quantum MDS codes are extensively investigated via Hermitian self-orthogonal generalized…”
Get full text
Journal Article -
5
Solution counts and sums of roots of unity
Published in Journal of number theory (01-11-2022)Get full text
Journal Article -
6
A q-polynomial approach to constacyclic codes
Published in Finite fields and their applications (01-09-2017)“…As a generalization of cyclic codes, constacyclic codes is an important and interesting class of codes due to their nice algebraic structures and various…”
Get full text
Journal Article -
7
Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks
Published in IACR Transactions on Symmetric Cryptology (28-09-2020)“…Recent works of Cogliati et al. (CRYPTO 2018) have initiated provable treatments of Substitution-Permutation Networks (SPNs), one of the most popular approach…”
Get full text
Journal Article -
8
Linear Codes Of 2-Designs As Subcodes Of The Extended Generalized Reed-Muller Codes
Published 28-07-2020“…This paper is concerned with the affine-invariant ternary codes which are defined by Hermitian functions. We compute the incidence matrices of 2-designs that…”
Get full text
Journal Article -
9
On the $k$-error linear complexity of subsequences of $d$-ary Sidel'nikov sequences over prime field $\mathbb{F}_{d}
Published 10-04-2019“…We study the $k$-error linear complexity of subsequences of the $d$-ary Sidel'nikov sequences over the prime field $\mathbb{F}_{d}$. A general lower bound for…”
Get full text
Journal Article -
10
Constructions on Real Approximate Mutually Unbiased Bases
Published 13-10-2021“…Mutually unbiased bases (MUB) have many applications in quantum information processing and quantum cryptography. Several complex MUB's in $\mathbb{C}^d$ for…”
Get full text
Journal Article -
11
The $(n,m,k,\lambda)$-Strong External Difference Family with $m \geq 5$ Exists
Published 30-12-2016“…The notion of strong external difference family (SEDF) in a finite abelian group $(G,+)$ is raised by M. B. Paterson and D. R. Stinson [5] in 2016 and…”
Get full text
Journal Article -
12
Cyclotomic Construction of Strong External Difference Families in Finite Fields
Published 07-01-2017“…Strong external difference family (SEDF) and its generalizations GSEDF, BGSEDF in a finite abelian group $G$ are combinatorial designs raised by Paterson and…”
Get full text
Journal Article