The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] WenPing MA(15hit)

1-15hit
  • Autocorrelation Values of Generalized Cyclotomic Sequences of Order Six

    Chun-e ZHAO  Wenping MA  Tongjiang YAN  Yuhua SUN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E96-A No:10
      Page(s):
    2045-2048

    Binary sequences with low autocorrelation have important applications in communication systems and cryptography. In this paper, the autocorrelation values of binary Whiteman generalized cyclotomic sequences of order six and period pq are discussed. Our result shows that the autocorrelation of these sequences is four-valued and that the corresponding values are in {-1,3,-5,pq} if the parameters are chosen carefully.

  • Linear Complexity of a New Generalized Cyclotomic Sequence of Order Two of Length pq

    Xiaoping LI  Wenping MA  Tongjiang YAN  Xubo ZHAO  

     
    LETTER-Cryptography and Information Security

      Vol:
    E96-A No:5
      Page(s):
    1001-1005

    In this letter, we first introduce a new generalized cyclotomic sequence of order two of length pq, then we calculate its linear complexity and minimal polynomial. Our results show that this sequence possesses both high linear complexity and optimal balance on 1 s and 0 s, which may be attractive for use in stream cipher cryptosystems.

  • Binary Sequence Pairs of Period pm-1 with Optimal Three-Level Correlation

    Lianfei LUO  Wenping MA  Feifei ZHAO  

     
    LETTER-Information Theory

      Vol:
    E101-A No:8
      Page(s):
    1263-1266

    Let Fpm be the field of pm elements where p is an odd prime. In this letter, binary sequence pairs of period N=pm-1 are presented, where sequences are generated from the polynomial x2-c for any c Fpm{0}. The cross-correlation values of sequence pairs are completely determined, our results show that those binary sequence pairs have optimal three-level correlation.

  • Hash-Chain Improvement of Key Predistribution Schemes Based on Transversal Designs

    Qiang GAO  Wenping MA  Wei LUO  Feifei ZHAO  

     
    LETTER

      Vol:
    E101-A No:1
      Page(s):
    157-159

    Key predistribution schemes (KPSs) have played an important role in security of wireless sensor networks (WSNs). Due to comprehensive and simple structures, various types of combinatorial designs are used to construct KPSs. In general, compared to random KPSs, combinatorial KPSs have higher local connectivity but lower resilience against a node capture attack. In this paper, we apply two methods based on hash chains on KPSs based on transversal designs (TDs) to improve the resilience and the expressions for the metrics of the resulting schemes are derived.

  • On Hyperbent Functions and Semibent Functions with Dillon-Like Exponents

    YeFeng HE  WenPing MA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E98-A No:6
      Page(s):
    1266-1275

    The main contribution of this paper is to characterize the hyperbentness of two infinite classes of Boolean functions via Dillon-like exponents, and give new classes of semibent functions with Dillon-like exponents and Niho exponents. In this paper, the approaches of Mesnager and Wang et al. are generalized to Charpin-Gong like functions with two additional trace terms. By using the partial exponential sums and Dickson polynomials, it also gives the necessary and sufficient conditions of the hyperbent properties for their subclasses of Boolean functions, and gives two corresponding examples on F230. Thanks to the result of Carlet et al., new classes of semibent functions are obtained by using new hyperbent functions and the known Niho bent functions. Finally, this paper extends the Works of Lisonek and Flori and Mesnager, and gives different characterizations of new hyperbent functions and new semibent functions with some restrictions in terms of the number of points on hyperelliptic curves. These results provide more nonlinear functions for designing the filter generators of stream ciphers.

  • Reduced Complexity Belief Propagation Decoding Algorithm for Polar Codes Based on the Principle of Equal Spacing

    Yinfang HONG  Hui LI  Wenping MA  Xinmei WANG  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E98-B No:9
      Page(s):
    1824-1831

    In the log-likelihood ratio (LLR) domain, the belief propagation (BP) decoding algorithm for polar codes incurs high computation complexity due to the computation of the hyperbolic functions in the node update rules. In this paper, we propose a linear approximation method based on the principle of equal spacing to simplify the hyperbolic functions in the BP decoding algorithm. Our method replaces the computation of hyperbolic functions with addition and multiplication operations in the node update rules. Simulation results show that the performance of the modified BP decoding algorithm is almost the same as the original BP decoding algorithm in the low Signal to Noise Ratio (SNR) region, and in the high SNR region the performance of our method is slightly worse. The modified BP decoding algorithm is only implemented with addition and multiplication operations, which greatly reduces computation complexity, and simplifies hardware implementation.

  • Hybrid of Downlink and Uplink Transmission for Small Cell Networks with Interference Alignment

    Feifei ZHAO  Wenping MA  Momiao ZHOU  Chengli ZHANG  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E101-A No:6
      Page(s):
    988-991

    Based on Bezout's theorem, the feasibility condition for interference alignment (IA) is established in a two-way small cell network where part of cells transmit in downlink while the others in uplink. Moreover, the sufficient and necessary condition for the two-way network to achieve as many degrees of freedom (DoFs) as the traditional one-way network is presented. We find that in certain cases every small cell can independently decide to work in either downlink mode or uplink mode as needed without causing performance degradation of IA.

  • Security Analysis of the Newest ID-Transfer Scheme for Low-Cost RFID Tags

    YuanYuan YANG  WenPing MA  WeiBo LIU  Qi JIANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E93-A No:10
      Page(s):
    1837-1839

    We show a tracking attack against the newest ID-transfer scheme for low-cost RFID tags. In this attack, a wide attacker, i.e. an attacker that can access the verification result of a server, is able to forge a set of specific messages, and to track a tag. The attack is unique as it involves three sessions of the protocol. Finally, a simple feasibility analysis of the attack is given.

  • Complex Hadamard Codes

    WenPing MA  MoonHo LEE  

     
    LETTER-Coding Theory

      Vol:
    E88-A No:1
      Page(s):
    396-398

    In this letter, a method to construct good binary and quaternary error correcting codes, called complex Hadamard codes, based on a complex Hadamard matrix is presented. The related properties of the codes are analyzed. In addition, through the operation in Z4 domain, a new simplex soft-decision decoding algorithm for the complex Hadamard codes is also proposed.

  • On the Gray Image of Cyclic Codes over Finite Chain Rings

    Jianfa QIAN  Wenping MA  Xinmei WANG  

     
    LETTER-Coding Theory

      Vol:
    E91-A No:9
      Page(s):
    2685-2687

    We introduce (1-γ)-cyclic code and cyclic codes over the finite chain ring R. We prove that the Gray image of a linear (1-γ)-cyclic code over R of length n is a distance invariant quasi-cyclic code over Fpk. We also prove that if (n,p)=1, then every code over Fpk which is the Gray image of a cyclic code over R of length n is equivalent to a quasi-cyclic code.

  • Linear Complexity of Binary Whiteman Generalized Cyclotomic Sequences of Order 4

    Xiaoping LI  Wenping MA  Tongjiang YAN  Xubo ZHAO  

     
    LETTER-Cryptography and Information Security

      Vol:
    E96-A No:1
      Page(s):
    363-366

    In this letter we propose a new Whiteman generalized cyclotomic sequence of order 4. Meanwhile, we determine its linear complexity and minimal polynomial. The results show that this sequence possesses both high linear complexity and optimal balance on 1 s and 0 s, which may be attractive for cryptographic applications.

  • The Extended FDH Sequences

    WenPing MA  YeFeng HE  Shaohui SUN  

     
    LETTER-Coding Theory

      Vol:
    E93-A No:1
      Page(s):
    336-338

    A new construction method for polyphase sequences with two-valued periodic auto- and crosscorrelation functions is proposed. This method gives L families of polyphase sequences for each prime length L which is bigger than three. For each family of sequences, the out-of-phase auto- and crosscorrelation functions are proved to be constant and asymptotically reach the Sarwate bound. Furthermore, it is shown that sequences of each family are mutually orthogonal.

  • Secret Sharing Schemes from Linear Codes over Finite Rings

    Jianfa QIAN  Wenping MA  

     
    LETTER-Cryptography and Information Security

      Vol:
    E95-A No:7
      Page(s):
    1193-1196

    An important concept in secret sharing scheme is the access structure. However, determining the access structure of the secret sharing scheme based on a linear code is a very difficult problem. In this work, we provide a method to construct a class of two-weight linear codes over finite rings. Based on the two-weight codes, we present an access structure of a secret sharing scheme.

  • On Balanced Semi-Bent Functions with High Algebraic Degrees

    YeFeng HE  WenPing MA  

     
    LETTER-Cryptography and Information Security

      Vol:
    E94-A No:3
      Page(s):
    1019-1022

    A class of balanced semi-bent functions with an even number of variables is proposed. It is shown that they include one subclass of semi-bent functions with maximum algebraic degrees. Furthermore, an example of semi-bent functions in a small field is given by using the zeros of some Kloosterman sums. Based on the result given by S.Kim et al., an example of infinite families of semi-bent functions is also obtained.

  • A New Class of Bent Functions

    WenPing MA  MoonHo LEE  FuTai ZHANG  

     
    LETTER-Spread Spectrum Technologies and Applications

      Vol:
    E88-A No:7
      Page(s):
    2039-2040

    In this letter, using techniques from linear algebra and coding theory, we characterize the quadratic Boolean functions represented by trace. We show that a linear combination of trace-terms over finite field can be determined to be bent by a polynomial GCD computation. Then we derive some new families of bent functions.