


default search action
Guang Gong
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i42]Fei Guo, Zilong Wang, Guang Gong:
A Note on "Constructing Bent Functions Outside the Maiorana-McFarland Class Using a General Form of Rothaus". CoRR abs/2502.10192 (2025) - 2024
- [j123]Nusa Zidaric
, Kalikinkar Mandal, Guang Gong, Mark D. Aagaard:
The welch-gong stream cipher - evolutionary path. Cryptogr. Commun. 16(1): 129-165 (2024) - [j122]Guang Gong:
Uni/multi variate polynomial embeddings for zkSNARKs. Cryptogr. Commun. 16(6): 1257-1288 (2024) - [c142]Mohammadtaghi Badakhshan, Guiwen Luo, Tanmayi Jandhyala, Guang Gong:
Ursa Minor: The Implementation Framework for Polaris. WAIFI 2024: 258-273 - 2023
- [j121]Nusa Zidaric
, Guang Gong, Mark D. Aagaard, Aleksandar Jurisic, Olexandr Konovalov
:
FFCSA - Finite Field Constructions, Search, and Algorithms. ACM Commun. Comput. Algebra 57(2): 57-64 (2023) - [j120]Guang Gong
, Z. L. Wang:
Status of three classes of sequences. Cryptogr. Commun. 15(2): 257-308 (2023) - [j119]Fei Guo, Zilong Wang
, Guang Gong:
Several secondary methods for constructing bent-negabent functions. Des. Codes Cryptogr. 91(3): 971-995 (2023) - [j118]Guiwen Luo, Shihui Fu, Guang Gong:
Speeding Up Multi-Scalar Multiplication over Fixed Points Towards Efficient zkSNARKs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 358-380 (2023) - [j117]Zilong Wang
, Guang Gong
:
Constructions of Complementary Sequence Sets and Complete Complementary Codes by Ideal Two-Level Autocorrelation Sequences and Permutation Polynomials. IEEE Trans. Inf. Theory 69(7): 4723-4739 (2023) - [c141]Radi Abubaker, Guang Gong:
High-speed OFDM Physical-Layer Key Exchange. CNS 2023: 1-9 - [c140]Guiwen Luo, Guang Gong:
Fast Computation of Multi-Scalar Multiplication for Pairing-Based zkSNARK Applications. ICBC 2023: 1-5 - [c139]Fei Guo, Zilong Wang, Guang Gong:
Constructing Quadratic and Cubic Negabent Functions over Finite Fields. ISIT 2023: 1414-1418 - [c138]Mohammadtaghi Badakhshan, Guang Gong:
Privacy-Preserving Ownership Transfer: Challenges and An Outlined Solution Based on Zero-Knowledge Proofs. WF-IoT 2023: 1-9 - 2022
- [j116]Kalikinkar Mandal, Guang Gong:
On ideal t-tuple distribution of orthogonal functions in filtering de bruijn generators. Adv. Math. Commun. 16(3): 597-619 (2022) - [j115]Shihui Fu, Guang Gong
:
Polaris: Transparent Succinct Zero-Knowledge Arguments for R1CS with Efficient Verifier. Proc. Priv. Enhancing Technol. 2022(1): 544-564 (2022) - [j114]Zilong Wang
, Erzhong Xue
, Guang Gong
:
New Constructions of Complementary Sequence Pairs Over 4q-QAM. IEEE Trans. Inf. Theory 68(3): 2067-2082 (2022) - [c137]Zilong Wang, Qian Chen
, Guang Gong:
An Upper Bound of the Set Size of Perfect Sequences with Optimal Cross-correlation. ISIT 2022: 532-535 - [i41]Erzhong Xue, Zilong Wang, Guang Gong:
Non-standard Golay Complementary Sequence Pair over QAM. CoRR abs/2208.12533 (2022) - [i40]Fei Guo, Zilong Wang, Guang Gong:
Systematic Constructions of Bent-Negabent Functions, 2-Rotation Symmetric Bent-Negabent Functions and Their Duals. CoRR abs/2209.08712 (2022) - 2021
- [j113]Zilong Wang
, Dongxu Ma
, Guang Gong
, Erzhong Xue
:
New Construction of Complementary Sequence (or Array) Sets and Complete Complementary Codes. IEEE Trans. Inf. Theory 67(7): 4902-4928 (2021) - [c136]Shihui Fu, Guiwen Luo, Guang Gong:
Batching Anonymous and Non-Anonymous Membership Proofs for Blockchain Applications. AIIoT 2021: 342-348 - [c135]Kalikinkar Mandal, Guang Gong:
Homomorphic Evaluation of Lightweight Cipher Boolean Circuits. FPS 2021: 63-74 - [c134]Yunjie Yi, Kalikinkar Mandal, Guang Gong:
Implementation of Lightweight Ciphers and Their Integration into Entity Authentication with IEEE 802.11 Physical Layer Transmission. FPS 2021: 113-129 - [c133]Guiwen Luo, Shihui Fu, Guang Gong:
Updatable Linear Map Commitments and Their Applications in Elementary Databases. PST 2021: 1-6 - 2020
- [j112]Zilong Wang, Jinjin Chai, Guang Gong:
The Fourier spectral characterization for the correlation-immune functions over $\phantom {\dot {i}\!}\mathbb {F}_{p}$. Cryptogr. Commun. 12(3): 585-595 (2020) - [j111]Kalikinkar Mandal
, Bo Yang
, Guang Gong, Mark D. Aagaard
:
Analysis and Efficient Implementations of a Class of Composited de Bruijn Sequences. IEEE Trans. Computers 69(12): 1835-1848 (2020) - [j110]Zuling Chang
, Guang Gong
, Qiang Wang
:
Cycle Structures of a Class of Cascaded FSRs. IEEE Trans. Inf. Theory 66(6): 3766-3774 (2020) - [j109]Riham AlTawy, Guang Gong, Kalikinkar Mandal, Raghvendra Rohit:
WAGE: An Authenticated Encryption with a Twist. IACR Trans. Symmetric Cryptol. 2020(S1): 132-159 (2020) - [c132]Shihui Fu, Guang Gong:
Pisces: A New Zero-Knowledge Protocol for Blockchain Privacy. FPS 2020: 180-204 - [c131]Zilong Wang, Erzhong Xue, Guang Gong:
A New Construction of QAM Golay Complementary Sequence Pair. ISIT 2020: 269-273 - [c130]Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen
, Huaxiong Wang:
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model. Public Key Cryptography (1) 2020: 396-427 - [c129]Yunsi Fei
, Guang Gong, Cheng Gongye
, Kalikinkar Mandal, Raghvendra Rohit, Tianhong Xu, Yunjie Yi, Nusa Zidaric
:
Correlation Power Analysis and Higher-Order Masking Implementation of WAGE. SAC 2020: 593-614 - [c128]Baozheng Liu, Chao Zhang, Guang Gong, Yishun Zeng, Haifeng Ruan, Jianwei Zhuge:
FANS: Fuzzing Android Native System Services via Automated Interface Analysis. USENIX Security Symposium 2020: 307-323 - [e5]Abdelmalek Benzekri, Michel Barbeau
, Guang Gong, Romain Laborde
, Joaquín García-Alfaro
:
Foundations and Practice of Security - 12th International Symposium, FPS 2019, Toulouse, France, November 5-7, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12056, Springer 2020, ISBN 978-3-030-45370-1 [contents] - [i39]Zilong Wang, Dongxu Ma, Guang Gong, Erzhong Xue:
New Construction of Complementary Sequence (or Array) Sets and Complete Complementary Codes. CoRR abs/2001.04898 (2020) - [i38]Zilong Wang, Erzhong Xue, Guang Gong:
New Constructions of Complementary Sequence Pairs over 4q-QAM. CoRR abs/2003.03459 (2020) - [i37]Kalikinkar Mandal, Guang Gong:
PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks. CoRR abs/2004.02264 (2020) - [i36]Zilong Wang, Guang Gong:
Constructions of complementary sequence sets and complete complementary codes by 2-level autocorrelation sequences and permutation polynomials. CoRR abs/2005.05825 (2020) - [i35]Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen, Huaxiong Wang:
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model. IACR Cryptol. ePrint Arch. 2020: 140 (2020) - [i34]Riham AlTawy, Guang Gong, Kalikinkar Mandal, Raghvendra Rohit:
WAGE: An Authenticated Encryption with a Twist. IACR Cryptol. ePrint Arch. 2020: 435 (2020) - [i33]Yunsi Fei, Guang Gong, Cheng Gongye, Kalikinkar Mandal, Raghvendra Rohit, Tianhong Xu, Yunjie Yi, Nusa Zidaric:
Correlation Power Analysis and Higher-order Masking Implementation of WAGE. IACR Cryptol. ePrint Arch. 2020: 1202 (2020)
2010 – 2019
- 2019
- [j108]Yao Chen
, Benjamin M. Case, Shuhong Gao, Guang Gong:
Error analysis of weak Poly-LWE instances. Cryptogr. Commun. 11(3): 411-426 (2019) - [j107]Xinxin Fan, Guang Gong, Berry Schoenmakers, Francesco Sica
, Andrey Sidorenko:
Secure simultaneous bit extraction from Koblitz curves. Des. Codes Cryptogr. 87(1): 1-13 (2019) - [j106]Riham AlTawy, Guang Gong:
Mesh: A Supply Chain Solution with Locally Private Blockchain Transactions. Proc. Priv. Enhancing Technol. 2019(3): 149-169 (2019) - [j105]Dongxu Ma
, Srdjan Z. Budisin
, Zilong Wang
, Guang Gong:
A New Generalized Paraunitary Generator for Complementary Sets and Complete Complementary Codes of Size 2m. IEEE Signal Process. Lett. 26(1): 4-8 (2019) - [j104]Nusa Zidaric
, Mark D. Aagaard
, Guang Gong:
Hardware Optimizations and Analysis for the WG-16 Cipher with Tower Field Arithmetic. IEEE Trans. Computers 68(1): 67-82 (2019) - [c127]Kalikinkar Mandal, Guang Gong:
PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks. CCSW 2019: 57-68 - [c126]Meng Yang, Guang Gong:
Lempel-Ziv Compression with Randomized Input-Output for Anti-compression Side-Channel Attacks Under HTTPS/TLS. FPS 2019: 117-136 - [c125]Guang Gong, Morgan He, Raghvendra Rohit, Yunjie Yi:
U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme. FPS 2019: 261-272 - [i32]Zilong Wang, Jinjin Chai, Guang Gong:
The Fourier Spectral Characterization for the Correlation-Immune Functions over Fp. CoRR abs/1903.05350 (2019) - [i31]Jinjin Chai, Zilong Wang, Guang Gong:
New Characterizations for the Multi-output Correlation-Immune Boolean Functions. CoRR abs/1903.05351 (2019) - [i30]Yunjie Yi, Guang Gong:
Implementation of three LWC Schemes in the WiFi 4-Way Handshake with Software Defined Radio. CoRR abs/1909.11707 (2019) - [i29]Raghvendra Rohit, Guang Gong:
Practical Forgery Attacks on Limdolen and HERN. IACR Cryptol. ePrint Arch. 2019: 907 (2019) - [i28]Kalikinkar Mandal, Guang Gong:
PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks. IACR Cryptol. ePrint Arch. 2019: 979 (2019) - 2018
- [j103]Kalikinkar Mandal, Bo Yang, Guang Gong, Mark D. Aagaard:
On ideal t-tuple distribution of filtering de Bruijn sequence generators. Cryptogr. Commun. 10(4): 629-641 (2018) - [j102]Riham AlTawy
, Raghvendra Rohit
, Morgan He, Kalikinkar Mandal, Gangqiang Yang, Guang Gong:
Towards a Cryptographic Minimal Design: The sLiSCP Family of Permutations. IEEE Trans. Computers 67(9): 1341-1358 (2018) - [j101]Riham AlTawy
, Raghvendra Rohit, Morgan He, Kalikinkar Mandal, Gangqiang Yang, Guang Gong:
SLISCP-light: Towards Hardware Optimized Sponge-specific Cryptographic Permutations. ACM Trans. Embed. Comput. Syst. 17(4): 81:1-81:26 (2018) - [j100]Guang Gong
, Tor Helleseth, P. Vijay Kumar
:
Solomon W. Golomb - Mathematician, Engineer, and Pioneer. IEEE Trans. Inf. Theory 64(4): 2844-2857 (2018) - [j99]Zilong Wang
, Guang Gong
:
Discrete Fourier Transform of Boolean Functions over the Complex Field and Its Applications. IEEE Trans. Inf. Theory 64(4): 3000-3009 (2018) - [c124]Guang Gong
:
Securing Internet-of-Things. FPS 2018: 3-16 - [c123]Nusa Zidaric
, Mark D. Aagaard
, Guang Gong
:
Rapid Hardware Design for Cryptographic Modules with Filtering Structures over Small Finite Fields. WAIFI 2018: 128-145 - [i27]Raghvendra Rohit, Guang Gong:
Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64. IACR Cryptol. ePrint Arch. 2018: 699 (2018) - 2017
- [j98]Yang Yang, Xiaohu Tang, Guang Gong:
New almost perfect, odd perfect, and perfect sequences from difference balanced functions with d-form property. Adv. Math. Commun. 11(1): 67-76 (2017) - [j97]Qiao Liu
, Guang Gong, Yong Wang, Hui Li:
A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach. Mob. Inf. Syst. 2017: 7843843:1-7843843:12 (2017) - [j96]Bo Yang, Kalikinkar Mandal, Mark D. Aagaard, Guang Gong:
Efficient Composited de Bruijn Sequence Generators. IEEE Trans. Computers 66(8): 1354-1368 (2017) - [c122]Teng Wu, Yin Tan, Kalikinkar Mandal, Guang Gong:
On the Multi-output Filtering Model and Its Applications. C2SI 2017: 265-281 - [c121]Raghvendra Rohit, Riham AlTawy, Guang Gong:
MILP-Based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher. IMACC 2017: 333-351 - [c120]Dongxu Ma, Zilong Wang, Guang Gong, Hui Li:
A new method to construct golay complementary set and near-complementary set by paraunitary matrices. IWSDA 2017: 9-13 - [c119]Riham AlTawy, Muhammad ElSheikh
, Amr M. Youssef, Guang Gong:
Lelantos: A Blockchain-Based Anonymous Physical Delivery System. PST 2017: 15-24 - [c118]Riham AlTawy, Raghvendra Rohit, Morgan He, Kalikinkar Mandal, Gangqiang Yang, Guang Gong:
sLiSCP: Simeck-Based Permutations for Lightweight Sponge Cryptographic Primitives. SAC 2017: 129-150 - [i26]Riham AlTawy, Muhammad ElSheikh, Amr M. Youssef, Guang Gong:
Lelantos: A Blockchain-based Anonymous Physical Delivery System. IACR Cryptol. ePrint Arch. 2017: 465 (2017) - [i25]Riham AlTawy, Raghvendra Rohit, Morgan He, Kalikinkar Mandal, Gangqiang Yang, Guang Gong:
sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives. IACR Cryptol. ePrint Arch. 2017: 747 (2017) - 2016
- [j95]Yang Yang, Guang Gong, Xiaohu Tang:
On ω-cyclic-conjugated-perfect quaternary GDJ sequences. Adv. Math. Commun. 10(2): 321-331 (2016) - [j94]Yin Tan, Guang Gong, Bo Zhu:
Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions. Cryptogr. Commun. 8(2): 291-311 (2016) - [j93]Longjiang Qu, Yin Tan, Chao Li, Guang Gong:
More constructions of differentially 4-uniform permutations on 𝔽22k. Des. Codes Cryptogr. 78(2): 391-408 (2016) - [j92]Claude Carlet, Guang Gong, Yin Tan:
Quadratic zero-difference balanced functions, APN functions and strongly regular graphs. Des. Codes Cryptogr. 78(3): 629-654 (2016) - [j91]Xiutao Feng, Guang Gong:
On algebraic immunity of trace inverse functions on finite fields of characteristic two. J. Syst. Sci. Complex. 29(1): 272-288 (2016) - [j90]Teng Wu, Guang Gong:
Two new message authentication codes based on APN functions and stream ciphers. Secur. Commun. Networks 9(12): 1864-1871 (2016) - [j89]Kalikinkar Mandal, Guang Gong:
Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications. EAI Endorsed Trans. Security Safety 3(7): e3 (2016) - [j88]Kalikinkar Mandal, Guang Gong:
Feedback Reconstruction and Implementations of Pseudorandom Number Generators from Composited De Bruijn Sequences. IEEE Trans. Computers 65(9): 2725-2738 (2016) - [j87]Kalikinkar Mandal, Xinxin Fan, Guang Gong:
Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices. ACM Trans. Embed. Comput. Syst. 15(1): 1:1-1:28 (2016) - [j86]Fei Huo, Patrick Mitran, Guang Gong:
Analysis and Validation of Active Eavesdropping Attacks in Passive FHSS RFID Systems. IEEE Trans. Inf. Forensics Secur. 11(7): 1528-1541 (2016) - [c117]Qiao Liu, Guang Gong:
Physical Layer Secure Information Exchange Protocol for MIMO Ad Hoc Networks against Passive Attacks. GLOBECOM 2016: 1-6 - 2015
- [j85]Min Zeng, Yuan Luo, Guang Gong:
Sequences with good correlation property based on depth and interleaving techniques. Des. Codes Cryptogr. 77(1): 255-275 (2015) - [j84]Lein Harn, Guang Gong:
Conference key establishment protocol using a multivariate polynomial and its applications. Secur. Commun. Networks 8(9): 1794-1800 (2015) - [j83]Xinxin Fan, Kalikinkar Mandal, Guang Gong:
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices. EAI Endorsed Trans. Security Safety 2(3): e4 (2015) - [j82]Hayssam El-Razouk, Arash Reyhani-Masoleh, Guang Gong:
New Hardware Implementations of WG(29, 11) and WG-16 Stream Ciphers Using Polynomial Basis. IEEE Trans. Computers 64(7): 2020-2035 (2015) - [c116]Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, Guang Gong:
The Simeck Family of Lightweight Block Ciphers. CHES 2015: 307-329 - [c115]Yao Chen, Guang Gong:
Integer arithmetic over ciphertext and homomorphic data aggregation. CNS 2015: 628-632 - [c114]Bo Zhu, Xinxin Fan, Guang Gong:
Pleco and Plectron - Two Provably Secure Password Hashing Algorithms. CODASPY 2015: 127-129 - [c113]Qiao Liu, Guang Gong, Yong Wang, Hui Li:
A Novel Physical Layer Security Scheme for MIMO Two-Way Relay Channels. GLOBECOM Workshops 2015: 1-6 - [c112]Teng Wu, Guang Gong:
New Message Authentication Code Based on APN Functions and Stream Ciphers. NSS 2015: 395-402 - [i24]Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, Guang Gong:
The Simeck Family of Lightweight Block Ciphers. IACR Cryptol. ePrint Arch. 2015: 612 (2015) - [i23]Gangqiang Yang, Mark D. Aagaard, Guang Gong:
Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator. IACR Cryptol. ePrint Arch. 2015: 789 (2015) - 2014
- [j81]Kalikinkar Mandal, Guang Gong, Xinxin Fan, Mark D. Aagaard:
Optimal parameters for the WG stream cipher family. Cryptogr. Commun. 6(2): 117-135 (2014) - [j80]Bo Zhu, Guang Gong:
Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64. Cryptogr. Commun. 6(4): 313-333 (2014) - [j79]Yiyuan Luo, Xuejia Lai, Zhongming Wu, Guang Gong:
A unified method for finding impossible differentials of block cipher structures. Inf. Sci. 263: 211-220 (2014) - [j78]Stewart Robson, Bosco Leung, Guang Gong:
Truly Random Number Generator Based on a Ring Oscillator Utilizing Last Passage Time. IEEE Trans. Circuits Syst. II Express Briefs 61-II(12): 937-941 (2014) - [j77]Shasha Zhu, Guang Gong:
Fuzzy Authorization for Cloud Storage. IEEE Trans. Cloud Comput. 2(4): 422-435 (2014) - [j76]Zilong Wang, Matthew Geoffrey Parker, Guang Gong, Gaofei Wu:
On the PMEPR of Binary Golay Sequences of Length $2^{n}$. IEEE Trans. Inf. Theory 60(4): 2391-2398 (2014) - [j75]Jin-Ho Chung, Guang Gong, Kyeongcheol Yang:
New Families of Optimal Frequency-Hopping Sequences of Composite Lengths. IEEE Trans. Inf. Theory 60(6): 3688-3697 (2014) - [j74]Honggang Hu, Shuai Shao
, Guang Gong, Tor Helleseth:
The Proof of Lin's Conjecture via the Decimation-Hadamard Transform. IEEE Trans. Inf. Theory 60(8): 5054-5064 (2014) - [j73]Hayssam El-Razouk, Arash Reyhani-Masoleh, Guang Gong:
New Implementations of the WG Stream Cipher. IEEE Trans. Very Large Scale Integr. Syst. 22(9): 1865-1878 (2014) - [c111]Bo Zhu, Xinxin Fan, Guang Gong:
Loxin - A solution to password-less universal login. INFOCOM Workshops 2014: 488-493 - [c110]Fei Huo, Guang Gong:
A new efficient physical layer OFDM encryption scheme. INFOCOM 2014: 1024-1032 - [c109]Min Zeng, Yuan Luo, Guang Gong:
New binary sequences with good correlation based on high-order difference and interleaving techniques. ISIT 2014: 1663-1666 - [c108]Honggang Hu, Shuai Shao, Guang Gong, Tor Helleseth:
On the proof of Lin's conjecture. ISIT 2014: 1822-1826 - [c107]Guang Gong, Solomon W. Golomb:
A Simple Construction of Almost Perfect Quinary ASK and QAM Sequences. SETA 2014: 109-120 - [p3]Kalikinkar Mandal, Guang Gong:
Generating Good Span n Sequences Using Orthogonal Functions in Nonlinear Feedback Shift Registers. Open Problems in Mathematics and Computational Science 2014: 127-162 - [i22]Claude Carlet, Guang Gong, Yin Tan:
Quadratic Zero-Difference Balanced Functions, APN Functions and Strongly Regular Graphs. CoRR abs/1410.2903 (2014) - [i21]Tongjiang Yan, Guang Gong:
Some Notes on Constructions of Binary Sequences with Optimal Autocorrelation. CoRR abs/1411.4340 (2014) - [i20]Guang Gong, Kalikinkar Mandal, Yin Tan, Teng Wu:
On the Multi-output Filtering Model and Its Applications. IACR Cryptol. ePrint Arch. 2014: 542 (2014) - [i19]Bo Zhu, Xinxin Fan, Guang Gong:
Pleco and Plectron - Two Provably Secure Password Hashing Algorithms. IACR Cryptol. ePrint Arch. 2014: 655 (2014) - 2013
- [j72]Yang Yang, Xiaohu Tang, Guang Gong:
Even periodic and odd periodic complementary sequence pairs from generalized Boolean functions. Adv. Math. Commun. 7(2): 113-125 (2013) - [j71]Zilong Wang, Guang Gong:
Correlation of binary sequence families derived from the multiplicative characters of finite fields. Adv. Math. Commun. 7(4): 475-484 (2013) - [j70]Guang Gong, Mark D. Aagaard, Xinxin Fan:
Resilience to distinguishing attacks on WG-7 cipher and their generalizations. Cryptogr. Commun. 5(4): 277-289 (2013) - [j69]Guang Gong, Fei Huo, Yang Yang:
Large Zero Autocorrelation Zones of Golay Sequences and Their Applications. IEEE Trans. Commun. 61(9): 3967-3979 (2013) - [j68]Hong Wen, Guang Gong, Shichao Lv, Pin-Han Ho:
Framework for MIMO cross-layer secure communication based on STBC. Telecommun. Syst. 52(4): 2177-2185 (2013) - [j67]Zilong Wang, Guang Gong, Nam Yul Yu
:
New Polyphase Sequence Families With Low Correlation Derived From the Weil Bound of Exponential Sums. IEEE Trans. Inf. Theory 59(6): 3990-3998 (2013) - [j66]Zhijun Li, Guang Gong, Zhiguang Qin:
Secure and Efficient LCMQ Entity Authentication Protocol. IEEE Trans. Inf. Theory 59(6): 4042-4054 (2013) - [j65]Zhijun Li, Guang Gong:
On the Node Clone Detection in Wireless Sensor Networks. IEEE/ACM Trans. Netw. 21(6): 1799-1811 (2013) - [c106]Bo Zhu, Yin Tan, Guang Gong:
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation. CANS 2013: 20-38 - [c105]Gangqiang Yang, Xinxin Fan, Mark D. Aagaard, Guang Gong:
Design space exploration of the lightweight stream cipher WG-8 for FPGAs and ASICs. WESS 2013: 8:1-8:10 - [c104]Xinxin Fan, Guang Gong:
Securing ZigBee smart energy profile 1.x with OpenECC library. SEGS@CCS 2013: 17-22 - [c103]Xinxin Fan, Nusa Zidaric
, Mark D. Aagaard, Guang Gong:
Efficient hardware implementation of the stream cipher WG-16 with composite field arithmetic. TrustED@CCS 2013: 21-34 - [c102]Kalikinkar Mandal, Guang Gong, Xinxin Fan, Mark D. Aagaard:
On selection of optimal parameters for the WG stream cipher family. CWIT 2013: 17-21 - [c101]Mark D. Aagaard, Guang Gong, Rajesh K. Mota:
Hardware implementations of the WG-5 cipher for passive RFID tags. HOST 2013: 29-34 - [c100]Guang Gong, Fei Huo, Yang Yang:
Large zero correlation zone of Golay pairs and QAM Golay pairs. ISIT 2013: 3135-3139 - [c99]Guang Gong:
On large zero auto/cross correlation zone of Golay/QAM Golay sequences and their applications and related correlation properties. IWSDA 2013: 2 - [c98]Benny Y. Zhang, Guang Gong:
Randomness properties of stream ciphers for wireless communications. IWSDA 2013: 107-109 - [c97]Xinxin Fan, Kalikinkar Mandal, Guang Gong:
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices. QSHINE 2013: 617-632 - [c96]Kalikinkar Mandal, Guang Gong:
Filtering Nonlinear Feedback Shift Registers Using Welch-Gong Transformations for Securing RFID Applications. QSHINE 2013: 643-657 - [c95]Fei Huo, Chouchang Yang, Guang Gong, Radha Poovendran
:
A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power. RFIDSec Asia 2013: 57-68 - [c94]Xinxin Fan, Guang Gong:
Securing NFC with Elliptic Curve Cryptography - Challenges and Solutions. RFIDSec Asia 2013: 97-106 - [c93]Teng Wu, Guang Gong:
The weakness of integrity protection for LTE. WISEC 2013: 79-88 - [p2]Guang Gong, Kishan Chand Gupta:
Stream and block ciphers. Handbook of Finite Fields 2013: 750-763 - [p1]Guang Gong:
Character Sums and Polyphase Sequence Families with Low Correlation, Discrete Fourier Transform (DFT), and Ambiguity. Finite Fields and Their Applications 2013: 1-42 - [i18]Honggang Hu, Shuai Shao, Guang Gong, Tor Helleseth:
The Proof of Lin's Conjecture via the Decimation-Hadamard Transform. CoRR abs/1307.0885 (2013) - [i17]Longjiang Qu, Yin Tan, Chao Li, Guang Gong:
More Constructions of Differentially 4-uniform Permutations on $\gf_{2^{2k}}$. CoRR abs/1309.7423 (2013) - 2012
- [j64]Xinxin Fan, Guang Gong:
Accelerating signature-based broadcast authentication for wireless sensor networks. Ad Hoc Networks 10(4): 723-736 (2012) - [j63]Zhijun Li, Guang Gong:
HBC entity authentication for low-cost pervasive devices. IET Inf. Secur. 6(3): 212-218 (2012) - [j62]Guang Gong
, Tor Helleseth, Honggang Hu:
A Three-Valued Walsh Transform From Decimations of Helleseth-Gong Sequences. IEEE Trans. Inf. Theory 58(2): 1158-1162 (2012) - [j61]Guang Gong, Tor Helleseth, Honggang Hu, Alexander Kholosha:
On the Dual of Certain Ternary Weakly Regular Bent Functions. IEEE Trans. Inf. Theory 58(4): 2237-2243 (2012) - [c92]Xinxin Fan, Guang Gong:
LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks. ADHOCNETS 2012: 180-195 - [c91]Qi Chai, Guang Gong:
Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. ICC 2012: 917-922 - [c90]Guang Gong, Fei Huo, Yang Yang:
Large zero periodic autocorrelation zone of Golay sequences. ISIT 2012: 1019-1023 - [c89]Yang Yang, Fei Huo, Guang Gong:
Large zero odd periodic autocorrelation zone of Golay sequences and QAM Golay sequences. ISIT 2012: 1024-1028 - [c88]Min Zeng, Yuan Luo, Guang Gong:
Rotating-table game and construction of periodic sequences with lightweight calculation. ISIT 2012: 1221-1225 - [c87]Kalikinkar Mandal, Xinxin Fan, Guang Gong:
Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 Tags. RFIDSec Asia 2012: 73-84 - [c86]Kalikinkar Mandal, Guang Gong:
Cryptographically Strong de Bruijn Sequences with Large Periods. Selected Areas in Cryptography 2012: 104-118 - [c85]Yang Yang, Guang Gong, Xiaohu Tang:
Odd Perfect Sequences and Sets of Spreading Sequences with Zero or Low Odd Periodic Correlation Zone. SETA 2012: 1-12 - [c84]Guang Gong, Tor Helleseth, Honggang Hu, Chunlei Li:
New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences. SETA 2012: 327-337 - [c83]Qi Chai, Guang Gong, Daniel W. Engels:
How to develop clairaudience - active eavesdropping in passive RFID systems. WOWMOM 2012: 1-6 - [i16]Qi Chai, Guang Gong:
A Cryptanalysis of HummingBird-2: The Differential Sequence Analysis. IACR Cryptol. ePrint Arch. 2012: 233 (2012) - [i15]Guang Gong, Mark D. Aagaard, Xinxin Fan:
Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations. IACR Cryptol. ePrint Arch. 2012: 681 (2012) - [i14]Teng Wu, Guang Gong:
The Weakness of Integrity Protection for LTE. IACR Cryptol. ePrint Arch. 2012: 690 (2012) - 2011
- [j60]Zhijun Li, Guang Gong:
Computationally efficient mutual entity authentication in wireless sensor networks. Ad Hoc Networks 9(2): 204-215 (2011) - [j59]Honggang Hu, Guang Gong:
Periods on Two Kinds of nonlinear Feedback Shift Registers with Time Varying Feedback Functions. Int. J. Found. Comput. Sci. 22(6): 1317-1329 (2011) - [j58]Qi Chai, Guang Gong:
On the (in)security of two Joint Encryption and Error Correction schemes. Int. J. Secur. Networks 6(4): 191-200 (2011) - [j57]Kishan Chand Gupta, Yassir Nawaz, Guang Gong:
Upper bound for algebraic immunity on a subclass of Maiorana McFarland class of bent functions. Inf. Process. Lett. 111(5): 247-249 (2011) - [j56]Nam Yul Yu
, Guang Gong:
Near-Complementary Sequences With Low PMEPR for Peak Power Control in Multicarrier Communications. IEEE Trans. Inf. Theory 57(1): 505-513 (2011) - [j55]Zongduo Dai, Guang Gong, Hong-Yeop Song, Dingfeng Ye:
Trace Representation and Linear Complexity of Binary eth Power Residue Sequences of Period p. IEEE Trans. Inf. Theory 57(3): 1530-1547 (2011) - [j54]Zilong Wang, Guang Gong:
New Sequences Design From Weil Representation With Low Two-Dimensional Correlation in Both Time and Phase Shifts. IEEE Trans. Inf. Theory 57(7): 4600-4611 (2011) - [j53]Guang Gong, Sondre Rønjom, Tor Helleseth, Honggang Hu:
Fast Discrete Fourier Spectra Attacks on Stream Ciphers. IEEE Trans. Inf. Theory 57(8): 5555-5565 (2011) - [c82]Qi Chai, Guang Gong:
Differential Cryptanalysis of Two Joint Encryption and Error Correction Schemes. GLOBECOM 2011: 1-6 - [c81]Xinxin Fan, Guang Gong, Daniel W. Engels, Eric M. Smith:
A lightweight privacy-preserving mutual authentication protocol for RFID systems. GLOBECOM Workshops 2011: 1083-1087 - [c80]Yang Yang, Xiaohu Tang, Guang Gong, Zhengchun Zhou
:
On the optimality of ZCZ sequence sets. IWSDA 2011: 36-39 - [c79]Qi Chai, Guang Gong:
BUPLE: Securing Passive RFID Communication through Physical Layer Enhancements. RFIDSec 2011: 127-146 - [c78]Xinxin Fan, Guang Gong, Honggang Hu:
Remedying the Hummingbird Cryptographic Algorithm. TrustCom 2011: 772-778 - [c77]Xinxin Fan, Guang Gong:
On the Security of Hummingbird-2 against Side Channel Cube Attacks. WEWoRC 2011: 18-29 - [e4]Alex Biryukov
, Guang Gong, Douglas R. Stinson:
Selected Areas in Cryptography - 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6544, Springer 2011, ISBN 978-3-642-19573-0 [contents] - [i13]Guang Gong, Fei Huo, Yang Yang:
Large Zero Autocorrelation Zone of Golay Sequences and $4^q$-QAM Golay Complementary Sequences. CoRR abs/1106.4728 (2011) - [i12]Qi Chai, Xinxin Fan, Guang Gong:
An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2. IACR Cryptol. ePrint Arch. 2011: 247 (2011) - [i11]Bo Zhu, Guang Gong:
Guess-then-Meet-in-the-Middle Attacks on the KTANTAN Family of Block Ciphers. IACR Cryptol. ePrint Arch. 2011: 619 (2011) - 2010
- [j52]Hong Wen, Pin-Han Ho, Guang Gong:
A framework of physical layer technique assisted authentication for vehicular communication networks. Sci. China Inf. Sci. 53(10): 1996-2004 (2010) - [j51]Hong Wen, Pin-Han Ho, Qi Chai, Guang Gong:
Physical layer assisted authentication for distributed ad hoc wireless sensor networks. IET Inf. Secur. 4(4): 390-396 (2010) - [j50]Xiaohu Tang, Guang Gong:
New constructions of binary sequences with optimal autocorrelation value/magnitude. IEEE Trans. Inf. Theory 56(3): 1278-1286 (2010) - [j49]Honggang Hu, Guang Gong:
New sets of zero or low correlation zone sequences via interleaving techniques. IEEE Trans. Inf. Theory 56(4): 1702-1713 (2010) - [j48]Nam Yul Yu
, Guang Gong:
New construction of M -ary sequence families with low correlation from the structure of Sidelnikov sequences. IEEE Trans. Inf. Theory 56(8): 4061-4070 (2010) - [j47]Nam Yul Yu
, Guang Gong:
Multiplicative Characters, the Weil Bound, and Polyphase Sequence Families With Low Correlation. IEEE Trans. Inf. Theory 56(12): 6376-6387 (2010) - [c76]Zhijun Li, Guang Gong:
Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks. ADHOC-NOW 2010: 149-162 - [c75]Xinxin Fan, Guang Gong:
Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks. ADHOCNETS 2010: 328-343 - [c74]Daniel W. Engels, Xinxin Fan, Guang Gong, Honggang Hu, Eric M. Smith:
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices. Financial Cryptography Workshops 2010: 3-18 - [c73]Yiyuan Luo, Qi Chai, Guang Gong, Xuejia Lai:
A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication. GLOBECOM 2010: 1-6 - [c72]Hong Wen, Guang Gong, Pin-Han Ho:
MIMO Cross-Layer Secure Communication Architecture Based on STBC. GLOBECOM 2010: 1-5 - [c71]Xinxin Fan, Guang Gong, Ken Lauffenburger, Troy Hicks:
FPGA Implementations of the Hummingbird Cryptographic Algorithm. HOST 2010: 48-51 - [c70]Nam Yul Yu
, Guang Gong:
On the structure of M-ary Sidelnikov sequences of period p2m - 1. ISIT 2010: 1233-1237 - [c69]Nam Yul Yu
, Guang Gong:
Generalized constructions of polyphase sequence families using shift and addition of multiplicative character sequences. ISIT 2010: 1258-1262 - [c68]Honggang Hu, Guang Gong:
A new class of ternary and quaternary sequences with two-level autocorrelation. ISIT 2010: 1292-1296 - [c67]Krystal Guo
, Guang Gong:
New Constructions of Complete Non-cyclic Hadamard Matrices, Related Function Families and LCZ Sequences. SETA 2010: 259-269 - [c66]Anuchart Tassanaviboon, Guang Gong:
A framework toward a self-organizing and self-healing certificate authority group in a Content Addressable Network. WiMob 2010: 614-621 - [e3]Guang Gong, Kishan Chand Gupta:
Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings. Lecture Notes in Computer Science 6498, Springer 2010, ISBN 978-3-642-17400-1 [contents] - [i10]Zilong Wang, Guang Gong, Rongquan Feng:
A Generalized Construction of OFDM M-QAM Sequences With Low Peak-to-Average Power Ratio. CoRR abs/1010.2830 (2010)
2000 – 2009
- 2009
- [j46]Zilong Wang, Guang Gong, Rongquan Feng:
A generalized construction of OFDM M-QAM sequences with low peak-to-average power ratio. Adv. Math. Commun. 3(4): 421-428 (2009) - [j45]Zongduo Dai, Guang Gong, Hong-Yeop Song:
A trace representation of binary Jacobi sequences. Discret. Math. 309(6): 1517-1527 (2009) - [j44]Khoongming Khoo, Guanhan Chew, Guang Gong, Hian-Kiat Lee:
Time-Memory-Data Trade-Off Attack on Stream Ciphers Based on Maiorana-McFarland Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 11-21 (2009) - [j43]Hong Wen, Guang Gong, Pin-Han Ho:
Build-in wiretap channel I with feedback and LDPC codes. J. Commun. Networks 11(6): 538-543 (2009) - [j42]Yassir Nawaz, Kishan Chand Gupta, Guang Gong:
Algebraic immunity of S-boxes based on power mappings: analysis and construction. IEEE Trans. Inf. Theory 55(9): 4263-4273 (2009) - [j41]Honggang Hu, Guang Gong, Dengguo Feng:
New results on periodic sequences with large k-error linear complexity. IEEE Trans. Inf. Theory 55(10): 4687-4694 (2009) - [c65]Zhijun Li, Guang Gong:
Computationally Efficient Mutual Entity Authentication in Wireless Sensor Networks. ADHOCNETS 2009: 192-207 - [c64]Zhijun Li, Guang Gong:
DHT-Based Detection of Node Clone in Wireless Sensor Networks. ADHOCNETS 2009: 240-255 - [c63]Hong Wen, Guang Gong:
A cross-layer approach to enhance the security of wireless networks based on MIMO. CISS 2009: 935-939 - [c62]Nam Yul Yu
, Guang Gong:
Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences. IWCC 2009: 248-258 - [c61]Hong Wen, Pin-Han Ho, Guang Gong:
A Novel Framework for Message Authentication in Vehicular Communication Networks. GLOBECOM 2009: 1-6 - [c60]Nam Yul Yu, Guang Gong:
Near-Complementary Sequences of Various Lengths and Low PMEPR for Multicarrier Communications. GLOBECOM 2009: 1-6 - [c59]Xinxin Fan, Honggang Hu, Guang Gong, Eric M. Smith, Daniel W. Engels:
Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers. ICITST 2009: 1-7 - [c58]Guang Gong, Honggang Hu:
New sequence families with zero or low correlation zone via interleaving techniques. ISIT 2009: 124-128 - [c57]Zhijun Li, Guang Gong:
Randomly Directed Exploration: An Efficient Node Clone Detection Protocol in Wireless Sensor Networks. MASS 2009: 1030-1035 - [i9]Zilong Wang, Guang Gong:
A Note on the Diagonalization of the Discrete Fourier Transform. CoRR abs/0902.1267 (2009) - [i8]Zhijun Li, Guang Gong, Zhiguang Qin:
Secure and Efficient HB-CM Entity Authentication Protocol. IACR Cryptol. ePrint Arch. 2009: 444 (2009) - [i7]Yiyuan Luo, Zhongming Wu, Xuejia Lai, Guang Gong:
A Unified Method for Finding Impossible Differentials of Block Cipher Structures. IACR Cryptol. ePrint Arch. 2009: 627 (2009) - 2008
- [j40]Khoongming Khoo, Chu-Wee Lim, Guang Gong:
Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity. Appl. Algebra Eng. Commun. Comput. 19(4): 323-338 (2008) - [j39]Yassir Nawaz, Guang Gong:
WG: A family of stream ciphers with designed randomness properties. Inf. Sci. 178(7): 1903-1916 (2008) - [j38]Pascale Charpin, Guang Gong:
Hyperbent Functions, Kloosterman Sums, and Dickson Polynomials. IEEE Trans. Inf. Theory 54(9): 4230-4238 (2008) - [j37]Zhengchun Zhou
, Xiaohu Tang, Guang Gong:
A New Class of Sequences With Zero or Low Correlation Zone Based on Interleaving Technique. IEEE Trans. Inf. Theory 54(9): 4267-4273 (2008) - [j36]Nam Yul Yu
, Guang Gong:
New Binary Sequences With Optimal Autocorrelation Magnitude. IEEE Trans. Inf. Theory 54(10): 4771-4779 (2008) - [c56]Pascale Charpin, Guang Gong:
Hyperbent functions, Kloosterman sums and Dickson polynomials. ISIT 2008: 1758-1762 - [c55]Honggang Hu, Guang Gong, Dengguo Feng:
New results on periodic sequences with large k-error linear complexity. ISIT 2008: 2409-2413 - [c54]Xinxin Fan, Guang Gong:
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks. LCN 2008: 958-965 - [c53]Xinxin Fan, Guang Gong, David Jao
:
Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms. Pairing 2008: 243-264 - [c52]Xinxin Fan, Guang Gong, David Jao
:
Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates. Selected Areas in Cryptography 2008: 18-34 - [c51]Honggang Hu, Guang Gong:
A Study on the Pseudorandom Properties of Sequences Generated Via the Additive Order. SETA 2008: 51-59 - [c50]Guang Gong:
Sequences, DFT and Resistance against Fast Algebraic Attacks. SETA 2008: 197-218 - [i6]Zilong Wang, Guang Gong:
New Sequences Design from Weil Representation with Low Two-Dimensional Correlation in Both Time and Phase Shifts. CoRR abs/0812.4487 (2008) - 2007
- [j35]Khoongming Khoo, Guang Gong:
New Construction for Balanced Boolean Functions with Very High Nonlinearity. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 29-35 (2007) - [j34]Xinxin Fan, Thomas J. Wollinger, Guang Gong:
Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems over binary fields. IET Inf. Secur. 1(2): 65-81 (2007) - [j33]Katrin Hoeper, Guang Gong:
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks. Int. J. Secur. Networks 2(3/4): 239-250 (2007) - [j32]Guang Gong, Solomon W. Golomb, Hong-Yeop Song:
A Note on Low-Correlation Zone Signal Sets. IEEE Trans. Inf. Theory 53(7): 2575-2581 (2007) - [j31]Solomon W. Golomb, Guang Gong:
The Status of Costas Arrays. IEEE Trans. Inf. Theory 53(11): 4260-4265 (2007) - [c49]Sondre Rønjom, Guang Gong, Tor Helleseth:
A Survey of Recent Attacks on the Filter Generator. AAECC 2007: 7-17 - [c48]Guang Gong:
Constructions of Multiple Shift-Distinct Signal Sets with Low Correlation. ISIT 2007: 2306-2310 - [c47]Yassir Nawaz, Guang Gong:
Distributing Fixed Time Slices in Heterogeneous Networks of Workstations (NOWs). ISPA 2007: 612-621 - [c46]Guang Gong:
Correlation of Multiple Bent Function Signal Sets. ITW 2007: 1-5 - [c45]Solomon W. Golomb, Guang Gong:
Actions of the Unitary Group on Irreducible/Primitive Polynomials and Their Applications to Randomness of Sequences. ITW 2007: 5- - [c44]Xinxin Fan, Guang Gong:
Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations. Selected Areas in Cryptography 2007: 155-172 - [c43]Nam Yul Yu
, Guang Gong:
The Perfect Binary Sequence of Period 4 for Low Periodic and Aperiodic Autocorrelations. SSC 2007: 37-49 - [c42]Guang Gong:
Randomness and Representation of Span n Sequences. SSC 2007: 192-203 - [c41]Sondre Rønjom, Guang Gong, Tor Helleseth:
On Attacks on Filtering Generators Using Linear Subspace Structures. SSC 2007: 204-217 - [e2]Solomon W. Golomb, Guang Gong, Tor Helleseth, Hong-Yeop Song:
Sequences, Subsequences, and Consequences, International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers. Lecture Notes in Computer Science 4893, Springer 2007, ISBN 978-3-540-77403-7 [contents] - [i5]Khoongming Khoo, Guanhan Chew, Guang Gong, Hian-Kiat Lee:
Time-Memory-Data Trade-off Attack on Stream Ciphers based on Maiorana-McFarland Functions. IACR Cryptol. ePrint Arch. 2007: 242 (2007) - 2006
- [j30]Guang Gong, Hong-Yeop Song:
Two-tuple balance of non-binary sequences with ideal two-level autocorrelation. Discret. Appl. Math. 154(18): 2590-2598 (2006) - [j29]Khoongming Khoo, Guang Gong, Douglas R. Stinson:
A New Characterization of Semi-bent and Bent Functions on Finite Fields*. Des. Codes Cryptogr. 38(2): 279-295 (2006) - [j28]Amr M. Youssef, Stafford E. Tavares, Guang Gong:
On some probabilistic approximations for AES-like s-boxes. Discret. Math. 306(16): 2016-2020 (2006) - [j27]Amr M. Youssef, Guang Gong:
On linear complexity of sequences over GF(2n). Theor. Comput. Sci. 352(1-3): 288-292 (2006) - [j26]Nam Yul Yu
, Guang Gong:
A new binary sequence family with low correlation and large size. IEEE Trans. Inf. Theory 52(4): 1624-1636 (2006) - [j25]Nam Yul Yu
, Guang Gong:
Constructions of Quadratic Bent Functions in Polynomial Forms. IEEE Trans. Inf. Theory 52(7): 3291-3299 (2006) - [c40]Khoongming Khoo, Guang Gong, Hian-Kiat Lee:
The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions. ACNS 2006: 194-209 - [c39]Katrin Hoeper, Guang Gong:
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks. ADHOC-NOW 2006: 224-237 - [c38]Guang Gong, Solomon W. Golomb, Hong-Yeop Song:
A Note on Low Correlation Zone Signal Sets. CISS 2006: 1516-1521 - [c37]Shaoquan Jiang, Guang Gong:
A Round and Communication Efficient Secure Ranking Protocol. CT-RSA 2006: 350-364 - [c36]Yassir Nawaz, Guang Gong, Kishan Chand Gupta:
Upper Bounds on Algebraic Immunity of Boolean Power Functions. FSE 2006: 375-389 - [c35]Young-Joon Kim, Hong-Yeop Song, Guang Gong, Habong Chung:
Crosscorrelation of q-ary Power Residue Sequences of Period p. ISIT 2006: 311-315 - [c34]Katrin Hoeper, Guang Gong:
Integrated DH-like Key Exchange Protocols from LUC, GH and XTR. ISIT 2006: 922-926 - [c33]Nam Yul Yu
, Guang Gong:
Crosscorrelation Properties of Binary Sequences with Ideal Two-Level Autocorrelation. SETA 2006: 104-118 - [c32]Kenneth J. Giuliani, Guang Gong:
A New Algorithm to Compute Remote Terms in Special Types of Characteristic Sequences. SETA 2006: 237-247 - [e1]Guang Gong, Tor Helleseth, Hong-Yeop Song, Kyeongcheol Yang:
Sequences and Their Applications - SETA 2006, 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings. Lecture Notes in Computer Science 4086, Springer 2006, ISBN 3-540-44523-4 [contents] - [i4]Yassir Nawaz, Kishan Chand Gupta, Guang Gong:
Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and Construction. IACR Cryptol. ePrint Arch. 2006: 322 (2006) - 2005
- [j24]Guang Gong, Shaoquan Jiang:
The editing generator and its cryptanalysis. Int. J. Wirel. Mob. Comput. 1(1): 46-52 (2005) - [c31]Guang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz:
Towards a General RC4-Like Keystream Generator. CISC 2005: 162-174 - [c30]Shaoquan Jiang, Guang Gong:
Efficient Authenticators with Application to Key Exchange. ICISC 2005: 81-91 - [c29]Khoongming Khoo, Guat-Ee Tan, Hian-Kiat Lee, Guang Gong:
Comparison of boolean function design. ISIT 2005: 1111-1115 - [c28]Fung-Ling Chiu, Nam Yul Yu
, Guang Gong:
Maximum correlation of binary signals over fading channels. ISIT 2005: 1913-1917 - [c27]Katrin Hoeper, Guang Gong:
Short Paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc Networks. SecureComm 2005: 403-405 - [c26]Nam Yul Yu
, Guang Gong:
Realizations from Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation. WCC 2005: 371-385 - [i3]Yassir Nawaz, Kishan Chand Gupta, Guang Gong:
A 32-bit RC4-like Keystream Generator. IACR Cryptol. ePrint Arch. 2005: 175 (2005) - 2004
- [j23]Jitendra K. Tugnait, Hui Liu, Guang Gong, Tongtong Li:
Editorial. EURASIP J. Wirel. Commun. Netw. 2004(1): 1-3 (2004) - [j22]Zongduo Dai, Shaoquan Jiang, Kyoki Imamura, Guang Gong:
Asymptotic Behavior of Normalized Linear Complexity of Ultimately Nonperiodic Binary Sequences. IEEE Trans. Inf. Theory 50(11): 2911-2915 (2004) - [c25]Shaoquan Jiang, Guang Gong:
Multi-service Oriented Broadcast Encryption. ACISP 2004: 1-11 - [c24]Kenneth J. Giuliani, Guang Gong:
Efficient key agreement and signature schemes using compact representations in GF(p10). ISIT 2004: 13 - [c23]Zongduo Dai, Shaoquan Jiang, Kyoki Imamura, Guang Gong:
Asymptotic behavior of normalized linear complexity of ultimately non-periodic binary sequences. ISIT 2004: 123 - [c22]Shaoquan Jiang, Guang Gong:
Password Based Key Exchange with Mutual Authentication. Selected Areas in Cryptography 2004: 267-279 - [c21]Kenneth J. Giuliani, Guang Gong:
New LFSR-Based Cryptosystems and the Trace Discrete Log Problem (Trace-DLP). SETA 2004: 298-312 - [i2]Shaoquan Jiang, Guang Gong:
Password Based Key Exchange with Mutual Authentication. IACR Cryptol. ePrint Arch. 2004: 196 (2004) - 2003
- [c20]Khoongming Khoo, Guang Gong:
New Constructions for Resilient and Highly Nonlinear Boolean Functions. ACISP 2003: 498-509 - [c19]Guang Gong, Khoongming Khoo:
Additive Autocorrelation of Resilient Boolean Functions. Selected Areas in Cryptography 2003: 275-290 - [i1]Shaoquan Jiang, Guang Gong:
Hybrid Broadcast Encryption and Security Analysis. IACR Cryptol. ePrint Arch. 2003: 241 (2003) - 2002
- [j21]Shaoquan Jiang, Zongduo Dai, Guang Gong:
On interleaved sequences over finite fields. Discret. Math. 252(1-3): 161-178 (2002) - [j20]Guang Gong, Solomon W. Golomb:
The decimation-Hadamard transform of two-level autocorrelation sequences. IEEE Trans. Inf. Theory 48(4): 853-865 (2002) - [j19]Guang Gong
, Amr M. Youssef:
Cryptographic properties of the Welch-Gong transformation sequence generators. IEEE Trans. Inf. Theory 48(11): 2837-2846 (2002) - [j18]Guang Gong:
New designs for signal sets with low cross correlation, balance property, and largelinear span: GF(p) case. IEEE Trans. Inf. Theory 48(11): 2847-2867 (2002) - [j17]Tor Helleseth, Guang Gong:
New nonbinary sequences with ideal two-level autocorrelation. IEEE Trans. Inf. Theory 48(11): 2868-2872 (2002) - [c18]Charles C. Y. Lam, Guang Gong, Scott A. Vanstone:
Message Authentication Codes with Error Correcting Capabilities. ICICS 2002: 354-366 - 2001
- [j16]Michael Ludkovski
, Guang Gong:
New Families of Ideal 2-Level Autocorrelation Ternary Sequences From Second Order DHT. Electron. Notes Discret. Math. 6: 375-384 (2001) - [j15]Thomas W. Cusick, Guang Gong:
A conjecture on binary sequences with the "Trinomial property". IEEE Trans. Inf. Theory 47(1): 426-427 (2001) - [c17]Amr M. Youssef, Guang Gong:
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000. ACISP 2001: 15-20 - [c16]Amr M. Youssef, Guang Gong:
Hyper-bent Functions. EUROCRYPT 2001: 406-419 - [c15]Kenneth J. Giuliani, Guang Gong:
Generating Large Instances of the Gong-Harn Cryptosystem. IMACC 2001: 317-328 - [c14]Amr M. Youssef, Guang Gong:
Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem. INDOCRYPT 2001: 214-222 - [c13]Amr M. Youssef, Guang Gong:
Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case. Selected Areas in Cryptography 2001: 49-59 - [c12]Guang Gong, Lein Harn, Huapeng Wu:
The GH Public-Key Cryptosystem. Selected Areas in Cryptography 2001: 284-300 - [c11]Zongduo Dai, Junhui Yang, Guang Gong, Ping Wang:
On the Linear Complexity of Generalised Legendre Sequence. SETA 2001: 145-153 - [c10]Solomon W. Golomb, Guang Gong:
Hyper-Cyclotomic Algebra. SETA 2001: 154-165 - [c9]Guang Gong, Charles C. Y. Lam:
Linear Recursive Sequences over Elliptic Curves. SETA 2001: 182-196 - 2000
- [j14]Solomon W. Golomb, Guang Gong, Zong-Duo Dai:
Cyclic inequivalence of cascaded GMW-sequences. Discret. Math. 219(1-3): 279-285 (2000) - [j13]Guang Gong
, Zong-Duo Dai, Solomon W. Golomb:
Enumeration and criteria for cyclically shift-distinct GMW sequences. IEEE Trans. Inf. Theory 46(2): 474-484 (2000) - [j12]Anchung Chang, Peter Gaal, Solomon W. Golomb, Guang Gong, Tor Helleseth, P. Vijay Kumar:
On a conjectured ideal autocorrelation sequence, a related triple-error correcting cyclic code. IEEE Trans. Inf. Theory 46(2): 680-687 (2000) - [c8]Amr M. Youssef, Guang Gong:
On the Interpolation Attacks on Block Ciphers. FSE 2000: 109-120 - [c7]Guang Gong, Amr M. Youssef:
On Welch-Gong Transformation Sequence Generators. Selected Areas in Cryptography 2000: 217-232
1990 – 1999
- 1999
- [j11]Zongduo Dai, Solomon W. Golomb, Guang Gong:
Generating all linear orthomorphisms without repetition. Discret. Math. 205(1-3): 47-55 (1999) - [j10]Guang Gong, Solomon W. Golomb:
Binary Sequences with Two-Level Autocorrelation. IEEE Trans. Inf. Theory 45(2): 692-693 (1999) - [j9]Solomon W. Golomb, Guang Gong:
Periodic Binary Sequences with the "Trinomial Property". IEEE Trans. Inf. Theory 45(4): 1276-1279 (1999) - [j8]Guang Gong, Solomon W. Golomb:
Hadamard transforms of three-term sequences. IEEE Trans. Inf. Theory 45(6): 2059-2060 (1999) - [j7]Guang Gong, Solomon W. Golomb:
Transform domain analysis of DES. IEEE Trans. Inf. Theory 45(6): 2065-2073 (1999) - [j6]Guang Gong, Lein Harn:
Public-key cryptosystems based on cubic finite field extensions. IEEE Trans. Inf. Theory 45(7): 2601-2605 (1999) - [c6]Guang Gong, Thomas A. Berson, Douglas R. Stinson:
Elliptic Curve Pseudorandom Sequence Generators. Selected Areas in Cryptography 1999: 34-48 - 1998
- [j5]Jong-Seon No, Solomon W. Golomb, Guang Gong, Hwan-Keun Lee, Peter Gaal:
Binary Pseudorandom Sequences of Period 2n-1 with Ideal Autocorrelation. IEEE Trans. Inf. Theory 44(2): 814-817 (1998) - [c5]Anchung Chang, Solomon W. Golomb, Guang Gong, P. Vijay Kumar:
On Ideal Autocorrelation Sequences Arising from Hyperovals. SETA 1998: 17-38 - [c4]Shaoquan Jiang, Zongduo Dai, Guang Gong:
Notes on q-ary Interleaved Sequences. SETA 1998: 273-283 - 1997
- [j4]Guang Gong:
A new class of nonlinear PN sequences over GF(qn). IEEE Trans. Inf. Theory 43(3): 1007-1012 (1997) - 1996
- [j3]Guang Gong:
Q-ary cascaded GMW sequences. IEEE Trans. Inf. Theory 42(1): 263-267 (1996) - 1995
- [j2]Guang Gong
:
Theory and applications of q-ary interleaved sequences. IEEE Trans. Inf. Theory 41(2): 400-411 (1995) - 1994
- [j1]Guang Gong, Guo Zheng Xiao:
Synthesis and uniqueness of m-sequences over GF(qn) as n-phase sequences over GF(q). IEEE Trans. Commun. 42(8): 2501-2505 (1994) - [c3]Xingong Chang, Zong-Duo Dai, Guang Gong:
Some Cryptographic Properties of Exponential Functions. ASIACRYPT 1994: 415-418 - 1993
- [c2]Guang Gong:
A New Class of Sequences: Mapping Sequences. AAECC 1993: 147-161 - 1990
- [c1]Guang Gong:
Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key. AUSCRYPT 1990: 32-36
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-18 21:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint