Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

* | 2009 | |
---|---|---|

78 | EE | Nam Yul Yu, Guang Gong: Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences. IWCC 2009: 248-258 |

77 | EE | Zilong Wang, Guang Gong: A Note on the Diagonalization of the Discrete Fourier Transform CoRR abs/0902.1267: (2009) |

76 | EE | Khoongming Khoo, Guanhan Chew, Guang Gong, Hian-Kiat Lee: Time-Memory-Data Trade-Off Attack on Stream Ciphers Based on Maiorana-McFarland Functions. IEICE Transactions 92-A(1): 11-21 (2009) |

2008 | ||

75 | EE | Xinxin Fan, Guang Gong: Key revocation based on Dirichlet multinomial model for mobile ad hoc networks. LCN 2008: 958-965 |

74 | EE | Xinxin Fan, Guang Gong, David Jao: Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms. Pairing 2008: 243-264 |

73 | EE | Guang Gong: Sequences, DFT and Resistance against Fast Algebraic Attacks. SETA 2008: 197-218 |

72 | EE | Honggang Hu, Guang Gong: A Study on the Pseudorandom Properties of Sequences Generated Via the Additive Order. SETA 2008: 51-59 |

71 | EE | Khoongming Khoo, Chu-Wee Lim, Guang Gong: Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity. Appl. Algebra Eng. Commun. Comput. 19(4): 323-338 (2008) |

70 | EE | Zilong Wang, Guang Gong: New Sequences Design from Weil Representation with Low Two-Dimensional Correlation in Both Time and Phase Shifts CoRR abs/0812.4487: (2008) |

69 | EE | Nam Yul Yu, Guang Gong: New Binary Sequences With Optimal Autocorrelation Magnitude. IEEE Transactions on Information Theory 54(10): 4771-4779 (2008) |

68 | EE | Pascale Charpin, Guang Gong: Hyperbent Functions, Kloosterman Sums, and Dickson Polynomials. IEEE Transactions on Information Theory 54(9): 4230-4238 (2008) |

67 | EE | Zhengchun Zhou, Xiaohu Tang, Guang Gong: A New Class of Sequences With Zero or Low Correlation Zone Based on Interleaving Technique. IEEE Transactions on Information Theory 54(9): 4267-4273 (2008) |

66 | EE | Yassir Nawaz, Guang Gong: WG: A family of stream ciphers with designed randomness properties. Inf. Sci. 178(7): 1903-1916 (2008) |

2007 | ||

65 | Solomon W. Golomb, Guang Gong, Tor Helleseth, Hong-Yeop Song: Sequences, Subsequences, and Consequences, International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers Springer 2007 | |

64 | EE | Sondre Rønjom, Guang Gong, Tor Helleseth: A Survey of Recent Attacks on the Filter Generator. AAECC 2007: 7-17 |

63 | EE | Yassir Nawaz, Guang Gong: Distributing Fixed Time Slices in Heterogeneous Networks of Workstations (NOWs). ISPA 2007: 612-621 |

62 | EE | Guang Gong:
Randomness and Representation of Span n Sequences.
SSC 2007: 192-203 |

61 | EE | Sondre Rønjom, Guang Gong, Tor Helleseth: On Attacks on Filtering Generators Using Linear Subspace Structures. SSC 2007: 204-217 |

60 | EE | Nam Yul Yu, Guang Gong: The Perfect Binary Sequence of Period 4 for Low Periodic and Aperiodic Autocorrelations. SSC 2007: 37-49 |

59 | EE | Xinxin Fan, Guang Gong: Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations. Selected Areas in Cryptography 2007: 155-172 |

58 | EE | Solomon W. Golomb, Guang Gong: The Status of Costas Arrays. IEEE Transactions on Information Theory 53(11): 4260-4265 (2007) |

57 | EE | Guang Gong, Solomon W. Golomb, Hong-Yeop Song: A Note on Low-Correlation Zone Signal Sets. IEEE Transactions on Information Theory 53(7): 2575-2581 (2007) |

56 | EE | Khoongming Khoo, Guang Gong: New Construction for Balanced Boolean Functions with Very High Nonlinearity. IEICE Transactions 90-A(1): 29-35 (2007) |

55 | EE | Katrin Hoeper, Guang Gong: Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks. IJSN 2(3/4): 239-250 (2007) |

2006 | ||

54 | Guang Gong, Tor Helleseth, Hong-Yeop Song, Kyeongcheol Yang: Sequences and Their Applications - SETA 2006, 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings Springer 2006 | |

53 | EE | Khoongming Khoo, Guang Gong, Hian-Kiat Lee: The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions. ACNS 2006: 194-209 |

52 | EE | Katrin Hoeper, Guang Gong: Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks. ADHOC-NOW 2006: 224-237 |

51 | EE | Shaoquan Jiang, Guang Gong: A Round and Communication Efficient Secure Ranking Protocol. CT-RSA 2006: 350-364 |

50 | EE | Yassir Nawaz, Guang Gong, Kishan Chand Gupta: Upper Bounds on Algebraic Immunity of Boolean Power Functions. FSE 2006: 375-389 |

49 | EE | Nam Yul Yu, Guang Gong: Crosscorrelation Properties of Binary Sequences with Ideal Two-Level Autocorrelation. SETA 2006: 104-118 |

48 | EE | Kenneth J. Giuliani, Guang Gong: A New Algorithm to Compute Remote Terms in Special Types of Characteristic Sequences. SETA 2006: 237-247 |

47 | EE | Khoongming Khoo, Guang Gong, Douglas R. Stinson: A New Characterization of Semi-bent and Bent Functions on Finite Fields*. Des. Codes Cryptography 38(2): 279-295 (2006) |

46 | EE | Guang Gong, Hong-Yeop Song: Two-tuple balance of non-binary sequences with ideal two-level autocorrelation. Discrete Applied Mathematics 154(18): 2590-2598 (2006) |

45 | EE | Amr M. Youssef, Stafford E. Tavares, Guang Gong: On some probabilistic approximations for AES-like s-boxes. Discrete Mathematics 306(16): 2016-2020 (2006) |

44 | EE | Nam Yul Yu, Guang Gong: A new binary sequence family with low correlation and large size. IEEE Transactions on Information Theory 52(4): 1624-1636 (2006) |

2005 | ||

43 | EE | Guang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz: Towards a General RC4-Like Keystream Generator. CISC 2005: 162-174 |

42 | EE | Shaoquan Jiang, Guang Gong: Efficient Authenticators with Application to Key Exchange. ICISC 2005: 81-91 |

41 | EE | Nam Yul Yu, Guang Gong: Realizations from Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation. WCC 2005: 371-385 |

40 | EE | Guang Gong, Shaoquan Jiang: The editing generator and its cryptanalysis. IJWMC 1(1): 46-52 (2005) |

2004 | ||

39 | EE | Shaoquan Jiang, Guang Gong: Multi-service Oriented Broadcast Encryption. ACISP 2004: 1-11 |

38 | EE | Kenneth J. Giuliani, Guang Gong: New LFSR-Based Cryptosystems and the Trace Discrete Log Problem (Trace-DLP). SETA 2004: 298-312 |

37 | EE | Shaoquan Jiang, Guang Gong: Password Based Key Exchange with Mutual Authentication. Selected Areas in Cryptography 2004: 267-279 |

36 | Zongduo Dai, Shaoquan Jiang, Kyoki Imamura, Guang Gong: Asymptotic Behavior of Normalized Linear Complexity of Ultimately Nonperiodic Binary Sequences. IEEE Transactions on Information Theory 50(11): 2911-2915 (2004) | |

2003 | ||

35 | EE | Khoongming Khoo, Guang Gong: New Constructions for Resilient and Highly Nonlinear Boolean Functions. ACISP 2003: 498-509 |

34 | EE | Guang Gong, Khoongming Khoo: Additive Autocorrelation of Resilient Boolean Functions. Selected Areas in Cryptography 2003: 275-290 |

2002 | ||

33 | EE | Charles C. Y. Lam, Guang Gong, Scott A. Vanstone: Message Authentication Codes with Error Correcting Capabilities. ICICS 2002: 354-366 |

32 | EE | Shaoquan Jiang, Zongduo Dai, Guang Gong: On interleaved sequences over finite fields. Discrete Mathematics 252(1-3): 161-178 (2002) |

31 | Guang Gong, Amr M. Youssef: Cryptographic properties of the Welch-Gong transformation sequence generators. IEEE Transactions on Information Theory 48(11): 2837-2846 (2002) | |

30 | Guang Gong: New designs for signal sets with low cross correlation, balance property, and largelinear span: GF(p) case. IEEE Transactions on Information Theory 48(11): 2847-2867 (2002) | |

29 | Tor Helleseth, Guang Gong: New nonbinary sequences with ideal two-level autocorrelation. IEEE Transactions on Information Theory 48(11): 2868-2872 (2002) | |

28 | Guang Gong, Solomon W. Golomb: The decimation-Hadamard transform of two-level autocorrelation sequences. IEEE Transactions on Information Theory 48(4): 853-865 (2002) | |

2001 | ||

27 | EE | Amr M. Youssef, Guang Gong: Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000. ACISP 2001: 15-20 |

26 | EE | Amr M. Youssef, Guang Gong: Hyper-bent Functions. EUROCRYPT 2001: 406-419 |

25 | EE | Kenneth J. Giuliani, Guang Gong: Generating Large Instances of the Gong-Harn Cryptosystem. IMA Int. Conf. 2001: 317-328 |

24 | EE | Amr M. Youssef, Guang Gong: Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem. INDOCRYPT 2001: 214-222 |

23 | EE | Guang Gong, Lein Harn, Huapeng Wu: The GH Public-Key Cryptosystem. Selected Areas in Cryptography 2001: 284-300 |

22 | EE | Amr M. Youssef, Guang Gong: Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case. Selected Areas in Cryptography 2001: 49-59 |

21 | EE | Michael Ludkovski, Guang Gong: New Families of Ideal 2-Level Autocorrelation Ternary Sequences From Second Order DHT. Electronic Notes in Discrete Mathematics 6: 375-384 (2001) |

20 | Thomas W. Cusick, Guang Gong: A conjecture on binary sequences with the "Trinomial property". IEEE Transactions on Information Theory 47(1): 426-427 (2001) | |

2000 | ||

19 | EE | Amr M. Youssef, Guang Gong: On the Interpolation Attacks on Block Ciphers. FSE 2000: 109-120 |

18 | EE | Guang Gong, Amr M. Youssef: On Welch-Gong Transformation Sequence Generators. Selected Areas in Cryptography 2000: 217-232 |

17 | EE | Solomon W. Golomb, Guang Gong, Zong-Duo Dai: Cyclic inequivalence of cascaded GMW-sequences. Discrete Mathematics 219(1-3): 279-285 (2000) |

16 | Guang Gong, Zong-Duo Dai, Solomon W. Golomb: Enumeration and criteria for cyclically shift-distinct GMW sequences. IEEE Transactions on Information Theory 46(2): 474-484 (2000) | |

15 | Anchung Chang, Peter Gaal, Solomon W. Golomb, Guang Gong, Tor Helleseth, P. Vijay Kumar: On a conjectured ideal autocorrelation sequence, a related triple-error correcting cyclic code. IEEE Transactions on Information Theory 46(2): 680-687 (2000) | |

1999 | ||

14 | EE | Guang Gong, Thomas A. Berson, Douglas R. Stinson: Elliptic Curve Pseudorandom Sequence Generators. Selected Areas in Cryptography 1999: 34-48 |

13 | EE | Zongduo Dai, Solomon W. Golomb, Guang Gong: Generating all linear orthomorphisms without repetition. Discrete Mathematics 205(1-3): 47-55 (1999) |

12 | Guang Gong, Solomon W. Golomb: Binary Sequences with Two-Level Autocorrelation. IEEE Transactions on Information Theory 45(2): 692-693 (1999) | |

11 | Solomon W. Golomb, Guang Gong: Periodic Binary Sequences with the "Trinomial Property". IEEE Transactions on Information Theory 45(4): 1276-1279 (1999) | |

10 | Guang Gong, Solomon W. Golomb: Hadamard transforms of three-term sequences. IEEE Transactions on Information Theory 45(6): 2059-2060 (1999) | |

9 | Guang Gong, Solomon W. Golomb: Transform domain analysis of DES. IEEE Transactions on Information Theory 45(6): 2065-2073 (1999) | |

8 | Guang Gong, Lein Harn: Public-key cryptosystems based on cubic finite field extensions. IEEE Transactions on Information Theory 45(7): 2601-2605 (1999) | |

1998 | ||

7 | Jong-Seon No,
Solomon W. Golomb,
Guang Gong,
Hwan-Keun Lee,
Peter Gaal:
Binary Pseudorandom Sequences of Period 2^{n}-1 with Ideal Autocorrelation.
IEEE Transactions on Information Theory 44(2): 814-817 (1998) | |

1997 | ||

6 | Guang Gong:
A new class of nonlinear PN sequences over GF(q^{n}).
IEEE Transactions on Information Theory 43(3): 1007-1012 (1997) | |

1996 | ||

5 | Guang Gong: Q-ary cascaded GMW sequences. IEEE Transactions on Information Theory 42(1): 263-267 (1996) | |

1995 | ||

4 | Guang Gong: Theory and applications of q-ary interleaved sequences. IEEE Transactions on Information Theory 41(2): 400-411 (1995) | |

1994 | ||

3 | EE | Xingong Chang, Zong-Duo Dai, Guang Gong: Some Cryptographic Properties of Exponential Functions. ASIACRYPT 1994: 415-418 |

1993 | ||

2 | EE | Guang Gong: A New Class of Sequences: Mapping Sequences. AAECC 1993: 147-161 |

1990 | ||

1 | EE | Guang Gong: Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key. AUSCRYPT 1990: 32-36 |