dblp.uni-trier.dewww.uni-trier.de

Guang Gong Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
78EENam Yul Yu, Guang Gong: Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences. IWCC 2009: 248-258
77EEZilong Wang, Guang Gong: A Note on the Diagonalization of the Discrete Fourier Transform CoRR abs/0902.1267: (2009)
76EEKhoongming Khoo, Guanhan Chew, Guang Gong, Hian-Kiat Lee: Time-Memory-Data Trade-Off Attack on Stream Ciphers Based on Maiorana-McFarland Functions. IEICE Transactions 92-A(1): 11-21 (2009)
2008
75EEXinxin Fan, Guang Gong: Key revocation based on Dirichlet multinomial model for mobile ad hoc networks. LCN 2008: 958-965
74EEXinxin Fan, Guang Gong, David Jao: Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms. Pairing 2008: 243-264
73EEGuang Gong: Sequences, DFT and Resistance against Fast Algebraic Attacks. SETA 2008: 197-218
72EEHonggang Hu, Guang Gong: A Study on the Pseudorandom Properties of Sequences Generated Via the Additive Order. SETA 2008: 51-59
71EEKhoongming Khoo, Chu-Wee Lim, Guang Gong: Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity. Appl. Algebra Eng. Commun. Comput. 19(4): 323-338 (2008)
70EEZilong Wang, Guang Gong: New Sequences Design from Weil Representation with Low Two-Dimensional Correlation in Both Time and Phase Shifts CoRR abs/0812.4487: (2008)
69EENam Yul Yu, Guang Gong: New Binary Sequences With Optimal Autocorrelation Magnitude. IEEE Transactions on Information Theory 54(10): 4771-4779 (2008)
68EEPascale Charpin, Guang Gong: Hyperbent Functions, Kloosterman Sums, and Dickson Polynomials. IEEE Transactions on Information Theory 54(9): 4230-4238 (2008)
67EEZhengchun Zhou, Xiaohu Tang, Guang Gong: A New Class of Sequences With Zero or Low Correlation Zone Based on Interleaving Technique. IEEE Transactions on Information Theory 54(9): 4267-4273 (2008)
66EEYassir Nawaz, Guang Gong: WG: A family of stream ciphers with designed randomness properties. Inf. Sci. 178(7): 1903-1916 (2008)
2007
65 Solomon W. Golomb, Guang Gong, Tor Helleseth, Hong-Yeop Song: Sequences, Subsequences, and Consequences, International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers Springer 2007
64EESondre Rønjom, Guang Gong, Tor Helleseth: A Survey of Recent Attacks on the Filter Generator. AAECC 2007: 7-17
63EEYassir Nawaz, Guang Gong: Distributing Fixed Time Slices in Heterogeneous Networks of Workstations (NOWs). ISPA 2007: 612-621
62EEGuang Gong: Randomness and Representation of Span n Sequences. SSC 2007: 192-203
61EESondre Rønjom, Guang Gong, Tor Helleseth: On Attacks on Filtering Generators Using Linear Subspace Structures. SSC 2007: 204-217
60EENam Yul Yu, Guang Gong: The Perfect Binary Sequence of Period 4 for Low Periodic and Aperiodic Autocorrelations. SSC 2007: 37-49
59EEXinxin Fan, Guang Gong: Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations. Selected Areas in Cryptography 2007: 155-172
58EESolomon W. Golomb, Guang Gong: The Status of Costas Arrays. IEEE Transactions on Information Theory 53(11): 4260-4265 (2007)
57EEGuang Gong, Solomon W. Golomb, Hong-Yeop Song: A Note on Low-Correlation Zone Signal Sets. IEEE Transactions on Information Theory 53(7): 2575-2581 (2007)
56EEKhoongming Khoo, Guang Gong: New Construction for Balanced Boolean Functions with Very High Nonlinearity. IEICE Transactions 90-A(1): 29-35 (2007)
55EEKatrin Hoeper, Guang Gong: Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks. IJSN 2(3/4): 239-250 (2007)
2006
54 Guang Gong, Tor Helleseth, Hong-Yeop Song, Kyeongcheol Yang: Sequences and Their Applications - SETA 2006, 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings Springer 2006
53EEKhoongming Khoo, Guang Gong, Hian-Kiat Lee: The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions. ACNS 2006: 194-209
52EEKatrin Hoeper, Guang Gong: Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks. ADHOC-NOW 2006: 224-237
51EEShaoquan Jiang, Guang Gong: A Round and Communication Efficient Secure Ranking Protocol. CT-RSA 2006: 350-364
50EEYassir Nawaz, Guang Gong, Kishan Chand Gupta: Upper Bounds on Algebraic Immunity of Boolean Power Functions. FSE 2006: 375-389
49EENam Yul Yu, Guang Gong: Crosscorrelation Properties of Binary Sequences with Ideal Two-Level Autocorrelation. SETA 2006: 104-118
48EEKenneth J. Giuliani, Guang Gong: A New Algorithm to Compute Remote Terms in Special Types of Characteristic Sequences. SETA 2006: 237-247
47EEKhoongming Khoo, Guang Gong, Douglas R. Stinson: A New Characterization of Semi-bent and Bent Functions on Finite Fields*. Des. Codes Cryptography 38(2): 279-295 (2006)
46EEGuang Gong, Hong-Yeop Song: Two-tuple balance of non-binary sequences with ideal two-level autocorrelation. Discrete Applied Mathematics 154(18): 2590-2598 (2006)
45EEAmr M. Youssef, Stafford E. Tavares, Guang Gong: On some probabilistic approximations for AES-like s-boxes. Discrete Mathematics 306(16): 2016-2020 (2006)
44EENam Yul Yu, Guang Gong: A new binary sequence family with low correlation and large size. IEEE Transactions on Information Theory 52(4): 1624-1636 (2006)
2005
43EEGuang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz: Towards a General RC4-Like Keystream Generator. CISC 2005: 162-174
42EEShaoquan Jiang, Guang Gong: Efficient Authenticators with Application to Key Exchange. ICISC 2005: 81-91
41EENam Yul Yu, Guang Gong: Realizations from Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation. WCC 2005: 371-385
40EEGuang Gong, Shaoquan Jiang: The editing generator and its cryptanalysis. IJWMC 1(1): 46-52 (2005)
2004
39EEShaoquan Jiang, Guang Gong: Multi-service Oriented Broadcast Encryption. ACISP 2004: 1-11
38EEKenneth J. Giuliani, Guang Gong: New LFSR-Based Cryptosystems and the Trace Discrete Log Problem (Trace-DLP). SETA 2004: 298-312
37EEShaoquan Jiang, Guang Gong: Password Based Key Exchange with Mutual Authentication. Selected Areas in Cryptography 2004: 267-279
36 Zongduo Dai, Shaoquan Jiang, Kyoki Imamura, Guang Gong: Asymptotic Behavior of Normalized Linear Complexity of Ultimately Nonperiodic Binary Sequences. IEEE Transactions on Information Theory 50(11): 2911-2915 (2004)
2003
35EEKhoongming Khoo, Guang Gong: New Constructions for Resilient and Highly Nonlinear Boolean Functions. ACISP 2003: 498-509
34EEGuang Gong, Khoongming Khoo: Additive Autocorrelation of Resilient Boolean Functions. Selected Areas in Cryptography 2003: 275-290
2002
33EECharles C. Y. Lam, Guang Gong, Scott A. Vanstone: Message Authentication Codes with Error Correcting Capabilities. ICICS 2002: 354-366
32EEShaoquan Jiang, Zongduo Dai, Guang Gong: On interleaved sequences over finite fields. Discrete Mathematics 252(1-3): 161-178 (2002)
31 Guang Gong, Amr M. Youssef: Cryptographic properties of the Welch-Gong transformation sequence generators. IEEE Transactions on Information Theory 48(11): 2837-2846 (2002)
30 Guang Gong: New designs for signal sets with low cross correlation, balance property, and largelinear span: GF(p) case. IEEE Transactions on Information Theory 48(11): 2847-2867 (2002)
29 Tor Helleseth, Guang Gong: New nonbinary sequences with ideal two-level autocorrelation. IEEE Transactions on Information Theory 48(11): 2868-2872 (2002)
28 Guang Gong, Solomon W. Golomb: The decimation-Hadamard transform of two-level autocorrelation sequences. IEEE Transactions on Information Theory 48(4): 853-865 (2002)
2001
27EEAmr M. Youssef, Guang Gong: Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000. ACISP 2001: 15-20
26EEAmr M. Youssef, Guang Gong: Hyper-bent Functions. EUROCRYPT 2001: 406-419
25EEKenneth J. Giuliani, Guang Gong: Generating Large Instances of the Gong-Harn Cryptosystem. IMA Int. Conf. 2001: 317-328
24EEAmr M. Youssef, Guang Gong: Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem. INDOCRYPT 2001: 214-222
23EEGuang Gong, Lein Harn, Huapeng Wu: The GH Public-Key Cryptosystem. Selected Areas in Cryptography 2001: 284-300
22EEAmr M. Youssef, Guang Gong: Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case. Selected Areas in Cryptography 2001: 49-59
21EEMichael Ludkovski, Guang Gong: New Families of Ideal 2-Level Autocorrelation Ternary Sequences From Second Order DHT. Electronic Notes in Discrete Mathematics 6: 375-384 (2001)
20 Thomas W. Cusick, Guang Gong: A conjecture on binary sequences with the "Trinomial property". IEEE Transactions on Information Theory 47(1): 426-427 (2001)
2000
19EEAmr M. Youssef, Guang Gong: On the Interpolation Attacks on Block Ciphers. FSE 2000: 109-120
18EEGuang Gong, Amr M. Youssef: On Welch-Gong Transformation Sequence Generators. Selected Areas in Cryptography 2000: 217-232
17EESolomon W. Golomb, Guang Gong, Zong-Duo Dai: Cyclic inequivalence of cascaded GMW-sequences. Discrete Mathematics 219(1-3): 279-285 (2000)
16 Guang Gong, Zong-Duo Dai, Solomon W. Golomb: Enumeration and criteria for cyclically shift-distinct GMW sequences. IEEE Transactions on Information Theory 46(2): 474-484 (2000)
15 Anchung Chang, Peter Gaal, Solomon W. Golomb, Guang Gong, Tor Helleseth, P. Vijay Kumar: On a conjectured ideal autocorrelation sequence, a related triple-error correcting cyclic code. IEEE Transactions on Information Theory 46(2): 680-687 (2000)
1999
14EEGuang Gong, Thomas A. Berson, Douglas R. Stinson: Elliptic Curve Pseudorandom Sequence Generators. Selected Areas in Cryptography 1999: 34-48
13EEZongduo Dai, Solomon W. Golomb, Guang Gong: Generating all linear orthomorphisms without repetition. Discrete Mathematics 205(1-3): 47-55 (1999)
12 Guang Gong, Solomon W. Golomb: Binary Sequences with Two-Level Autocorrelation. IEEE Transactions on Information Theory 45(2): 692-693 (1999)
11 Solomon W. Golomb, Guang Gong: Periodic Binary Sequences with the "Trinomial Property". IEEE Transactions on Information Theory 45(4): 1276-1279 (1999)
10 Guang Gong, Solomon W. Golomb: Hadamard transforms of three-term sequences. IEEE Transactions on Information Theory 45(6): 2059-2060 (1999)
9 Guang Gong, Solomon W. Golomb: Transform domain analysis of DES. IEEE Transactions on Information Theory 45(6): 2065-2073 (1999)
8 Guang Gong, Lein Harn: Public-key cryptosystems based on cubic finite field extensions. IEEE Transactions on Information Theory 45(7): 2601-2605 (1999)
1998
7 Jong-Seon No, Solomon W. Golomb, Guang Gong, Hwan-Keun Lee, Peter Gaal: Binary Pseudorandom Sequences of Period 2n-1 with Ideal Autocorrelation. IEEE Transactions on Information Theory 44(2): 814-817 (1998)
1997
6 Guang Gong: A new class of nonlinear PN sequences over GF(qn). IEEE Transactions on Information Theory 43(3): 1007-1012 (1997)
1996
5 Guang Gong: Q-ary cascaded GMW sequences. IEEE Transactions on Information Theory 42(1): 263-267 (1996)
1995
4 Guang Gong: Theory and applications of q-ary interleaved sequences. IEEE Transactions on Information Theory 41(2): 400-411 (1995)
1994
3EEXingong Chang, Zong-Duo Dai, Guang Gong: Some Cryptographic Properties of Exponential Functions. ASIACRYPT 1994: 415-418
1993
2EEGuang Gong: A New Class of Sequences: Mapping Sequences. AAECC 1993: 147-161
1990
1EEGuang Gong: Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key. AUSCRYPT 1990: 32-36

Coauthor Index

1Thomas A. Berson [14]
2Anchung Chang [15]
3Xingong Chang [3]
4Pascale Charpin [68]
5Guanhan Chew [76]
6Thomas W. Cusick [20]
7Zongduo Dai (Zong-Duo Dai) [3] [13] [16] [17] [32] [36]
8Xinxin Fan [59] [74] [75]
9Peter Gaal [7] [15]
10Kenneth J. Giuliani [25] [38] [48]
11Solomon W. Golomb [7] [9] [10] [11] [12] [13] [15] [16] [17] [28] [57] [58] [65]
12Kishan Chand Gupta [43] [50]
13Lein Harn [8] [23]
14Martin Hell [43]
15Tor Helleseth [15] [29] [54] [61] [64] [65]
16Katrin Hoeper [52] [55]
17Honggang Hu [72]
18Kyoki Imamura [36]
19David Jao [74]
20Shaoquan Jiang [32] [36] [37] [39] [40] [42] [51]
21Khoongming Khoo [34] [35] [47] [53] [56] [71] [76]
22P. Vijay Kumar [15]
23Charles C. Y. Lam [33]
24Hian-Kiat Lee [53] [76]
25Hwan-Keun Lee [7]
26Chu-Wee Lim [71]
27Michael Ludkovski [21]
28Yassir Nawaz [43] [50] [63] [66]
29Jong-Seon No [7]
30Sondre Rønjom [61] [64]
31Hong-Yeop Song [46] [54] [57] [65]
32Douglas R. Stinson [14] [47]
33Xiaohu Tang [67]
34Stafford E. Tavares [45]
35Scott A. Vanstone [33]
36Zilong Wang [70] [77]
37Huapeng Wu [23]
38Kyeongcheol Yang [54]
39Amr M. Youssef [18] [19] [22] [24] [26] [27] [31] [45]
40Nam Yul Yu [41] [44] [49] [60] [69] [78]
41Zhengchun Zhou [67]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)