| 2009 |
| 76 | EE | Zilong Wang,
Guang Gong:
A Note on the Diagonalization of the Discrete Fourier Transform
CoRR abs/0902.1267: (2009) |
| 2008 |
| 75 | EE | Xinxin Fan,
Guang Gong:
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks.
LCN 2008: 958-965 |
| 74 | EE | Xinxin Fan,
Guang Gong,
David Jao:
Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms.
Pairing 2008: 243-264 |
| 73 | EE | Guang Gong:
Sequences, DFT and Resistance against Fast Algebraic Attacks.
SETA 2008: 197-218 |
| 72 | EE | Honggang Hu,
Guang Gong:
A Study on the Pseudorandom Properties of Sequences Generated Via the Additive Order.
SETA 2008: 51-59 |
| 71 | EE | Khoongming Khoo,
Chu-Wee Lim,
Guang Gong:
Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity.
Appl. Algebra Eng. Commun. Comput. 19(4): 323-338 (2008) |
| 70 | EE | Zilong Wang,
Guang Gong:
New Sequences Design from Weil Representation with Low Two-Dimensional Correlation in Both Time and Phase Shifts
CoRR abs/0812.4487: (2008) |
| 69 | EE | Nam Yul Yu,
Guang Gong:
New Binary Sequences With Optimal Autocorrelation Magnitude.
IEEE Transactions on Information Theory 54(10): 4771-4779 (2008) |
| 68 | EE | Pascale Charpin,
Guang Gong:
Hyperbent Functions, Kloosterman Sums, and Dickson Polynomials.
IEEE Transactions on Information Theory 54(9): 4230-4238 (2008) |
| 67 | EE | Zhengchun Zhou,
Xiaohu Tang,
Guang Gong:
A New Class of Sequences With Zero or Low Correlation Zone Based on Interleaving Technique.
IEEE Transactions on Information Theory 54(9): 4267-4273 (2008) |
| 66 | EE | Yassir Nawaz,
Guang Gong:
WG: A family of stream ciphers with designed randomness properties.
Inf. Sci. 178(7): 1903-1916 (2008) |
| 2007 |
| 65 | | Solomon W. Golomb,
Guang Gong,
Tor Helleseth,
Hong-Yeop Song:
Sequences, Subsequences, and Consequences, International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers
Springer 2007 |
| 64 | EE | Sondre Rønjom,
Guang Gong,
Tor Helleseth:
A Survey of Recent Attacks on the Filter Generator.
AAECC 2007: 7-17 |
| 63 | EE | Yassir Nawaz,
Guang Gong:
Distributing Fixed Time Slices in Heterogeneous Networks of Workstations (NOWs).
ISPA 2007: 612-621 |
| 62 | EE | Guang Gong:
Randomness and Representation of Span n Sequences.
SSC 2007: 192-203 |
| 61 | EE | Sondre Rønjom,
Guang Gong,
Tor Helleseth:
On Attacks on Filtering Generators Using Linear Subspace Structures.
SSC 2007: 204-217 |
| 60 | EE | Nam Yul Yu,
Guang Gong:
The Perfect Binary Sequence of Period 4 for Low Periodic and Aperiodic Autocorrelations.
SSC 2007: 37-49 |
| 59 | EE | Xinxin Fan,
Guang Gong:
Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations.
Selected Areas in Cryptography 2007: 155-172 |
| 58 | EE | Solomon W. Golomb,
Guang Gong:
The Status of Costas Arrays.
IEEE Transactions on Information Theory 53(11): 4260-4265 (2007) |
| 57 | EE | Guang Gong,
Solomon W. Golomb,
Hong-Yeop Song:
A Note on Low-Correlation Zone Signal Sets.
IEEE Transactions on Information Theory 53(7): 2575-2581 (2007) |
| 56 | EE | Khoongming Khoo,
Guang Gong:
New Construction for Balanced Boolean Functions with Very High Nonlinearity.
IEICE Transactions 90-A(1): 29-35 (2007) |
| 55 | EE | Katrin Hoeper,
Guang Gong:
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks.
IJSN 2(3/4): 239-250 (2007) |
| 2006 |
| 54 | | Guang Gong,
Tor Helleseth,
Hong-Yeop Song,
Kyeongcheol Yang:
Sequences and Their Applications - SETA 2006, 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings
Springer 2006 |
| 53 | EE | Khoongming Khoo,
Guang Gong,
Hian-Kiat Lee:
The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions.
ACNS 2006: 194-209 |
| 52 | EE | Katrin Hoeper,
Guang Gong:
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks.
ADHOC-NOW 2006: 224-237 |
| 51 | EE | Shaoquan Jiang,
Guang Gong:
A Round and Communication Efficient Secure Ranking Protocol.
CT-RSA 2006: 350-364 |
| 50 | EE | Yassir Nawaz,
Guang Gong,
Kishan Chand Gupta:
Upper Bounds on Algebraic Immunity of Boolean Power Functions.
FSE 2006: 375-389 |
| 49 | EE | Nam Yul Yu,
Guang Gong:
Crosscorrelation Properties of Binary Sequences with Ideal Two-Level Autocorrelation.
SETA 2006: 104-118 |
| 48 | EE | Kenneth J. Giuliani,
Guang Gong:
A New Algorithm to Compute Remote Terms in Special Types of Characteristic Sequences.
SETA 2006: 237-247 |
| 47 | EE | Khoongming Khoo,
Guang Gong,
Douglas R. Stinson:
A New Characterization of Semi-bent and Bent Functions on Finite Fields*.
Des. Codes Cryptography 38(2): 279-295 (2006) |
| 46 | EE | Guang Gong,
Hong-Yeop Song:
Two-tuple balance of non-binary sequences with ideal two-level autocorrelation.
Discrete Applied Mathematics 154(18): 2590-2598 (2006) |
| 45 | EE | Amr M. Youssef,
Stafford E. Tavares,
Guang Gong:
On some probabilistic approximations for AES-like s-boxes.
Discrete Mathematics 306(16): 2016-2020 (2006) |
| 44 | EE | Nam Yul Yu,
Guang Gong:
A new binary sequence family with low correlation and large size.
IEEE Transactions on Information Theory 52(4): 1624-1636 (2006) |
| 2005 |
| 43 | EE | Guang Gong,
Kishan Chand Gupta,
Martin Hell,
Yassir Nawaz:
Towards a General RC4-Like Keystream Generator.
CISC 2005: 162-174 |
| 42 | EE | Shaoquan Jiang,
Guang Gong:
Efficient Authenticators with Application to Key Exchange.
ICISC 2005: 81-91 |
| 41 | EE | Nam Yul Yu,
Guang Gong:
Realizations from Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation.
WCC 2005: 371-385 |
| 40 | EE | Guang Gong,
Shaoquan Jiang:
The editing generator and its cryptanalysis.
IJWMC 1(1): 46-52 (2005) |
| 2004 |
| 39 | EE | Shaoquan Jiang,
Guang Gong:
Multi-service Oriented Broadcast Encryption.
ACISP 2004: 1-11 |
| 38 | EE | Kenneth J. Giuliani,
Guang Gong:
New LFSR-Based Cryptosystems and the Trace Discrete Log Problem (Trace-DLP).
SETA 2004: 298-312 |
| 37 | EE | Shaoquan Jiang,
Guang Gong:
Password Based Key Exchange with Mutual Authentication.
Selected Areas in Cryptography 2004: 267-279 |
| 36 | | Zongduo Dai,
Shaoquan Jiang,
Kyoki Imamura,
Guang Gong:
Asymptotic Behavior of Normalized Linear Complexity of Ultimately Nonperiodic Binary Sequences.
IEEE Transactions on Information Theory 50(11): 2911-2915 (2004) |
| 2003 |
| 35 | EE | Khoongming Khoo,
Guang Gong:
New Constructions for Resilient and Highly Nonlinear Boolean Functions.
ACISP 2003: 498-509 |
| 34 | EE | Guang Gong,
Khoongming Khoo:
Additive Autocorrelation of Resilient Boolean Functions.
Selected Areas in Cryptography 2003: 275-290 |
| 2002 |
| 33 | EE | Charles C. Y. Lam,
Guang Gong,
Scott A. Vanstone:
Message Authentication Codes with Error Correcting Capabilities.
ICICS 2002: 354-366 |
| 32 | EE | Shaoquan Jiang,
Zongduo Dai,
Guang Gong:
On interleaved sequences over finite fields.
Discrete Mathematics 252(1-3): 161-178 (2002) |
| 31 | | Guang Gong,
Amr M. Youssef:
Cryptographic properties of the Welch-Gong transformation sequence generators.
IEEE Transactions on Information Theory 48(11): 2837-2846 (2002) |
| 30 | | Guang Gong:
New designs for signal sets with low cross correlation, balance property, and largelinear span: GF(p) case.
IEEE Transactions on Information Theory 48(11): 2847-2867 (2002) |
| 29 | | Tor Helleseth,
Guang Gong:
New nonbinary sequences with ideal two-level autocorrelation.
IEEE Transactions on Information Theory 48(11): 2868-2872 (2002) |
| 28 | | Guang Gong,
Solomon W. Golomb:
The decimation-Hadamard transform of two-level autocorrelation sequences.
IEEE Transactions on Information Theory 48(4): 853-865 (2002) |
| 2001 |
| 27 | EE | Amr M. Youssef,
Guang Gong:
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000.
ACISP 2001: 15-20 |
| 26 | EE | Amr M. Youssef,
Guang Gong:
Hyper-bent Functions.
EUROCRYPT 2001: 406-419 |
| 25 | EE | Kenneth J. Giuliani,
Guang Gong:
Generating Large Instances of the Gong-Harn Cryptosystem.
IMA Int. Conf. 2001: 317-328 |
| 24 | EE | Amr M. Youssef,
Guang Gong:
Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem.
INDOCRYPT 2001: 214-222 |
| 23 | EE | Guang Gong,
Lein Harn,
Huapeng Wu:
The GH Public-Key Cryptosystem.
Selected Areas in Cryptography 2001: 284-300 |
| 22 | EE | Amr M. Youssef,
Guang Gong:
Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case.
Selected Areas in Cryptography 2001: 49-59 |
| 21 | EE | Michael Ludkovski,
Guang Gong:
New Families of Ideal 2-Level Autocorrelation Ternary Sequences From Second Order DHT.
Electronic Notes in Discrete Mathematics 6: 375-384 (2001) |
| 20 | | Thomas W. Cusick,
Guang Gong:
A conjecture on binary sequences with the "Trinomial property".
IEEE Transactions on Information Theory 47(1): 426-427 (2001) |
| 2000 |
| 19 | EE | Amr M. Youssef,
Guang Gong:
On the Interpolation Attacks on Block Ciphers.
FSE 2000: 109-120 |
| 18 | EE | Guang Gong,
Amr M. Youssef:
On Welch-Gong Transformation Sequence Generators.
Selected Areas in Cryptography 2000: 217-232 |
| 17 | EE | Solomon W. Golomb,
Guang Gong,
Zong-Duo Dai:
Cyclic inequivalence of cascaded GMW-sequences.
Discrete Mathematics 219(1-3): 279-285 (2000) |
| 16 | | Guang Gong,
Zong-Duo Dai,
Solomon W. Golomb:
Enumeration and criteria for cyclically shift-distinct GMW sequences.
IEEE Transactions on Information Theory 46(2): 474-484 (2000) |
| 15 | | Anchung Chang,
Peter Gaal,
Solomon W. Golomb,
Guang Gong,
Tor Helleseth,
P. Vijay Kumar:
On a conjectured ideal autocorrelation sequence, a related triple-error correcting cyclic code.
IEEE Transactions on Information Theory 46(2): 680-687 (2000) |
| 1999 |
| 14 | EE | Guang Gong,
Thomas A. Berson,
Douglas R. Stinson:
Elliptic Curve Pseudorandom Sequence Generators.
Selected Areas in Cryptography 1999: 34-48 |
| 13 | EE | Zongduo Dai,
Solomon W. Golomb,
Guang Gong:
Generating all linear orthomorphisms without repetition.
Discrete Mathematics 205(1-3): 47-55 (1999) |
| 12 | | Guang Gong,
Solomon W. Golomb:
Binary Sequences with Two-Level Autocorrelation.
IEEE Transactions on Information Theory 45(2): 692-693 (1999) |
| 11 | | Solomon W. Golomb,
Guang Gong:
Periodic Binary Sequences with the "Trinomial Property".
IEEE Transactions on Information Theory 45(4): 1276-1279 (1999) |
| 10 | | Guang Gong,
Solomon W. Golomb:
Hadamard transforms of three-term sequences.
IEEE Transactions on Information Theory 45(6): 2059-2060 (1999) |
| 9 | | Guang Gong,
Solomon W. Golomb:
Transform domain analysis of DES.
IEEE Transactions on Information Theory 45(6): 2065-2073 (1999) |
| 8 | | Guang Gong,
Lein Harn:
Public-key cryptosystems based on cubic finite field extensions.
IEEE Transactions on Information Theory 45(7): 2601-2605 (1999) |
| 1998 |
| 7 | | Jong-Seon No,
Solomon W. Golomb,
Guang Gong,
Hwan-Keun Lee,
Peter Gaal:
Binary Pseudorandom Sequences of Period 2n-1 with Ideal Autocorrelation.
IEEE Transactions on Information Theory 44(2): 814-817 (1998) |
| 1997 |
| 6 | | Guang Gong:
A new class of nonlinear PN sequences over GF(qn).
IEEE Transactions on Information Theory 43(3): 1007-1012 (1997) |
| 1996 |
| 5 | | Guang Gong:
Q-ary cascaded GMW sequences.
IEEE Transactions on Information Theory 42(1): 263-267 (1996) |
| 1995 |
| 4 | | Guang Gong:
Theory and applications of q-ary interleaved sequences.
IEEE Transactions on Information Theory 41(2): 400-411 (1995) |
| 1994 |
| 3 | | Xingong Chang,
Zong-Duo Dai,
Guang Gong:
Some Cryptographic Properties of Exponential Functions.
ASIACRYPT 1994: 415-418 |
| 1993 |
| 2 | | Guang Gong:
A New Class of Sequences: Mapping Sequences.
AAECC 1993: 147-161 |
| 1990 |
| 1 | | Guang Gong:
Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key.
AUSCRYPT 1990: 32-36 |