2009 | ||
---|---|---|
76 | EE | Zilong Wang, Guang Gong: A Note on the Diagonalization of the Discrete Fourier Transform CoRR abs/0902.1267: (2009) |
2008 | ||
75 | EE | Xinxin Fan, Guang Gong: Key revocation based on Dirichlet multinomial model for mobile ad hoc networks. LCN 2008: 958-965 |
74 | EE | Xinxin Fan, Guang Gong, David Jao: Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms. Pairing 2008: 243-264 |
73 | EE | Guang Gong: Sequences, DFT and Resistance against Fast Algebraic Attacks. SETA 2008: 197-218 |
72 | EE | Honggang Hu, Guang Gong: A Study on the Pseudorandom Properties of Sequences Generated Via the Additive Order. SETA 2008: 51-59 |
71 | EE | Khoongming Khoo, Chu-Wee Lim, Guang Gong: Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity. Appl. Algebra Eng. Commun. Comput. 19(4): 323-338 (2008) |
70 | EE | Zilong Wang, Guang Gong: New Sequences Design from Weil Representation with Low Two-Dimensional Correlation in Both Time and Phase Shifts CoRR abs/0812.4487: (2008) |
69 | EE | Nam Yul Yu, Guang Gong: New Binary Sequences With Optimal Autocorrelation Magnitude. IEEE Transactions on Information Theory 54(10): 4771-4779 (2008) |
68 | EE | Pascale Charpin, Guang Gong: Hyperbent Functions, Kloosterman Sums, and Dickson Polynomials. IEEE Transactions on Information Theory 54(9): 4230-4238 (2008) |
67 | EE | Zhengchun Zhou, Xiaohu Tang, Guang Gong: A New Class of Sequences With Zero or Low Correlation Zone Based on Interleaving Technique. IEEE Transactions on Information Theory 54(9): 4267-4273 (2008) |
66 | EE | Yassir Nawaz, Guang Gong: WG: A family of stream ciphers with designed randomness properties. Inf. Sci. 178(7): 1903-1916 (2008) |
2007 | ||
65 | Solomon W. Golomb, Guang Gong, Tor Helleseth, Hong-Yeop Song: Sequences, Subsequences, and Consequences, International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers Springer 2007 | |
64 | EE | Sondre Rønjom, Guang Gong, Tor Helleseth: A Survey of Recent Attacks on the Filter Generator. AAECC 2007: 7-17 |
63 | EE | Yassir Nawaz, Guang Gong: Distributing Fixed Time Slices in Heterogeneous Networks of Workstations (NOWs). ISPA 2007: 612-621 |
62 | EE | Guang Gong: Randomness and Representation of Span n Sequences. SSC 2007: 192-203 |
61 | EE | Sondre Rønjom, Guang Gong, Tor Helleseth: On Attacks on Filtering Generators Using Linear Subspace Structures. SSC 2007: 204-217 |
60 | EE | Nam Yul Yu, Guang Gong: The Perfect Binary Sequence of Period 4 for Low Periodic and Aperiodic Autocorrelations. SSC 2007: 37-49 |
59 | EE | Xinxin Fan, Guang Gong: Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations. Selected Areas in Cryptography 2007: 155-172 |
58 | EE | Solomon W. Golomb, Guang Gong: The Status of Costas Arrays. IEEE Transactions on Information Theory 53(11): 4260-4265 (2007) |
57 | EE | Guang Gong, Solomon W. Golomb, Hong-Yeop Song: A Note on Low-Correlation Zone Signal Sets. IEEE Transactions on Information Theory 53(7): 2575-2581 (2007) |
56 | EE | Khoongming Khoo, Guang Gong: New Construction for Balanced Boolean Functions with Very High Nonlinearity. IEICE Transactions 90-A(1): 29-35 (2007) |
55 | EE | Katrin Hoeper, Guang Gong: Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks. IJSN 2(3/4): 239-250 (2007) |
2006 | ||
54 | Guang Gong, Tor Helleseth, Hong-Yeop Song, Kyeongcheol Yang: Sequences and Their Applications - SETA 2006, 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings Springer 2006 | |
53 | EE | Khoongming Khoo, Guang Gong, Hian-Kiat Lee: The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions. ACNS 2006: 194-209 |
52 | EE | Katrin Hoeper, Guang Gong: Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks. ADHOC-NOW 2006: 224-237 |
51 | EE | Shaoquan Jiang, Guang Gong: A Round and Communication Efficient Secure Ranking Protocol. CT-RSA 2006: 350-364 |
50 | EE | Yassir Nawaz, Guang Gong, Kishan Chand Gupta: Upper Bounds on Algebraic Immunity of Boolean Power Functions. FSE 2006: 375-389 |
49 | EE | Nam Yul Yu, Guang Gong: Crosscorrelation Properties of Binary Sequences with Ideal Two-Level Autocorrelation. SETA 2006: 104-118 |
48 | EE | Kenneth J. Giuliani, Guang Gong: A New Algorithm to Compute Remote Terms in Special Types of Characteristic Sequences. SETA 2006: 237-247 |
47 | EE | Khoongming Khoo, Guang Gong, Douglas R. Stinson: A New Characterization of Semi-bent and Bent Functions on Finite Fields*. Des. Codes Cryptography 38(2): 279-295 (2006) |
46 | EE | Guang Gong, Hong-Yeop Song: Two-tuple balance of non-binary sequences with ideal two-level autocorrelation. Discrete Applied Mathematics 154(18): 2590-2598 (2006) |
45 | EE | Amr M. Youssef, Stafford E. Tavares, Guang Gong: On some probabilistic approximations for AES-like s-boxes. Discrete Mathematics 306(16): 2016-2020 (2006) |
44 | EE | Nam Yul Yu, Guang Gong: A new binary sequence family with low correlation and large size. IEEE Transactions on Information Theory 52(4): 1624-1636 (2006) |
2005 | ||
43 | EE | Guang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz: Towards a General RC4-Like Keystream Generator. CISC 2005: 162-174 |
42 | EE | Shaoquan Jiang, Guang Gong: Efficient Authenticators with Application to Key Exchange. ICISC 2005: 81-91 |
41 | EE | Nam Yul Yu, Guang Gong: Realizations from Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation. WCC 2005: 371-385 |
40 | EE | Guang Gong, Shaoquan Jiang: The editing generator and its cryptanalysis. IJWMC 1(1): 46-52 (2005) |
2004 | ||
39 | EE | Shaoquan Jiang, Guang Gong: Multi-service Oriented Broadcast Encryption. ACISP 2004: 1-11 |
38 | EE | Kenneth J. Giuliani, Guang Gong: New LFSR-Based Cryptosystems and the Trace Discrete Log Problem (Trace-DLP). SETA 2004: 298-312 |
37 | EE | Shaoquan Jiang, Guang Gong: Password Based Key Exchange with Mutual Authentication. Selected Areas in Cryptography 2004: 267-279 |
36 | Zongduo Dai, Shaoquan Jiang, Kyoki Imamura, Guang Gong: Asymptotic Behavior of Normalized Linear Complexity of Ultimately Nonperiodic Binary Sequences. IEEE Transactions on Information Theory 50(11): 2911-2915 (2004) | |
2003 | ||
35 | EE | Khoongming Khoo, Guang Gong: New Constructions for Resilient and Highly Nonlinear Boolean Functions. ACISP 2003: 498-509 |
34 | EE | Guang Gong, Khoongming Khoo: Additive Autocorrelation of Resilient Boolean Functions. Selected Areas in Cryptography 2003: 275-290 |
2002 | ||
33 | EE | Charles C. Y. Lam, Guang Gong, Scott A. Vanstone: Message Authentication Codes with Error Correcting Capabilities. ICICS 2002: 354-366 |
32 | EE | Shaoquan Jiang, Zongduo Dai, Guang Gong: On interleaved sequences over finite fields. Discrete Mathematics 252(1-3): 161-178 (2002) |
31 | Guang Gong, Amr M. Youssef: Cryptographic properties of the Welch-Gong transformation sequence generators. IEEE Transactions on Information Theory 48(11): 2837-2846 (2002) | |
30 | Guang Gong: New designs for signal sets with low cross correlation, balance property, and largelinear span: GF(p) case. IEEE Transactions on Information Theory 48(11): 2847-2867 (2002) | |
29 | Tor Helleseth, Guang Gong: New nonbinary sequences with ideal two-level autocorrelation. IEEE Transactions on Information Theory 48(11): 2868-2872 (2002) | |
28 | Guang Gong, Solomon W. Golomb: The decimation-Hadamard transform of two-level autocorrelation sequences. IEEE Transactions on Information Theory 48(4): 853-865 (2002) | |
2001 | ||
27 | EE | Amr M. Youssef, Guang Gong: Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000. ACISP 2001: 15-20 |
26 | EE | Amr M. Youssef, Guang Gong: Hyper-bent Functions. EUROCRYPT 2001: 406-419 |
25 | EE | Kenneth J. Giuliani, Guang Gong: Generating Large Instances of the Gong-Harn Cryptosystem. IMA Int. Conf. 2001: 317-328 |
24 | EE | Amr M. Youssef, Guang Gong: Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem. INDOCRYPT 2001: 214-222 |
23 | EE | Guang Gong, Lein Harn, Huapeng Wu: The GH Public-Key Cryptosystem. Selected Areas in Cryptography 2001: 284-300 |
22 | EE | Amr M. Youssef, Guang Gong: Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case. Selected Areas in Cryptography 2001: 49-59 |
21 | EE | Michael Ludkovski, Guang Gong: New Families of Ideal 2-Level Autocorrelation Ternary Sequences From Second Order DHT. Electronic Notes in Discrete Mathematics 6: 375-384 (2001) |
20 | Thomas W. Cusick, Guang Gong: A conjecture on binary sequences with the "Trinomial property". IEEE Transactions on Information Theory 47(1): 426-427 (2001) | |
2000 | ||
19 | EE | Amr M. Youssef, Guang Gong: On the Interpolation Attacks on Block Ciphers. FSE 2000: 109-120 |
18 | EE | Guang Gong, Amr M. Youssef: On Welch-Gong Transformation Sequence Generators. Selected Areas in Cryptography 2000: 217-232 |
17 | EE | Solomon W. Golomb, Guang Gong, Zong-Duo Dai: Cyclic inequivalence of cascaded GMW-sequences. Discrete Mathematics 219(1-3): 279-285 (2000) |
16 | Guang Gong, Zong-Duo Dai, Solomon W. Golomb: Enumeration and criteria for cyclically shift-distinct GMW sequences. IEEE Transactions on Information Theory 46(2): 474-484 (2000) | |
15 | Anchung Chang, Peter Gaal, Solomon W. Golomb, Guang Gong, Tor Helleseth, P. Vijay Kumar: On a conjectured ideal autocorrelation sequence, a related triple-error correcting cyclic code. IEEE Transactions on Information Theory 46(2): 680-687 (2000) | |
1999 | ||
14 | EE | Guang Gong, Thomas A. Berson, Douglas R. Stinson: Elliptic Curve Pseudorandom Sequence Generators. Selected Areas in Cryptography 1999: 34-48 |
13 | EE | Zongduo Dai, Solomon W. Golomb, Guang Gong: Generating all linear orthomorphisms without repetition. Discrete Mathematics 205(1-3): 47-55 (1999) |
12 | Guang Gong, Solomon W. Golomb: Binary Sequences with Two-Level Autocorrelation. IEEE Transactions on Information Theory 45(2): 692-693 (1999) | |
11 | Solomon W. Golomb, Guang Gong: Periodic Binary Sequences with the "Trinomial Property". IEEE Transactions on Information Theory 45(4): 1276-1279 (1999) | |
10 | Guang Gong, Solomon W. Golomb: Hadamard transforms of three-term sequences. IEEE Transactions on Information Theory 45(6): 2059-2060 (1999) | |
9 | Guang Gong, Solomon W. Golomb: Transform domain analysis of DES. IEEE Transactions on Information Theory 45(6): 2065-2073 (1999) | |
8 | Guang Gong, Lein Harn: Public-key cryptosystems based on cubic finite field extensions. IEEE Transactions on Information Theory 45(7): 2601-2605 (1999) | |
1998 | ||
7 | Jong-Seon No, Solomon W. Golomb, Guang Gong, Hwan-Keun Lee, Peter Gaal: Binary Pseudorandom Sequences of Period 2n-1 with Ideal Autocorrelation. IEEE Transactions on Information Theory 44(2): 814-817 (1998) | |
1997 | ||
6 | Guang Gong: A new class of nonlinear PN sequences over GF(qn). IEEE Transactions on Information Theory 43(3): 1007-1012 (1997) | |
1996 | ||
5 | Guang Gong: Q-ary cascaded GMW sequences. IEEE Transactions on Information Theory 42(1): 263-267 (1996) | |
1995 | ||
4 | Guang Gong: Theory and applications of q-ary interleaved sequences. IEEE Transactions on Information Theory 41(2): 400-411 (1995) | |
1994 | ||
3 | Xingong Chang, Zong-Duo Dai, Guang Gong: Some Cryptographic Properties of Exponential Functions. ASIACRYPT 1994: 415-418 | |
1993 | ||
2 | Guang Gong: A New Class of Sequences: Mapping Sequences. AAECC 1993: 147-161 | |
1990 | ||
1 | Guang Gong: Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key. AUSCRYPT 1990: 32-36 |