Search the dblp DataBase
Guang Gong :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Guang Gong A New Class of Sequences: Mapping Sequences. [Citation Graph (0, 0)][DBLP ] AAECC, 1993, pp:147-161 [Conf ] Khoongming Khoo , Guang Gong New Constructions for Resilient and Highly Nonlinear Boolean Functions. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:498-509 [Conf ] Shaoquan Jiang , Guang Gong Multi-service Oriented Broadcast Encryption. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:1-11 [Conf ] Amr M. Youssef , Guang Gong Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:15-20 [Conf ] Khoongming Khoo , Guang Gong , Hian-Kiat Lee The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions. [Citation Graph (0, 0)][DBLP ] ACNS, 2006, pp:194-209 [Conf ] Katrin Hoeper , Guang Gong Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ADHOC-NOW, 2006, pp:224-237 [Conf ] Xingong Chang , Zong-Duo Dai , Guang Gong Some Cryptographic Properties of Exponential Functions. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1994, pp:415-418 [Conf ] Guang Gong Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:32-36 [Conf ] Guang Gong , Kishan Chand Gupta , Martin Hell , Yassir Nawaz Towards a General RC4-Like Keystream Generator. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:162-174 [Conf ] Shaoquan Jiang , Guang Gong A Round and Communication Efficient Secure Ranking Protocol. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:350-364 [Conf ] Amr M. Youssef , Guang Gong Hyper-bent Functions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2001, pp:406-419 [Conf ] Amr M. Youssef , Guang Gong On the Interpolation Attacks on Block Ciphers. [Citation Graph (0, 0)][DBLP ] FSE, 2000, pp:109-120 [Conf ] Yassir Nawaz , Guang Gong , Kishan Chand Gupta Upper Bounds on Algebraic Immunity of Boolean Power Functions. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:375-389 [Conf ] Charles C. Y. Lam , Guang Gong , Scott A. Vanstone Message Authentication Codes with Error Correcting Capabilities. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:354-366 [Conf ] Shaoquan Jiang , Guang Gong Efficient Authenticators with Application to Key Exchange. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:81-91 [Conf ] Kenneth J. Giuliani , Guang Gong Generating Large Instances of the Gong-Harn Cryptosystem. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:317-328 [Conf ] Amr M. Youssef , Guang Gong Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:214-222 [Conf ] Shaoquan Jiang , Guang Gong Password Based Key Exchange with Mutual Authentication. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:267-279 [Conf ] Guang Gong , Thomas A. Berson , Douglas R. Stinson Elliptic Curve Pseudorandom Sequence Generators. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1999, pp:34-48 [Conf ] Guang Gong , Lein Harn , Huapeng Wu The GH Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:284-300 [Conf ] Guang Gong , Khoongming Khoo Additive Autocorrelation of Resilient Boolean Functions. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2003, pp:275-290 [Conf ] Guang Gong , Amr M. Youssef On Welch-Gong Transformation Sequence Generators. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2000, pp:217-232 [Conf ] Amr M. Youssef , Guang Gong Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:49-59 [Conf ] Kenneth J. Giuliani , Guang Gong New LFSR-Based Cryptosystems and the Trace Discrete Log Problem (Trace-DLP). [Citation Graph (0, 0)][DBLP ] SETA, 2004, pp:298-312 [Conf ] Kenneth J. Giuliani , Guang Gong A New Algorithm to Compute Remote Terms in Special Types of Characteristic Sequences. [Citation Graph (0, 0)][DBLP ] SETA, 2006, pp:237-247 [Conf ] Nam Yul Yu , Guang Gong Crosscorrelation Properties of Binary Sequences with Ideal Two-Level Autocorrelation. [Citation Graph (0, 0)][DBLP ] SETA, 2006, pp:104-118 [Conf ] Nam Yul Yu , Guang Gong Realizations from Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation. [Citation Graph (0, 0)][DBLP ] WCC, 2005, pp:371-385 [Conf ] Guang Gong , Hong-Yeop Song Two-tuple balance of non-binary sequences with ideal two-level autocorrelation. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 2006, v:154, n:18, pp:2590-2598 [Journal ] Khoongming Khoo , Guang Gong , Douglas R. Stinson A New Characterization of Semi-bent and Bent Functions on Finite Fields*. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2006, v:38, n:2, pp:279-295 [Journal ] Solomon W. Golomb , Guang Gong , Zong-Duo Dai Cyclic inequivalence of cascaded GMW-sequences. [Citation Graph (0, 0)][DBLP ] Discrete Mathematics, 2000, v:219, n:1-3, pp:279-285 [Journal ] Shaoquan Jiang , Zongduo Dai , Guang Gong On interleaved sequences over finite fields. [Citation Graph (0, 0)][DBLP ] Discrete Mathematics, 2002, v:252, n:1-3, pp:161-178 [Journal ] Amr M. Youssef , Stafford E. Tavares , Guang Gong On some probabilistic approximations for AES-like s-boxes. [Citation Graph (0, 0)][DBLP ] Discrete Mathematics, 2006, v:306, n:16, pp:2016-2020 [Journal ] Anchung Chang , Peter Gaal , Solomon W. Golomb , Guang Gong , Tor Helleseth , P. Vijay Kumar On a conjectured ideal autocorrelation sequence, a related triple-error correcting cyclic code. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2000, v:46, n:2, pp:680-687 [Journal ] Thomas W. Cusick , Guang Gong A conjecture on binary sequences with the "Trinomial property". [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2001, v:47, n:1, pp:426-427 [Journal ] Zongduo Dai , Shaoquan Jiang , Kyoki Imamura , Guang Gong Asymptotic Behavior of Normalized Linear Complexity of Ultimately Nonperiodic Binary Sequences. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2004, v:50, n:11, pp:2911-2915 [Journal ] Solomon W. Golomb , Guang Gong Periodic Binary Sequences with the "Trinomial Property". [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1999, v:45, n:4, pp:1276-1279 [Journal ] Guang Gong New designs for signal sets with low cross correlation, balance property, and largelinear span: GF(p) case. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2002, v:48, n:11, pp:2847-2867 [Journal ] Guang Gong Theory and applications of q-ary interleaved sequences. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1995, v:41, n:2, pp:400-411 [Journal ] Guang Gong Q-ary cascaded GMW sequences. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1996, v:42, n:1, pp:263-267 [Journal ] Guang Gong A new class of nonlinear PN sequences over GF(qn ). [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1997, v:43, n:3, pp:1007-1012 [Journal ] Guang Gong , Zong-Duo Dai , Solomon W. Golomb Enumeration and criteria for cyclically shift-distinct GMW sequences. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2000, v:46, n:2, pp:474-484 [Journal ] Guang Gong , Solomon W. Golomb The decimation-Hadamard transform of two-level autocorrelation sequences. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2002, v:48, n:4, pp:853-865 [Journal ] Guang Gong , Solomon W. Golomb Binary Sequences with Two-Level Autocorrelation. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1999, v:45, n:2, pp:692-693 [Journal ] Guang Gong , Solomon W. Golomb Hadamard transforms of three-term sequences. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1999, v:45, n:6, pp:2059-2060 [Journal ] Guang Gong , Solomon W. Golomb Transform domain analysis of DES. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1999, v:45, n:6, pp:2065-2073 [Journal ] Guang Gong , Lein Harn Public-key cryptosystems based on cubic finite field extensions. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1999, v:45, n:7, pp:2601-2605 [Journal ] Guang Gong , Amr M. Youssef Cryptographic properties of the Welch-Gong transformation sequence generators. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2002, v:48, n:11, pp:2837-2846 [Journal ] Tor Helleseth , Guang Gong New nonbinary sequences with ideal two-level autocorrelation. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2002, v:48, n:11, pp:2868-2872 [Journal ] Jong-Seon No , Solomon W. Golomb , Guang Gong , Hwan-Keun Lee , Peter Gaal Binary Pseudorandom Sequences of Period 2n -1 with Ideal Autocorrelation. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1998, v:44, n:2, pp:814-817 [Journal ] Nam Yul Yu , Guang Gong A new binary sequence family with low correlation and large size. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2006, v:52, n:4, pp:1624-1636 [Journal ] Yassir Nawaz , Guang Gong Distributing Fixed Time Slices in Heterogeneous Networks of Workstations (NOWs). [Citation Graph (0, 0)][DBLP ] ISPA, 2007, pp:612-621 [Conf ] Zongduo Dai , Solomon W. Golomb , Guang Gong Generating all linear orthomorphisms without repetition. [Citation Graph (0, 0)][DBLP ] Discrete Mathematics, 1999, v:205, n:1-3, pp:47-55 [Journal ] A Survey of Recent Attacks on the Filter Generator. [Citation Graph (, )][DBLP ] Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks. [Citation Graph (, )][DBLP ] Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices. [Citation Graph (, )][DBLP ] Key revocation based on Dirichlet multinomial model for mobile ad hoc networks. [Citation Graph (, )][DBLP ] Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations. [Citation Graph (, )][DBLP ] Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates. [Citation Graph (, )][DBLP ] A Study on the Pseudorandom Properties of Sequences Generated Via the Additive Order. [Citation Graph (, )][DBLP ] Sequences, DFT and Resistance against Fast Algebraic Attacks. [Citation Graph (, )][DBLP ] Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms. [Citation Graph (, )][DBLP ] A Novel Framework for Message Authentication in Vehicular Communication Networks. [Citation Graph (, )][DBLP ] Near-Complementary Sequences of Various Lengths and Low PMEPR for Multicarrier Communications. [Citation Graph (, )][DBLP ] Randomness and Representation of Span n Sequences. [Citation Graph (, )][DBLP ] On Attacks on Filtering Generators Using Linear Subspace Structures. [Citation Graph (, )][DBLP ] The Perfect Binary Sequence of Period 4 for Low Periodic and Aperiodic Autocorrelations. [Citation Graph (, )][DBLP ] Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences. [Citation Graph (, )][DBLP ] Computationally Efficient Mutual Entity Authentication in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] DHT-Based Detection of Node Clone in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity. [Citation Graph (, )][DBLP ] New Sequences Design from Weil Representation with Low Two-Dimensional Correlation in Both Time and Phase Shifts [Citation Graph (, )][DBLP ] A Note on the Diagonalization of the Discrete Fourier Transform [Citation Graph (, )][DBLP ] A trace representation of binary Jacobi sequences. [Citation Graph (, )][DBLP ] Search in 0.022secs, Finished in 0.025secs