The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Guang Gong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Guang Gong
    A New Class of Sequences: Mapping Sequences. [Citation Graph (0, 0)][DBLP]
    AAECC, 1993, pp:147-161 [Conf]
  2. Khoongming Khoo, Guang Gong
    New Constructions for Resilient and Highly Nonlinear Boolean Functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:498-509 [Conf]
  3. Shaoquan Jiang, Guang Gong
    Multi-service Oriented Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:1-11 [Conf]
  4. Amr M. Youssef, Guang Gong
    Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:15-20 [Conf]
  5. Khoongming Khoo, Guang Gong, Hian-Kiat Lee
    The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:194-209 [Conf]
  6. Katrin Hoeper, Guang Gong
    Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ADHOC-NOW, 2006, pp:224-237 [Conf]
  7. Xingong Chang, Zong-Duo Dai, Guang Gong
    Some Cryptographic Properties of Exponential Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:415-418 [Conf]
  8. Guang Gong
    Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:32-36 [Conf]
  9. Guang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz
    Towards a General RC4-Like Keystream Generator. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:162-174 [Conf]
  10. Shaoquan Jiang, Guang Gong
    A Round and Communication Efficient Secure Ranking Protocol. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:350-364 [Conf]
  11. Amr M. Youssef, Guang Gong
    Hyper-bent Functions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:406-419 [Conf]
  12. Amr M. Youssef, Guang Gong
    On the Interpolation Attacks on Block Ciphers. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:109-120 [Conf]
  13. Yassir Nawaz, Guang Gong, Kishan Chand Gupta
    Upper Bounds on Algebraic Immunity of Boolean Power Functions. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:375-389 [Conf]
  14. Charles C. Y. Lam, Guang Gong, Scott A. Vanstone
    Message Authentication Codes with Error Correcting Capabilities. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:354-366 [Conf]
  15. Shaoquan Jiang, Guang Gong
    Efficient Authenticators with Application to Key Exchange. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:81-91 [Conf]
  16. Kenneth J. Giuliani, Guang Gong
    Generating Large Instances of the Gong-Harn Cryptosystem. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:317-328 [Conf]
  17. Amr M. Youssef, Guang Gong
    Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:214-222 [Conf]
  18. Shaoquan Jiang, Guang Gong
    Password Based Key Exchange with Mutual Authentication. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:267-279 [Conf]
  19. Guang Gong, Thomas A. Berson, Douglas R. Stinson
    Elliptic Curve Pseudorandom Sequence Generators. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:34-48 [Conf]
  20. Guang Gong, Lein Harn, Huapeng Wu
    The GH Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:284-300 [Conf]
  21. Guang Gong, Khoongming Khoo
    Additive Autocorrelation of Resilient Boolean Functions. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2003, pp:275-290 [Conf]
  22. Guang Gong, Amr M. Youssef
    On Welch-Gong Transformation Sequence Generators. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:217-232 [Conf]
  23. Amr M. Youssef, Guang Gong
    Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:49-59 [Conf]
  24. Kenneth J. Giuliani, Guang Gong
    New LFSR-Based Cryptosystems and the Trace Discrete Log Problem (Trace-DLP). [Citation Graph (0, 0)][DBLP]
    SETA, 2004, pp:298-312 [Conf]
  25. Kenneth J. Giuliani, Guang Gong
    A New Algorithm to Compute Remote Terms in Special Types of Characteristic Sequences. [Citation Graph (0, 0)][DBLP]
    SETA, 2006, pp:237-247 [Conf]
  26. Nam Yul Yu, Guang Gong
    Crosscorrelation Properties of Binary Sequences with Ideal Two-Level Autocorrelation. [Citation Graph (0, 0)][DBLP]
    SETA, 2006, pp:104-118 [Conf]
  27. Nam Yul Yu, Guang Gong
    Realizations from Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:371-385 [Conf]
  28. Guang Gong, Hong-Yeop Song
    Two-tuple balance of non-binary sequences with ideal two-level autocorrelation. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:18, pp:2590-2598 [Journal]
  29. Khoongming Khoo, Guang Gong, Douglas R. Stinson
    A New Characterization of Semi-bent and Bent Functions on Finite Fields*. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:38, n:2, pp:279-295 [Journal]
  30. Solomon W. Golomb, Guang Gong, Zong-Duo Dai
    Cyclic inequivalence of cascaded GMW-sequences. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2000, v:219, n:1-3, pp:279-285 [Journal]
  31. Shaoquan Jiang, Zongduo Dai, Guang Gong
    On interleaved sequences over finite fields. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2002, v:252, n:1-3, pp:161-178 [Journal]
  32. Amr M. Youssef, Stafford E. Tavares, Guang Gong
    On some probabilistic approximations for AES-like s-boxes. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2006, v:306, n:16, pp:2016-2020 [Journal]
  33. Anchung Chang, Peter Gaal, Solomon W. Golomb, Guang Gong, Tor Helleseth, P. Vijay Kumar
    On a conjectured ideal autocorrelation sequence, a related triple-error correcting cyclic code. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2000, v:46, n:2, pp:680-687 [Journal]
  34. Thomas W. Cusick, Guang Gong
    A conjecture on binary sequences with the "Trinomial property". [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2001, v:47, n:1, pp:426-427 [Journal]
  35. Zongduo Dai, Shaoquan Jiang, Kyoki Imamura, Guang Gong
    Asymptotic Behavior of Normalized Linear Complexity of Ultimately Nonperiodic Binary Sequences. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2004, v:50, n:11, pp:2911-2915 [Journal]
  36. Solomon W. Golomb, Guang Gong
    Periodic Binary Sequences with the "Trinomial Property". [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:4, pp:1276-1279 [Journal]
  37. Guang Gong
    New designs for signal sets with low cross correlation, balance property, and largelinear span: GF(p) case. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2002, v:48, n:11, pp:2847-2867 [Journal]
  38. Guang Gong
    Theory and applications of q-ary interleaved sequences. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1995, v:41, n:2, pp:400-411 [Journal]
  39. Guang Gong
    Q-ary cascaded GMW sequences. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1996, v:42, n:1, pp:263-267 [Journal]
  40. Guang Gong
    A new class of nonlinear PN sequences over GF(qn). [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:3, pp:1007-1012 [Journal]
  41. Guang Gong, Zong-Duo Dai, Solomon W. Golomb
    Enumeration and criteria for cyclically shift-distinct GMW sequences. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2000, v:46, n:2, pp:474-484 [Journal]
  42. Guang Gong, Solomon W. Golomb
    The decimation-Hadamard transform of two-level autocorrelation sequences. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2002, v:48, n:4, pp:853-865 [Journal]
  43. Guang Gong, Solomon W. Golomb
    Binary Sequences with Two-Level Autocorrelation. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:2, pp:692-693 [Journal]
  44. Guang Gong, Solomon W. Golomb
    Hadamard transforms of three-term sequences. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:6, pp:2059-2060 [Journal]
  45. Guang Gong, Solomon W. Golomb
    Transform domain analysis of DES. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:6, pp:2065-2073 [Journal]
  46. Guang Gong, Lein Harn
    Public-key cryptosystems based on cubic finite field extensions. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:7, pp:2601-2605 [Journal]
  47. Guang Gong, Amr M. Youssef
    Cryptographic properties of the Welch-Gong transformation sequence generators. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2002, v:48, n:11, pp:2837-2846 [Journal]
  48. Tor Helleseth, Guang Gong
    New nonbinary sequences with ideal two-level autocorrelation. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2002, v:48, n:11, pp:2868-2872 [Journal]
  49. Jong-Seon No, Solomon W. Golomb, Guang Gong, Hwan-Keun Lee, Peter Gaal
    Binary Pseudorandom Sequences of Period 2n-1 with Ideal Autocorrelation. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1998, v:44, n:2, pp:814-817 [Journal]
  50. Nam Yul Yu, Guang Gong
    A new binary sequence family with low correlation and large size. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:4, pp:1624-1636 [Journal]
  51. Yassir Nawaz, Guang Gong
    Distributing Fixed Time Slices in Heterogeneous Networks of Workstations (NOWs). [Citation Graph (0, 0)][DBLP]
    ISPA, 2007, pp:612-621 [Conf]
  52. Zongduo Dai, Solomon W. Golomb, Guang Gong
    Generating all linear orthomorphisms without repetition. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1999, v:205, n:1-3, pp:47-55 [Journal]

  53. A Survey of Recent Attacks on the Filter Generator. [Citation Graph (, )][DBLP]


  54. Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks. [Citation Graph (, )][DBLP]


  55. Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices. [Citation Graph (, )][DBLP]


  56. Key revocation based on Dirichlet multinomial model for mobile ad hoc networks. [Citation Graph (, )][DBLP]


  57. Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations. [Citation Graph (, )][DBLP]


  58. Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates. [Citation Graph (, )][DBLP]


  59. A Study on the Pseudorandom Properties of Sequences Generated Via the Additive Order. [Citation Graph (, )][DBLP]


  60. Sequences, DFT and Resistance against Fast Algebraic Attacks. [Citation Graph (, )][DBLP]


  61. Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms. [Citation Graph (, )][DBLP]


  62. A Novel Framework for Message Authentication in Vehicular Communication Networks. [Citation Graph (, )][DBLP]


  63. Near-Complementary Sequences of Various Lengths and Low PMEPR for Multicarrier Communications. [Citation Graph (, )][DBLP]


  64. Randomness and Representation of Span n Sequences. [Citation Graph (, )][DBLP]


  65. On Attacks on Filtering Generators Using Linear Subspace Structures. [Citation Graph (, )][DBLP]


  66. The Perfect Binary Sequence of Period 4 for Low Periodic and Aperiodic Autocorrelations. [Citation Graph (, )][DBLP]


  67. Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences. [Citation Graph (, )][DBLP]


  68. Computationally Efficient Mutual Entity Authentication in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  69. DHT-Based Detection of Node Clone in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  70. Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity. [Citation Graph (, )][DBLP]


  71. New Sequences Design from Weil Representation with Low Two-Dimensional Correlation in Both Time and Phase Shifts [Citation Graph (, )][DBLP]


  72. A Note on the Diagonalization of the Discrete Fourier Transform [Citation Graph (, )][DBLP]


  73. A trace representation of binary Jacobi sequences. [Citation Graph (, )][DBLP]


Search in 0.139secs, Finished in 0.142secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002