The SCEAS System
| |||||||

## Search the dblp DataBase
Guang Gong:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Guang Gong
**A New Class of Sequences: Mapping Sequences.**[Citation Graph (0, 0)][DBLP] AAECC, 1993, pp:147-161 [Conf] - Khoongming Khoo, Guang Gong
**New Constructions for Resilient and Highly Nonlinear Boolean Functions.**[Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:498-509 [Conf] - Shaoquan Jiang, Guang Gong
**Multi-service Oriented Broadcast Encryption.**[Citation Graph (0, 0)][DBLP] ACISP, 2004, pp:1-11 [Conf] - Amr M. Youssef, Guang Gong
**Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000.**[Citation Graph (0, 0)][DBLP] ACISP, 2001, pp:15-20 [Conf] - Khoongming Khoo, Guang Gong, Hian-Kiat Lee
**The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions.**[Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:194-209 [Conf] - Katrin Hoeper, Guang Gong
**Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks.**[Citation Graph (0, 0)][DBLP] ADHOC-NOW, 2006, pp:224-237 [Conf] - Xingong Chang, Zong-Duo Dai, Guang Gong
**Some Cryptographic Properties of Exponential Functions.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 1994, pp:415-418 [Conf] - Guang Gong
**Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key.**[Citation Graph (0, 0)][DBLP] AUSCRYPT, 1990, pp:32-36 [Conf] - Guang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz
**Towards a General RC4-Like Keystream Generator.**[Citation Graph (0, 0)][DBLP] CISC, 2005, pp:162-174 [Conf] - Shaoquan Jiang, Guang Gong
**A Round and Communication Efficient Secure Ranking Protocol.**[Citation Graph (0, 0)][DBLP] CT-RSA, 2006, pp:350-364 [Conf] - Amr M. Youssef, Guang Gong
**Hyper-bent Functions.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2001, pp:406-419 [Conf] - Amr M. Youssef, Guang Gong
**On the Interpolation Attacks on Block Ciphers.**[Citation Graph (0, 0)][DBLP] FSE, 2000, pp:109-120 [Conf] - Yassir Nawaz, Guang Gong, Kishan Chand Gupta
**Upper Bounds on Algebraic Immunity of Boolean Power Functions.**[Citation Graph (0, 0)][DBLP] FSE, 2006, pp:375-389 [Conf] - Charles C. Y. Lam, Guang Gong, Scott A. Vanstone
**Message Authentication Codes with Error Correcting Capabilities.**[Citation Graph (0, 0)][DBLP] ICICS, 2002, pp:354-366 [Conf] - Shaoquan Jiang, Guang Gong
**Efficient Authenticators with Application to Key Exchange.**[Citation Graph (0, 0)][DBLP] ICISC, 2005, pp:81-91 [Conf] - Kenneth J. Giuliani, Guang Gong
**Generating Large Instances of the Gong-Harn Cryptosystem.**[Citation Graph (0, 0)][DBLP] IMA Int. Conf., 2001, pp:317-328 [Conf] - Amr M. Youssef, Guang Gong
**Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2001, pp:214-222 [Conf] - Shaoquan Jiang, Guang Gong
**Password Based Key Exchange with Mutual Authentication.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2004, pp:267-279 [Conf] - Guang Gong, Thomas A. Berson, Douglas R. Stinson
**Elliptic Curve Pseudorandom Sequence Generators.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1999, pp:34-48 [Conf] - Guang Gong, Lein Harn, Huapeng Wu
**The GH Public-Key Cryptosystem.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2001, pp:284-300 [Conf] - Guang Gong, Khoongming Khoo
**Additive Autocorrelation of Resilient Boolean Functions.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2003, pp:275-290 [Conf] - Guang Gong, Amr M. Youssef
**On Welch-Gong Transformation Sequence Generators.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2000, pp:217-232 [Conf] - Amr M. Youssef, Guang Gong
**Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2001, pp:49-59 [Conf] - Kenneth J. Giuliani, Guang Gong
**New LFSR-Based Cryptosystems and the Trace Discrete Log Problem (Trace-DLP).**[Citation Graph (0, 0)][DBLP] SETA, 2004, pp:298-312 [Conf] - Kenneth J. Giuliani, Guang Gong
**A New Algorithm to Compute Remote Terms in Special Types of Characteristic Sequences.**[Citation Graph (0, 0)][DBLP] SETA, 2006, pp:237-247 [Conf] - Nam Yul Yu, Guang Gong
**Crosscorrelation Properties of Binary Sequences with Ideal Two-Level Autocorrelation.**[Citation Graph (0, 0)][DBLP] SETA, 2006, pp:104-118 [Conf] - Nam Yul Yu, Guang Gong
**Realizations from Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation.**[Citation Graph (0, 0)][DBLP] WCC, 2005, pp:371-385 [Conf] - Guang Gong, Hong-Yeop Song
**Two-tuple balance of non-binary sequences with ideal two-level autocorrelation.**[Citation Graph (0, 0)][DBLP] Discrete Applied Mathematics, 2006, v:154, n:18, pp:2590-2598 [Journal] - Khoongming Khoo, Guang Gong, Douglas R. Stinson
**A New Characterization of Semi-bent and Bent Functions on Finite Fields*.**[Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2006, v:38, n:2, pp:279-295 [Journal] - Solomon W. Golomb, Guang Gong, Zong-Duo Dai
**Cyclic inequivalence of cascaded GMW-sequences.**[Citation Graph (0, 0)][DBLP] Discrete Mathematics, 2000, v:219, n:1-3, pp:279-285 [Journal] - Shaoquan Jiang, Zongduo Dai, Guang Gong
**On interleaved sequences over finite fields.**[Citation Graph (0, 0)][DBLP] Discrete Mathematics, 2002, v:252, n:1-3, pp:161-178 [Journal] - Amr M. Youssef, Stafford E. Tavares, Guang Gong
**On some probabilistic approximations for AES-like s-boxes.**[Citation Graph (0, 0)][DBLP] Discrete Mathematics, 2006, v:306, n:16, pp:2016-2020 [Journal] - Anchung Chang, Peter Gaal, Solomon W. Golomb, Guang Gong, Tor Helleseth, P. Vijay Kumar
**On a conjectured ideal autocorrelation sequence, a related triple-error correcting cyclic code.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:2, pp:680-687 [Journal] - Thomas W. Cusick, Guang Gong
**A conjecture on binary sequences with the "Trinomial property".**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2001, v:47, n:1, pp:426-427 [Journal] - Zongduo Dai, Shaoquan Jiang, Kyoki Imamura, Guang Gong
**Asymptotic Behavior of Normalized Linear Complexity of Ultimately Nonperiodic Binary Sequences.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2004, v:50, n:11, pp:2911-2915 [Journal] - Solomon W. Golomb, Guang Gong
**Periodic Binary Sequences with the "Trinomial Property".**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1999, v:45, n:4, pp:1276-1279 [Journal] - Guang Gong
**New designs for signal sets with low cross correlation, balance property, and largelinear span: GF(p) case.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2002, v:48, n:11, pp:2847-2867 [Journal] - Guang Gong
**Theory and applications of q-ary interleaved sequences.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1995, v:41, n:2, pp:400-411 [Journal] - Guang Gong
**Q-ary cascaded GMW sequences.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1996, v:42, n:1, pp:263-267 [Journal] - Guang Gong
**A new class of nonlinear PN sequences over GF(q**[Citation Graph (0, 0)][DBLP]^{n}). IEEE Transactions on Information Theory, 1997, v:43, n:3, pp:1007-1012 [Journal] - Guang Gong, Zong-Duo Dai, Solomon W. Golomb
**Enumeration and criteria for cyclically shift-distinct GMW sequences.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:2, pp:474-484 [Journal] - Guang Gong, Solomon W. Golomb
**The decimation-Hadamard transform of two-level autocorrelation sequences.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2002, v:48, n:4, pp:853-865 [Journal] - Guang Gong, Solomon W. Golomb
**Binary Sequences with Two-Level Autocorrelation.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1999, v:45, n:2, pp:692-693 [Journal] - Guang Gong, Solomon W. Golomb
**Hadamard transforms of three-term sequences.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1999, v:45, n:6, pp:2059-2060 [Journal] - Guang Gong, Solomon W. Golomb
**Transform domain analysis of DES.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1999, v:45, n:6, pp:2065-2073 [Journal] - Guang Gong, Lein Harn
**Public-key cryptosystems based on cubic finite field extensions.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1999, v:45, n:7, pp:2601-2605 [Journal] - Guang Gong, Amr M. Youssef
**Cryptographic properties of the Welch-Gong transformation sequence generators.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2002, v:48, n:11, pp:2837-2846 [Journal] - Tor Helleseth, Guang Gong
**New nonbinary sequences with ideal two-level autocorrelation.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2002, v:48, n:11, pp:2868-2872 [Journal] - Jong-Seon No, Solomon W. Golomb, Guang Gong, Hwan-Keun Lee, Peter Gaal
**Binary Pseudorandom Sequences of Period 2**[Citation Graph (0, 0)][DBLP]^{n}-1 with Ideal Autocorrelation. IEEE Transactions on Information Theory, 1998, v:44, n:2, pp:814-817 [Journal] - Nam Yul Yu, Guang Gong
**A new binary sequence family with low correlation and large size.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2006, v:52, n:4, pp:1624-1636 [Journal] - Yassir Nawaz, Guang Gong
**Distributing Fixed Time Slices in Heterogeneous Networks of Workstations (NOWs).**[Citation Graph (0, 0)][DBLP] ISPA, 2007, pp:612-621 [Conf] - Zongduo Dai, Solomon W. Golomb, Guang Gong
**Generating all linear orthomorphisms without repetition.**[Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1999, v:205, n:1-3, pp:47-55 [Journal] **A Survey of Recent Attacks on the Filter Generator.**[Citation Graph (, )][DBLP]**Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks.**[Citation Graph (, )][DBLP]**Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices.**[Citation Graph (, )][DBLP]**Key revocation based on Dirichlet multinomial model for mobile ad hoc networks.**[Citation Graph (, )][DBLP]**Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations.**[Citation Graph (, )][DBLP]**Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates.**[Citation Graph (, )][DBLP]**A Study on the Pseudorandom Properties of Sequences Generated Via the Additive Order.**[Citation Graph (, )][DBLP]**Sequences, DFT and Resistance against Fast Algebraic Attacks.**[Citation Graph (, )][DBLP]**Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms.**[Citation Graph (, )][DBLP]**A Novel Framework for Message Authentication in Vehicular Communication Networks.**[Citation Graph (, )][DBLP]**Near-Complementary Sequences of Various Lengths and Low PMEPR for Multicarrier Communications.**[Citation Graph (, )][DBLP]**Randomness and Representation of Span**[Citation Graph (, )][DBLP]*n*Sequences.**On Attacks on Filtering Generators Using Linear Subspace Structures.**[Citation Graph (, )][DBLP]**The Perfect Binary Sequence of Period 4 for Low Periodic and Aperiodic Autocorrelations.**[Citation Graph (, )][DBLP]**Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences.**[Citation Graph (, )][DBLP]**Computationally Efficient Mutual Entity Authentication in Wireless Sensor Networks.**[Citation Graph (, )][DBLP]**DHT-Based Detection of Node Clone in Wireless Sensor Networks.**[Citation Graph (, )][DBLP]**Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity.**[Citation Graph (, )][DBLP]**New Sequences Design from Weil Representation with Low Two-Dimensional Correlation in Both Time and Phase Shifts**[Citation Graph (, )][DBLP]**A Note on the Diagonalization of the Discrete Fourier Transform**[Citation Graph (, )][DBLP]**A trace representation of binary Jacobi sequences.**[Citation Graph (, )][DBLP]
Search in 0.022secs, Finished in 0.025secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |