Guang Gong
Orcid: 0000-0003-2684-9259
According to our database1,
Guang Gong
authored at least 279 papers
between 1990 and 2024.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2014, "For contributions to sequences and cryptography applied to communications and security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
2023
Constructions of Complementary Sequence Sets and Complete Complementary Codes by Ideal Two-Level Autocorrelation Sequences and Permutation Polynomials.
IEEE Trans. Inf. Theory, July, 2023
ACM Commun. Comput. Algebra, June, 2023
Des. Codes Cryptogr., March, 2023
Speeding Up Multi-Scalar Multiplication over Fixed Points Towards Efficient zkSNARKs.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
Privacy-Preserving Ownership Transfer: Challenges and An Outlined Solution Based on Zero-Knowledge Proofs.
Proceedings of the 9th IEEE World Forum on Internet of Things, 2023
Proceedings of the IEEE International Symposium on Information Theory, 2023
Fast Computation of Multi-Scalar Multiplication for Pairing-Based zkSNARK Applications.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
Proceedings of the IEEE Conference on Communications and Network Security, 2023
2022
IEEE Trans. Inf. Theory, 2022
Polaris: Transparent Succinct Zero-Knowledge Arguments for R1CS with Efficient Verifier.
Proc. Priv. Enhancing Technol., 2022
Systematic Constructions of Bent-Negabent Functions, 2-Rotation Symmetric Bent-Negabent Functions and Their Duals.
CoRR, 2022
On ideal t-tuple distribution of orthogonal functions in filtering de bruijn generators.
Adv. Math. Commun., 2022
Proceedings of the IEEE International Symposium on Information Theory, 2022
2021
New Construction of Complementary Sequence (or Array) Sets and Complete Complementary Codes.
IEEE Trans. Inf. Theory, 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Implementation of Lightweight Ciphers and Their Integration into Entity Authentication with IEEE 802.11 Physical Layer Transmission.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021
Proceedings of the IEEE World AI IoT Congress, 2021
2020
IEEE Trans. Computers, 2020
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Constructions of complementary sequence sets and complete complementary codes by 2-level autocorrelation sequences and permutation polynomials.
CoRR, 2020
The Fourier spectral characterization for the correlation-immune functions over $\phantom {\dot {i}\!}\mathbb {F}_{p}$.
Cryptogr. Commun., 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the IEEE International Symposium on Information Theory, 2020
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020
2019
Hardware Optimizations and Analysis for the WG-16 Cipher with Tower Field Arithmetic.
IEEE Trans. Computers, 2019
A New Generalized Paraunitary Generator for Complementary Sets and Complete Complementary Codes of Size 2<sup>m</sup>.
IEEE Signal Process. Lett., 2019
Proc. Priv. Enhancing Technol., 2019
PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks.
IACR Cryptol. ePrint Arch., 2019
Implementation of three LWC Schemes in the WiFi 4-Way Handshake with Software Defined Radio.
CoRR, 2019
CoRR, 2019
CoRR, 2019
Lempel-Ziv Compression with Randomized Input-Output for Anti-compression Side-Channel Attacks Under HTTPS/TLS.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019
2018
Discrete Fourier Transform of Boolean Functions over the Complex Field and Its Applications.
IEEE Trans. Inf. Theory, 2018
IEEE Trans. Inf. Theory, 2018
ACM Trans. Embed. Comput. Syst., 2018
IEEE Trans. Computers, 2018
IACR Cryptol. ePrint Arch., 2018
Cryptogr. Commun., 2018
Rapid Hardware Design for Cryptographic Modules with Filtering Structures over Small Finite Fields.
Proceedings of the Arithmetic of Finite Fields - 7th International Workshop, 2018
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
2017
A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach.
Mob. Inf. Syst., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
New almost perfect, odd perfect, and perfect sequences from difference balanced functions with d-form property.
Adv. Math. Commun., 2017
A new method to construct golay complementary set and near-complementary set by paraunitary matrices.
Proceedings of the Eighth International Workshop on Signal Design and Its Applications in Communications, 2017
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017
2016
Analysis and Validation of Active Eavesdropping Attacks in Passive FHSS RFID Systems.
IEEE Trans. Inf. Forensics Secur., 2016
Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices.
ACM Trans. Embed. Comput. Syst., 2016
Feedback Reconstruction and Implementations of Pseudorandom Number Generators from Composited De Bruijn Sequences.
IEEE Trans. Computers, 2016
Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications.
EAI Endorsed Trans. Security Safety, 2016
Secur. Commun. Networks, 2016
On algebraic immunity of trace inverse functions on finite fields of characteristic two.
J. Syst. Sci. Complex., 2016
More constructions of differentially 4-uniform permutations on 𝔽<sub>2<sup>2k</sup></sub>.
Des. Codes Cryptogr., 2016
Quadratic zero-difference balanced functions, APN functions and strongly regular graphs.
Des. Codes Cryptogr., 2016
Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions.
Cryptogr. Commun., 2016
Physical Layer Secure Information Exchange Protocol for MIMO Ad Hoc Networks against Passive Attacks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
2015
New Hardware Implementations of WG(29, 11) and WG-16 Stream Ciphers Using Polynomial Basis.
IEEE Trans. Computers, 2015
EAI Endorsed Trans. Security Safety, 2015
Conference key establishment protocol using a multivariate polynomial and its applications.
Secur. Commun. Networks, 2015
IACR Cryptol. ePrint Arch., 2015
Des. Codes Cryptogr., 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
IEEE Trans. Very Large Scale Integr. Syst., 2014
IEEE Trans. Inf. Theory, 2014
IEEE Trans. Inf. Theory, 2014
IEEE Trans. Inf. Theory, 2014
Truly Random Number Generator Based on a Ring Oscillator Utilizing Last Passage Time.
IEEE Trans. Circuits Syst. II Express Briefs, 2014
Inf. Sci., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
CoRR, 2014
Cryptogr. Commun., 2014
Proceedings of the Sequences and Their Applications - SETA 2014, 2014
New binary sequences with good correlation based on high-order difference and interleaving techniques.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Generating Good Span n Sequences Using Orthogonal Functions in Nonlinear Feedback Shift Registers.
Proceedings of the Open Problems in Mathematics and Computational Science, 2014
2013
New Polyphase Sequence Families With Low Correlation Derived From the Weil Bound of Exponential Sums.
IEEE Trans. Inf. Theory, 2013
IEEE Trans. Inf. Theory, 2013
Telecommun. Syst., 2013
IEEE Trans. Commun., 2013
CoRR, 2013
Cryptogr. Commun., 2013
Even periodic and odd periodic complementary sequence pairs from generalized Boolean functions.
Adv. Math. Commun., 2013
Correlation of binary sequence families derived from the multiplicative characters of finite fields.
Adv. Math. Commun., 2013
Proceedings of the Radio Frequency Identification System Security, 2013
Proceedings of the Radio Frequency Identification System Security, 2013
Proceedings of the Sixth International Workshop on Signal Design and Its Applications in Communications, 2013
On large zero auto/cross correlation zone of Golay/QAM Golay sequences and their applications and related correlation properties.
Proceedings of the Sixth International Workshop on Signal Design and Its Applications in Communications, 2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013
Proceedings of the 13th Canadian Workshop on Information Theory, 2013
Efficient hardware implementation of the stream cipher WG-16 with composite field arithmetic.
Proceedings of the TrustED'13, 2013
Proceedings of the SEGS'13, 2013
Proceedings of the Workshop on Embedded Systems Security, 2013
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013
Character Sums and Polyphase Sequence Families with Low Correlation, Discrete Fourier Transform (DFT), and Ambiguity.
Proceedings of the Finite Fields and Their Applications - Character Sums and Polynomials., 2013
Stream and block ciphers.
Proceedings of the Handbook of Finite Fields., 2013
2012
IEEE Trans. Inf. Theory, 2012
IEEE Trans. Inf. Theory, 2012
IET Inf. Secur., 2012
IACR Cryptol. ePrint Arch., 2012
Ad Hoc Networks, 2012
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012
Odd Perfect Sequences and Sets of Spreading Sequences with Zero or Low Odd Periodic Correlation Zone.
Proceedings of the Sequences and Their Applications - SETA 2012, 2012
Proceedings of the Sequences and Their Applications - SETA 2012, 2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
Proceedings of the Radio Frequency Identification System Security, 2012
Rotating-table game and construction of periodic sequences with lightweight calculation.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
Large zero odd periodic autocorrelation zone of Golay sequences and QAM Golay sequences.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers.
Proceedings of IEEE International Conference on Communications, 2012
LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks.
Proceedings of the Ad Hoc Networks - 4th International ICST Conference, 2012
2011
Near-Complementary Sequences With Low PMEPR for Peak Power Control in Multicarrier Communications.
IEEE Trans. Inf. Theory, 2011
New Sequences Design From Weil Representation With Low Two-Dimensional Correlation in Both Time and Phase Shifts.
IEEE Trans. Inf. Theory, 2011
IEEE Trans. Inf. Theory, 2011
Trace Representation and Linear Complexity of Binary eth Power Residue Sequences of Period p.
IEEE Trans. Inf. Theory, 2011
Upper bound for algebraic immunity on a subclass of Maiorana McFarland class of bent functions.
Inf. Process. Lett., 2011
Int. J. Secur. Networks, 2011
Periods on Two Kinds of nonlinear Feedback Shift Registers with Time Varying Feedback Functions.
Int. J. Found. Comput. Sci., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Large Zero Autocorrelation Zone of Golay Sequences and $4^q$-QAM Golay Complementary Sequences
CoRR, 2011
Ad Hoc Networks, 2011
Proceedings of the Research in Cryptology - 4th Western European Workshop, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011
Proceedings of the Fifth International Workshop on Signal Design and its Applications in Communications, 2011
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011
Proceedings of the Global Communications Conference, 2011
2010
Multiplicative Characters, the Weil Bound, and Polyphase Sequence Families With Low Correlation.
IEEE Trans. Inf. Theory, 2010
New construction of M -ary sequence families with low correlation from the structure of Sidelnikov sequences.
IEEE Trans. Inf. Theory, 2010
IEEE Trans. Inf. Theory, 2010
IEEE Trans. Inf. Theory, 2010
Physical layer assisted authentication for distributed ad hoc wireless sensor networks.
IET Inf. Secur., 2010
A Generalized Construction of OFDM M-QAM Sequences With Low Peak-to-Average Power Ratio
CoRR, 2010
A framework of physical layer technique assisted authentication for vehicular communication networks.
Sci. China Inf. Sci., 2010
A framework toward a self-organizing and self-healing certificate authority group in a Content Addressable Network.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010
New Constructions of Complete Non-cyclic Hadamard Matrices, Related Function Families and LCZ Sequences.
Proceedings of the Sequences and Their Applications - SETA 2010, 2010
Generalized constructions of polyphase sequence families using shift and addition of multiplicative character sequences.
Proceedings of the IEEE International Symposium on Information Theory, 2010
Proceedings of the IEEE International Symposium on Information Theory, 2010
Proceedings of the IEEE International Symposium on Information Theory, 2010
Proceedings of the HOST 2010, 2010
Proceedings of the Global Communications Conference, 2010
Proceedings of the Global Communications Conference, 2010
Proceedings of the Financial Cryptography and Data Security, 2010
Proceedings of the Ad-Hoc, Mobile and Wireless Networks, 9th International Conference, 2010
2009
IEEE Trans. Inf. Theory, 2009
IEEE Trans. Inf. Theory, 2009
Time-Memory-Data Trade-Off Attack on Stream Ciphers Based on Maiorana-McFarland Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IACR Cryptol. ePrint Arch., 2009
A generalized construction of OFDM <i>M</i>-QAM sequences with low peak-to-average power ratio.
Adv. Math. Commun., 2009
Randomly Directed Exploration: An Efficient Node Clone Detection Protocol in Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
Proceedings of the IEEE International Symposium on Information Theory, 2009
Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Near-Complementary Sequences of Various Lengths and Low PMEPR for Multicarrier Communications.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences.
Proceedings of the Coding and Cryptology, Second International Workshop, 2009
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009
Proceedings of the Ad Hoc Networks, First International Conference, 2009
2008
A New Class of Sequences With Zero or Low Correlation Zone Based on Interleaving Technique.
IEEE Trans. Inf. Theory, 2008
IEEE Trans. Inf. Theory, 2008
IEEE Trans. Inf. Theory, 2008
Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity.
Appl. Algebra Eng. Commun. Comput., 2008
A Study on the Pseudorandom Properties of Sequences Generated Via the Additive Order.
Proceedings of the Sequences and Their Applications, 2008
Proceedings of the Sequences and Their Applications, 2008
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms.
Proceedings of the Pairing-Based Cryptography, 2008
Proceedings of the LCN 2008, 2008
2007
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks.
Int. J. Secur. Networks, 2007
Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems over binary fields.
IET Inf. Secur., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
The Perfect Binary Sequence of Period 4 for Low Periodic and Aperiodic Autocorrelations.
Proceedings of the Sequences, Subsequences, and Consequences, International Workshop, 2007
Proceedings of the Sequences, Subsequences, and Consequences, International Workshop, 2007
Proceedings of the Sequences, Subsequences, and Consequences, International Workshop, 2007
Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007
Proceedings of the IEEE Information Theory Workshop on Information Theory for Wireless Networks, 2007
Actions of the Unitary Group on Irreducible/Primitive Polynomials and Their Applications to Randomness of Sequences.
Proceedings of the IEEE Information Theory Workshop on Information Theory for Wireless Networks, 2007
Proceedings of the Parallel and Distributed Processing and Applications, 2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
Proceedings of the Applied Algebra, 2007
2006
IEEE Trans. Inf. Theory, 2006
IEEE Trans. Inf. Theory, 2006
Theor. Comput. Sci., 2006
Des. Codes Cryptogr., 2006
Discret. Appl. Math., 2006
Crosscorrelation Properties of Binary Sequences with Ideal Two-Level Autocorrelation.
Proceedings of the Sequences and Their Applications, 2006
A New Algorithm to Compute Remote Terms in Special Types of Characteristic Sequences.
Proceedings of the Sequences and Their Applications, 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
Proceedings of the Topics in Cryptology, 2006
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Realizations from Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation.
Proceedings of the Coding and Cryptography, International Workshop, 2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the Information Security and Cryptology, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
2004
Asymptotic Behavior of Normalized Linear Complexity of Ultimately Nonperiodic Binary Sequences.
IEEE Trans. Inf. Theory, 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Sequences and Their Applications, 2004
Efficient key agreement and signature schemes using compact representations in GF(p<sup>10</sup>).
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Asymptotic behavior of normalized linear complexity of ultimately non-periodic binary sequences.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
IEEE Trans. Inf. Theory, 2002
IEEE Trans. Inf. Theory, 2002
IEEE Trans. Inf. Theory, 2002
New designs for signal sets with low cross correlation, balance property, and largelinear span: GF(p) case.
IEEE Trans. Inf. Theory, 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
2001
IEEE Trans. Inf. Theory, 2001
New Families of Ideal 2-Level Autocorrelation Ternary Sequences From Second Order DHT.
Electron. Notes Discret. Math., 2001
Proceedings of the Sequences and their Applications, 2001
Proceedings of the Sequences and their Applications, 2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Progress in Cryptology, 2001
Proceedings of the Cryptography and Coding, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
IEEE Trans. Inf. Theory, 2000
On a conjectured ideal autocorrelation sequence, a related triple-error correcting cyclic code.
IEEE Trans. Inf. Theory, 2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
1999
IEEE Trans. Inf. Theory, 1999
IEEE Trans. Inf. Theory, 1999
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999
1998
IEEE Trans. Inf. Theory, 1998
Proceedings of the Sequences and their Applications, 1998
Proceedings of the Sequences and their Applications, 1998
1997
IEEE Trans. Inf. Theory, 1997
1996
1995
IEEE Trans. Inf. Theory, 1995
1994
Synthesis and uniqueness of m-sequences over GF(q<sup>n</sup>) as n-phase sequences over GF(q).
IEEE Trans. Commun., 1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1993
Proceedings of the Applied Algebra, 1993
1990
Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key.
Proceedings of the Advances in Cryptology, 1990