Guang Gong

From MaRDI portal
(Redirected from Person:247133)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Frequency distance sequences for packet detection in physical-layer security. In memory of Kai-Uwe Schmidt
Designs, Codes and Cryptography
2025-04-22Paper
Ursa Minor: the implementation framework for Polaris2025-04-15Paper
Uni/multi variate polynomial embeddings for zkSNARKs
Cryptography and Communications
2025-02-17Paper
On the optimization of Pippenger's bucket method with precomputation2024-10-02Paper
Constructions of complementary sequence sets and complete complementary codes by ideal two-level autocorrelation sequences and permutation polynomials
IEEE Transactions on Information Theory
2024-07-18Paper
The Welch-Gong stream cipher -- evolutionary path
Cryptography and Communications
2024-05-22Paper
FFCSA - finite field constructions, search, and algorithms
ACM Communications in Computer Algebra
2024-05-13Paper
Several secondary methods for constructing bent-negabent functions
Designs, Codes and Cryptography
2023-03-17Paper
PAKEs: new framework, new techniques and more efficient lattice-based constructions in the standard model
Lecture Notes in Computer Science
2022-10-13Paper
On ideal \(t\)-tuple distribution of orthogonal functions in filtering de Bruijn generators
Advances in Mathematics of Communications
2022-07-26Paper
New Constructions of Complementary Sequence Pairs Over 4<sup> <i>q</i> </sup>-QAM
IEEE Transactions on Information Theory
2022-05-30Paper
Correlation power analysis and higher-order masking implementation of WAGE2022-03-25Paper
New Construction of Complementary Sequence (or Array) Sets and Complete Complementary Codes
IEEE Transactions on Information Theory
2021-07-23Paper
Analysis and Efficient Implementations of a Class of Composited de Bruijn Sequences
IEEE Transactions on Computers
2020-12-14Paper
The Fourier spectral characterization for the correlation-immune functions over \(\mathbb{F}_p \)
Cryptography and Communications
2020-09-30Paper
On algebraic immunity of trace inverse functions on finite fields of characteristic two
Journal of Systems Science and Complexity
2019-05-23Paper
Error analysis of weak poly-LWE instances
Cryptography and Communications
2019-05-15Paper
Hardware Optimizations and Analysis for the WG-16 Cipher with Tower Field Arithmetic
IEEE Transactions on Computers
2019-03-07Paper
Rapid hardware design for cryptographic modules with filtering structures over small finite fields2019-02-15Paper
Secure simultaneous bit extraction from Koblitz curves
Designs, Codes and Cryptography
2019-01-11Paper
Towards a Cryptographic Minimal Design: The sLiSCP Family of Permutations
IEEE Transactions on Computers
2018-09-20Paper
scientific article; zbMATH DE number 6900652 (Why is no real title available?)2018-07-09Paper
scientific article; zbMATH DE number 6900637 (Why is no real title available?)2018-07-09Paper
sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives2018-04-26Paper
MILP-based cube attack on the reduced-round WG-5 lightweight stream cipher2018-04-20Paper
On ideal \(t\)-tuple distribution of filtering de Bruijn sequence generators
Cryptography and Communications
2018-03-09Paper
The \textsf{Simeck} family of lightweight block ciphers2018-02-14Paper
Efficient Composited de Bruijn Sequence Generators
IEEE Transactions on Computers
2017-11-10Paper
New Results on Periodic Sequences With Large $k$-Error Linear Complexity
IEEE Transactions on Information Theory
2017-08-08Paper
Algebraic Immunity of S-Boxes Based on Power Mappings: Analysis and Construction
IEEE Transactions on Information Theory
2017-08-08Paper
Trace Representation and Linear Complexity of Binary $e$th Power Residue Sequences of Period $p$
IEEE Transactions on Information Theory
2017-07-27Paper
Near-Complementary Sequences With Low PMEPR for Peak Power Control in Multicarrier Communications
IEEE Transactions on Information Theory
2017-07-27Paper
New Sets of Zero or Low Correlation Zone Sequences via Interleaving Techniques
IEEE Transactions on Information Theory
2017-07-27Paper
New Constructions of Binary Sequences With Optimal Autocorrelation Value/Magnitude
IEEE Transactions on Information Theory
2017-07-27Paper
Multiplicative Characters, the Weil Bound, and Polyphase Sequence Families With Low Correlation
IEEE Transactions on Information Theory
2017-07-27Paper
New Construction of $M$-Ary Sequence Families With Low Correlation From the Structure of Sidelnikov Sequences
IEEE Transactions on Information Theory
2017-07-27Paper
On the Dual of Certain Ternary Weakly Regular Bent Functions
IEEE Transactions on Information Theory
2017-07-12Paper
A Three-Valued Walsh Transform From Decimations of Helleseth–Gong Sequences
IEEE Transactions on Information Theory
2017-07-12Paper
Fast Discrete Fourier Spectra Attacks on Stream Ciphers
IEEE Transactions on Information Theory
2017-07-12Paper
New Sequences Design From Weil Representation With Low Two-Dimensional Correlation in Both Time and Phase Shifts
IEEE Transactions on Information Theory
2017-07-12Paper
New Polyphase Sequence Families With Low Correlation Derived From the Weil Bound of Exponential Sums
IEEE Transactions on Information Theory
2017-06-08Paper
Secure and Efficient LCMQ Entity Authentication Protocol
IEEE Transactions on Information Theory
2017-06-08Paper
On the multi-output filtering model and its applications
Codes, Cryptology and Information Security
2017-06-01Paper
On the PMEPR of Binary Golay Sequences of Length $2^{n}$
IEEE Transactions on Information Theory
2017-05-16Paper
New Families of Optimal Frequency-Hopping Sequences of Composite Lengths
IEEE Transactions on Information Theory
2017-05-16Paper
Feedback Reconstruction and Implementations of Pseudorandom Number Generators from Composited De Bruijn Sequences
IEEE Transactions on Computers
2017-05-16Paper
The Proof of Lin’s Conjecture via the Decimation-Hadamard Transform
IEEE Transactions on Information Theory
2017-05-16Paper
scientific article; zbMATH DE number 6716371 (Why is no real title available?)
IEEE Transactions on Computers
2017-05-16Paper
New almost perfect, odd perfect, and perfect sequences from difference balanced functions with \(d\)-form property
Advances in Mathematics of Communications
2017-03-09Paper
On the existence of aperiodic complementary hexagonal lattice arrays
Contemporary Developments in Finite Fields and Applications
2016-11-08Paper
On \(\omega\)-cyclic-conjugated-perfect quaternary GDJ sequences
Advances in Mathematics of Communications
2016-10-12Paper
Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions
Cryptography and Communications
2016-04-19Paper
Quadratic zero-difference balanced functions, APN functions and strongly regular graphs
Designs, Codes and Cryptography
2016-03-09Paper
More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)
Designs, Codes and Cryptography
2016-02-19Paper
A unified method for finding impossible differentials of block cipher structures
Information Sciences
2016-01-14Paper
Cryptographically Strong de Bruijn Sequences with Large Periods
Selected Areas in Cryptography
2015-12-04Paper
Sequences with good correlation property based on depth and interleaving techniques
Designs, Codes and Cryptography
2015-09-30Paper
A simple construction of almost perfect quinary ASK and QAM sequences
Sequences and Their Applications - SETA 2014
2015-09-09Paper
Generating good span \(n\) sequences using orthogonal functions in nonlinear feedback shift registers
Open Problems in Mathematics and Computational Science
2015-06-22Paper
Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
Cryptography and Communications
2014-10-08Paper
Character sums and polyphase sequence families with low correlation, discrete Fourier transform (DFT), and ambiguity2014-08-07Paper
Optimal parameters for the WG stream cipher family
Cryptography and Communications
2014-06-20Paper
Resilience to distinguishing attacks on WG-7 cipher and their generalizations
Cryptography and Communications
2013-11-14Paper
Correlation of binary sequence families derived from the multiplicative characters of finite fields
Advances in Mathematics of Communications
2013-11-14Paper
Even periodic and odd periodic complementary sequence pairs from generalized Boolean functions
Advances in Mathematics of Communications
2013-05-06Paper
Upper bound for algebraic immunity on a subclass of Maiorana McFarland class of bent functions
Information Processing Letters
2013-04-04Paper
On the security of Hummingbird-2 against side channel cube attacks
Research in Cryptology
2012-10-16Paper
New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences
Lecture Notes in Computer Science
2012-09-07Paper
Odd Perfect Sequences and Sets of Spreading Sequences with Zero or Low Odd Periodic Correlation Zone
Lecture Notes in Computer Science
2012-09-07Paper
BUPLE: Securing Passive RFID Communication through Physical Layer Enhancements
RFID. Security and Privacy
2012-08-20Paper
Periods on two kinds of nonlinear feedback shift registers with time varying feedback functions
International Journal of Foundations of Computer Science
2011-10-10Paper
Accelerating signature-based broadcast authentication for wireless sensor networks
Ad Hoc Networks
2011-02-25Paper
New Constructions of Complete Non-cyclic Hadamard Matrices, Related Function Families and LCZ Sequences
Sequences and Their Applications – SETA 2010
2010-09-08Paper
A generalized construction of OFDM M-QAM sequences with low peak-to-average power ratio
Advances in Mathematics of Communications
2010-03-08Paper
A note on the diagonalization of the discrete Fourier transform
Applied and Computational Harmonic Analysis
2009-12-15Paper
Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates
Selected Areas in Cryptography
2009-11-03Paper
Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences
Lecture Notes in Computer Science
2009-07-23Paper
A trace representation of binary Jacobi sequences
Discrete Mathematics
2009-06-17Paper
Upper Bounds on Algebraic Immunity of Boolean Power Functions
Fast Software Encryption
2009-04-02Paper
Hyperbent Functions, Kloosterman Sums, and Dickson Polynomials
IEEE Transactions on Information Theory
2009-02-24Paper
New Binary Sequences With Optimal Autocorrelation Magnitude
IEEE Transactions on Information Theory
2009-02-24Paper
A New Class of Sequences With Zero or Low Correlation Zone Based on Interleaving Technique
IEEE Transactions on Information Theory
2009-02-24Paper
A Study on the Pseudorandom Properties of Sequences Generated Via the Additive Order
Sequences and Their Applications - SETA 2008
2009-02-10Paper
Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms
Pairing-Based Cryptography – Pairing 2008
2009-02-10Paper
Sequences, DFT and Resistance against Fast Algebraic Attacks
Sequences and Their Applications - SETA 2008
2009-02-10Paper
Constructions of quadratic bent functions in polynomial forms
IEEE Transactions on Information Theory
2008-12-21Paper
A new binary sequence family with low correlation and large size
IEEE Transactions on Information Theory
2008-12-21Paper
The Status of Costas Arrays
IEEE Transactions on Information Theory
2008-12-21Paper
A Note on Low-Correlation Zone Signal Sets
IEEE Transactions on Information Theory
2008-12-21Paper
Asymptotic Behavior of Normalized Linear Complexity of Ultimately Nonperiodic Binary Sequences
IEEE Transactions on Information Theory
2008-12-21Paper
Crosscorrelation Properties of Binary Sequences with Ideal Two-Level Autocorrelation
Sequences and Their Applications – SETA 2006
2008-11-27Paper
A New Algorithm to Compute Remote Terms in Special Types of Characteristic Sequences
Sequences and Their Applications – SETA 2006
2008-11-27Paper
Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity
Applicable Algebra in Engineering, Communication and Computing
2008-08-21Paper
A Survey of Recent Attacks on the Filter Generator
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2008-04-17Paper
Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations
Selected Areas in Cryptography
2008-03-25Paper
New LFSR-Based Cryptosystems and the Trace Discrete Log Problem (Trace-DLP)
Sequences and Their Applications - SETA 2004
2008-03-14Paper
WG: a family of stream ciphers with designed randomness properties
Information Sciences
2008-03-12Paper
Randomness and Representation of Span n Sequences
Lecture Notes in Computer Science
2008-03-07Paper
On Attacks on Filtering Generators Using Linear Subspace Structures
Lecture Notes in Computer Science
2008-03-07Paper
The Perfect Binary Sequence of Period 4 for Low Periodic and Aperiodic Autocorrelations
Lecture Notes in Computer Science
2008-03-07Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Coding and Cryptography
Lecture Notes in Computer Science
2007-05-02Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Two-tuple balance of non-binary sequences with ideal two-level autocorrelation
Discrete Applied Mathematics
2007-01-09Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2006-10-10Paper
On some probabilistic approximations for AES-like S-boxes
Discrete Mathematics
2006-09-14Paper
A new characterization of semi-bent and bent functions on finite fields
Designs, Codes and Cryptography
2006-05-29Paper
On linear complexity of sequences over \(\text{GF}(2^n)\)
Theoretical Computer Science
2006-03-24Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2005-12-27Paper
scientific article; zbMATH DE number 2238187 (Why is no real title available?)2005-12-14Paper
Randomness and Discrepancy Transforms
The International Series in Engineering and Computer Science
2005-11-02Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
New nonbinary sequences with ideal two-level autocorrelation
IEEE Transactions on Information Theory
2005-05-11Paper
Cryptographic properties of the Welch-Gong transformation sequence generators
IEEE Transactions on Information Theory
2005-05-11Paper
New designs for signal sets with low cross correlation, balance property, and large linear span: GF(p) case
IEEE Transactions on Information Theory
2005-05-11Paper
The decimation-Hadamard transform of two-level autocorrelation sequences
IEEE Transactions on Information Theory
2005-05-11Paper
scientific article; zbMATH DE number 2085212 (Why is no real title available?)2004-08-09Paper
scientific article; zbMATH DE number 2085194 (Why is no real title available?)2004-08-09Paper
Notes on \(q\)-ary interleaved sequences
Chinese Science Bulletin
2004-05-18Paper
scientific article; zbMATH DE number 2043347 (Why is no real title available?)2004-02-16Paper
scientific article; zbMATH DE number 1972837 (Why is no real title available?)2004-02-08Paper
scientific article; zbMATH DE number 1943100 (Why is no real title available?)2004-01-08Paper
scientific article; zbMATH DE number 1943095 (Why is no real title available?)2004-01-08Paper
scientific article; zbMATH DE number 1943094 (Why is no real title available?)2003-12-17Paper
scientific article; zbMATH DE number 1980973 (Why is no real title available?)2003-09-15Paper
Generating all linear orthomorphisms without repetition
Discrete Mathematics
2003-06-09Paper
scientific article; zbMATH DE number 1857528 (Why is no real title available?)2003-05-19Paper
scientific article; zbMATH DE number 1594293 (Why is no real title available?)2003-03-12Paper
scientific article; zbMATH DE number 1808211 (Why is no real title available?)2002-12-03Paper
Generating Large Instances of the Gong-Harn Cryptosystem
Cryptography and Coding
2002-11-25Paper
scientific article; zbMATH DE number 1759265 (Why is no real title available?)2002-11-24Paper
scientific article; zbMATH DE number 1808247 (Why is no real title available?)2002-09-26Paper
On interleaved sequences over finite fields
Discrete Mathematics
2002-08-29Paper
Decompositions of cascaded GMW functions
Science in China. Series A
2002-08-15Paper
A conjecture on binary sequences with the "trinomial property"
IEEE Transactions on Information Theory
2002-08-04Paper
scientific article; zbMATH DE number 1740037 (Why is no real title available?)2002-05-14Paper
scientific article; zbMATH DE number 1740047 (Why is no real title available?)2002-05-14Paper
scientific article; zbMATH DE number 1689009 (Why is no real title available?)2002-01-09Paper
scientific article; zbMATH DE number 1972840 (Why is no real title available?)2002-01-01Paper
scientific article; zbMATH DE number 1972838 (Why is no real title available?)2002-01-01Paper
New families of ideal 2-level autocorrelation ternary sequences from second order DHT2001-10-15Paper
scientific article; zbMATH DE number 1091393 (Why is no real title available?)2001-03-04Paper
Public-key cryptosystems based on cubic finite field extensions
IEEE Transactions on Information Theory
2000-09-07Paper
Transform domain analysis of DES
IEEE Transactions on Information Theory
2000-09-07Paper
On a conjectured ideal autocorrelation sequence and a related triple-error correcting cyclic code
IEEE Transactions on Information Theory
2000-09-07Paper
Hadamard transforms of three-term sequences
IEEE Transactions on Information Theory
2000-09-07Paper
Enumeration and criteria for cyclically shift-distinct GMW sequences
IEEE Transactions on Information Theory
2000-09-07Paper
Theory and applications of q-ary interleaved sequences
IEEE Transactions on Information Theory
2000-08-28Paper
Cyclic inequivalence of cascaded GMW-sequences
Discrete Mathematics
2000-08-03Paper
scientific article; zbMATH DE number 1440879 (Why is no real title available?)2000-05-08Paper
Binary sequences with two-level autocorrelation
IEEE Transactions on Information Theory
1999-11-21Paper
Periodic binary sequences with the "trinomial property"
IEEE Transactions on Information Theory
1999-11-21Paper
A new class of nonlinear PN sequences over GF(q/sup n/)
IEEE Transactions on Information Theory
1998-12-13Paper
Binary pseudorandom sequences of period 2/sup n/-1 with ideal autocorrelation
IEEE Transactions on Information Theory
1998-08-02Paper
scientific article; zbMATH DE number 1024499 (Why is no real title available?)1997-06-22Paper
Q-ary cascaded GMW sequences
IEEE Transactions on Information Theory
1997-01-06Paper
scientific article; zbMATH DE number 566338 (Why is no real title available?)1994-05-10Paper
scientific article; zbMATH DE number 566339 (Why is no real title available?)1994-05-10Paper
scientific article; zbMATH DE number 503192 (Why is no real title available?)1994-02-17Paper
scientific article; zbMATH DE number 3764879 (Why is no real title available?)1982-01-01Paper


Research outcomes over time


This page was built for person: Guang Gong