Follow
Guang Gong
Guang Gong
Professor, Dept. ECE, University of Waterloo
Verified email at uwaterloo.ca - Homepage
Title
Cited by
Cited by
Year
Signal design for good correlation: for wireless communication, cryptography, and radar
SW Golomb, G Gong
Cambridge University Press, 2005
15902005
The simeck family of lightweight block ciphers
G Yang, B Zhu, V Suder, MD Aagaard, G Gong
International workshop on cryptographic hardware and embedded systems, 307-329, 2015
3502015
Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers
Q Chai, G Gong
2012 IEEE international conference on communications (ICC), 917-922, 2012
3432012
Theory and applications of q-ary interleaved sequences
G Gong
IEEE Transactions on Information Theory 41 (2), 400-411, 1995
2921995
New designs for signal sets with low cross correlation, balance property, and large linear span: GF (p) case
G Gong
IEEE Transactions on Information Theory 48 (11), 2847-2867, 2002
2382002
Hummingbird: ultra-lightweight cryptography for resource-constrained devices
D Engels, X Fan, G Gong, H Hu, EM Smith
International conference on financial cryptography and data security, 3-18, 2010
1882010
Public-key cryptosystems based on cubic finite field extensions
G Gong, L Harn
IEEE Transactions on Information Theory 45 (7), 2601-2605, 1999
1601999
Binary pseudorandom sequences of period 2/sup n/-1 with ideal autocorrelation
JS No, SW Golomb, G Gong, HK Lee, P Gaal
IEEE Transactions on Information Theory 44 (2), 814-817, 1998
1501998
A new class of sequences with zero or low correlation zone based on interleaving technique
Z Zhou, X Tang, G Gong
IEEE Transactions on Information Theory 54 (9), 4267-4273, 2008
1422008
Hyper-bent functions
AM Youssef, G Gong
Advances in Cryptology—EUROCRYPT 2001: International Conference on the …, 2001
1422001
Hyperbent functions, Kloosterman sums, and Dickson polynomials
P Charpin, G Gong
IEEE Transactions on Information Theory 54 (9), 4230-4238, 2008
1312008
Password based key exchange with mutual authentication
S Jiang, G Gong
International Workshop on Selected Areas in Cryptography, 267-279, 2004
1272004
Cryptographic properties of the Welch-Gong transformation sequence generators
G Gong, AM Youssef
IEEE Transactions on Information Theory 48 (11), 2837-2846, 2002
1152002
PrivFL: Practical privacy-preserving federated regressions on high-dimensional data over mobile networks
K Mandal, G Gong
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security …, 2019
1122019
A new characterization of semi-bent and bent functions on finite fields
K Khoo, G Gong, DR Stinson
Designs, Codes and Cryptography 38, 279-295, 2006
1122006
Communication system security
L Chen, G Gong
CRC press, 2012
1102012
New constructions of binary sequences with optimal autocorrelation value/magnitude
X Tang, G Gong
IEEE Transactions on Information Theory 56 (3), 1278-1286, 2010
1082010
Elliptic curve pseudorandom sequence generators
G Gong, TA Berson, DR Stinson
International Workshop on Selected Areas in Cryptography, 34-48, 1999
1061999
Constructions of quadratic bent functions in polynomial forms
NY Yu, G Gong
IEEE Transactions on Information Theory 52 (7), 3291-3299, 2006
1012006
A unified method for finding impossible differentials of block cipher structures
Y Luo, X Lai, Z Wu, G Gong
Information Sciences 263, 211-220, 2014
992014
The system can't perform the operation now. Try again later.
Articles 1–20