Guang Gong
#159,701
Most Influential Person Now
Guang Gong's AcademicInfluence.com Rankings
Guang Gongengineering Degrees
Engineering
#6829
World Rank
#8176
Historical Rank
Electrical Engineering
#2081
World Rank
#2186
Historical Rank
Applied Physics
#2257
World Rank
#2296
Historical Rank

Download Badge
Engineering
Why Is Guang Gong Influential?
(Suggest an Edit or Addition)Guang Gong's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar (2005) (899)
- The Simeck Family of Lightweight Block Ciphers (2015) (225)
- Theory and applications of q-ary interleaved sequences (1995) (211)
- Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers (2012) (209)
- Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices (2010) (145)
- Public-key cryptosystems based on cubic finite field extensions (1999) (142)
- New designs for signal sets with low cross correlation, balance property, and largelinear span: GF(p) case (2002) (142)
- Binary Pseudorandom Sequences of Period 2n-1 with Ideal Autocorrelation (1998) (111)
- Hyperbent Functions, Kloosterman Sums, and Dickson Polynomials (2008) (111)
- A New Class of Sequences With Zero or Low Correlation Zone Based on Interleaving Technique (2008) (99)
- A New Characterization of Semi-bent and Bent Functions on Finite Fields* (2006) (93)
- Password Based Key Exchange with Mutual Authentication (2004) (88)
- A Survey on Security in Wireless Sensor Networks (2008) (86)
- Constructions of quadratic bent functions in polynomial forms (2006) (85)
- Hyper-bent Functions (2001) (85)
- WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices (2015) (81)
- Cryptographic properties of the Welch-Gong transformation sequence generators (2002) (79)
- New Constructions of Binary Sequences With Optimal Autocorrelation Value/Magnitude (2010) (75)
- A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication (2010) (73)
- A unified method for finding impossible differentials of block cipher structures (2014) (71)
- WG: A family of stream ciphers with designed randomness properties (2008) (71)
- Elliptic Curve Pseudorandom Sequence Generators (1999) (70)
- Transform domain analysis of DES (1999) (70)
- New nonbinary sequences with ideal two-level autocorrelation (2002) (69)
- Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation (2007) (68)
- Towards a General RC4-Like Keystream Generator (2005) (55)
- Communication System Security (2012) (55)
- Accelerating signature-based broadcast authentication for wireless sensor networks (2012) (53)
- A Novel Framework for Message Authentication in Vehicular Communication Networks (2009) (49)
- A new binary sequence family with low correlation and large size (2006) (49)
- Truly Random Number Generator Based on a Ring Oscillator Utilizing Last Passage Time (2014) (48)
- Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers (2009) (48)
- The WG Stream Cipher (2005) (47)
- Ultra-Lightweight Cryptography for Low-Cost RFID Tags : Hummingbird Algorithm and Protocol (2009) (46)
- Randomly directed exploration: An efficient node clone detection protocol in wireless sensor networks (2009) (46)
- Periods on Two Kinds of nonlinear Feedback Shift Registers with Time Varying Feedback Functions (2011) (45)
- Q-ary cascaded GMW sequences (1996) (44)
- New Binary Sequences With Optimal Autocorrelation Magnitude (2008) (43)
- OAuth and ABE based authorization in semi-trusted cloud computing: aauth (2011) (43)
- Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices (2016) (43)
- Progress in Cryptology - INDOCRYPT 2010 (2010) (43)
- More Constructions of Differentially 4-uniform Permutations on $\gf_{2^{2k}}$ (2013) (42)
- A Note on Low-Correlation Zone Signal Sets (2007) (41)
- Physical layer assisted authentication for distributed ad hoc wireless sensor networks (2010) (41)
- Fast Discrete Fourier Spectra Attacks on Stream Ciphers (2011) (40)
- PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks (2019) (40)
- Security Challenges in Smart-Grid Metering and Control Systems (2013) (40)
- The Status of Costas Arrays (2007) (40)
- New Sets of Zero or Low Correlation Zone Sequences via Interleaving Techniques (2010) (38)
- A 32-bit RC4-like Keystream Generator (2005) (38)
- New Construction of $M$-Ary Sequence Families With Low Correlation From the Structure of Sidelnikov Sequences (2010) (38)
- More constructions of differentially 4-uniform permutations on $${\mathbb {F}}_{2^{2k}}$$F22k (2013) (37)
- Large Zero Autocorrelation Zones of Golay Sequences and Their Applications (2013) (37)
- Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks (2006) (37)
- Upper Bounds on Algebraic Immunity of Boolean Power Functions (2006) (36)
- Cryptographically Strong de Bruijn Sequences with Large Periods (2012) (35)
- On the Interpolation Attacks on Block Ciphers (2000) (34)
- On the Node Clone Detection in Wireless Sensor Networks (2013) (33)
- The GH Public-Key Cryptosystem (2001) (33)
- sLiSCP: Simeck-Based Permutations for Lightweight Sponge Cryptographic Primitives (2017) (33)
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64 (2014) (32)
- Signal Design for Good Correlation: Preface (2005) (31)
- Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks (2010) (31)
- New LFSR-Based Cryptosystems and the Trace Discrete Log Problem (Trace-DLP) (2004) (31)
- Fuzzy Authorization for Cloud Storage (2014) (31)
- Multiplicative Characters, the Weil Bound, and Polyphase Sequence Families With Low Correlation (2010) (30)
- Two-tuple balance of non-binary sequences with ideal two-level autocorrelation (2006) (30)
- A new efficient physical layer OFDM encryption scheme (2014) (30)
- Additive Autocorrelation of Resilient Boolean Functions (2003) (28)
- Pre-Authentication and Authentication Models in Ad Hoc Networks (2007) (28)
- Trace Representation and Linear Complexity of Binary $e$th Power Residue Sequences of Period $p$ (2011) (28)
- On a conjectured ideal autocorrelation sequence, a related triple-error correcting cyclic code (2000) (27)
- Sequences and Their Applications - SETA 2006, 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings (2006) (27)
- Lelantos: A Blockchain-Based Anonymous Physical Delivery System (2017) (27)
- New nonbinary sequences with ideal two-level autocorrelation function (2002) (27)
- Near-Complementary Sequences With Low PMEPR for Peak Power Control in Multicarrier Communications (2011) (26)
- A new family of Gold-like sequences (2002) (26)
- New Families of Optimal Frequency-Hopping Sequences of Composite Lengths (2014) (26)
- Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 Passive RFID Tags (2013) (26)
- Linear Recursive Sequences over Elliptic Curves (2001) (26)
- New Construction of Complementary Sequence (or Array) Sets and Complete Complementary Codes (2019) (25)
- Digital signature with a subliminal channel (1997) (25)
- A trace representation of binary Jacobi sequences (2009) (25)
- The weakness of integrity protection for LTE (2013) (24)
- FPGA implementations of the Hummingbird cryptographic algorithm (2010) (24)
- Specification of the Stream Cipher WG-16 Based Confidentiality and Integrity Algorithms (2013) (23)
- Hardware implementations of the WG-5 cipher for passive RFID tags (2013) (22)
- New Constructions for Resilient and Highly Nonlinear Boolean Functions (2003) (22)
- New Implementations of the WG Stream Cipher (2014) (21)
- New Sequences Design From Weil Representation With Low Two-Dimensional Correlation in Both Time and Phase Shifts (2008) (21)
- Quadratic zero-difference balanced functions, APN functions and strongly regular graphs (2014) (21)
- Models of Authentications in Ad Hoc Networks and Their Related Network Properties (2004) (21)
- On the Dual of Certain Ternary Weakly Regular Bent Functions (2012) (20)
- Algebraic Immunity of S-Boxes Based on Power Mappings: Analysis and Construction (2009) (20)
- Survey on Security in Wireless Sensor (2008) (20)
- On some probabilistic approximations for AES-like s-boxes (2006) (19)
- On Quadratic Almost Perfect Nonlinear Functions and Their Related Algebraic Object (2013) (19)
- On Attacks on Filtering Generators Using Linear Subspace Structures (2007) (18)
- On the PMEPR of Binary Golay Sequences of Length $2^{n}$ (2014) (18)
- Selected Areas in Cryptography - 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers (2011) (18)
- Design space exploration of the lightweight stream cipher WG-8 for FPGAs and ASICs (2013) (17)
- NIKE-based Fast Privacy-preserving High-dimensional Data Aggregation for Mobile Devices (2018) (17)
- Crosscorrelation of q-ary Power Residue Sequences of Period p (2006) (17)
- Hardware Implementations of Multi-output Welch-Gong Ciphers (17)
- Secure and Efficient LCMQ Entity Authentication Protocol (2013) (17)
- The decimation-Hadamard transform of two-level autocorrelation sequences (2002) (17)
- Optimal parameters for the WG stream cipher family (2014) (16)
- Analogues to the Gong-Harn and XTR Cryptosystems (16)
- IDENTITY-BASED KEY EXCHANGE PROTOCOLS FOR AD HOC NETWORKS (2005) (16)
- On the Security of Hummingbird-2 against Side Channel Cube Attacks (2011) (16)
- DHT-Based Detection of Node Clone in Wireless Sensor Networks (2009) (16)
- S L I SCP-light: Towards Hardware Optimized Sponge-specific Cryptographic Permutations (2018) (15)
- Binary Sequences with Two-Level Autocorrelation (1999) (15)
- How to develop clairaudience - active eavesdropping in passive RFID systems (2012) (15)
- Build-in wiretap channel I with feedback and LDPC codes (2009) (15)
- Solomon W. Golomb—Mathematician, Engineer, and Pioneer (2018) (15)
- Periodic binary sequences with the "trinomial property" (1997) (15)
- Efficient hardware implementation of the stream cipher WG-16 with composite field arithmetic (2013) (15)
- LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks (2012) (15)
- Synthesis and uniqueness of m-sequences over GF(qn) as n-phase sequences over GF(q) (1994) (14)
- Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations (2007) (14)
- The Proof of Lin’s Conjecture via the Decimation-Hadamard Transform (2013) (14)
- Computationally efficient mutual entity authentication in wireless sensor networks (2011) (14)
- On Edit Distance Attack to Alternating Step Generator (2003) (14)
- Feedback Reconstruction and Implementations of Pseudorandom Number Generators from Composited De Bruijn Sequences (2016) (14)
- New Families of Ideal 2-Level Autocorrelation Ternary Sequences From Second Order DHT (2001) (14)
- A Three-Valued Walsh Transform From Decimations of Helleseth–Gong Sequences (2012) (14)
- New results on periodic sequences with large k-error linear complexity (2008) (13)
- Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates (2009) (13)
- Generating all linear orthomorphisms without repetition (1999) (13)
- BUPLE: Securing Passive RFID Communication through Physical Layer Enhancements (2011) (13)
- Conference key establishment protocol using a multivariate polynomial and its applications (2015) (13)
- Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems over binary fields (2007) (13)
- Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation (2013) (13)
- Asymptotic behavior of normalized linear complexity of ultimately non-periodic binary sequences (2004) (13)
- Differential Cryptanalysis of Two Joint Encryption and Error Correction Schemes (2011) (13)
- Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks (2007) (13)
- On the (in)security of two Joint Encryption and Error Correction schemes (2011) (12)
- New Results on Periodic Sequences With Large $k$-Error Linear Complexity (2009) (12)
- Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 Tags (2012) (12)
- Message Authentication Codes with Error Correcting Capabilities (2002) (12)
- Integer arithmetic over ciphertext and homomorphic data aggregation (2015) (12)
- Probabilistic Generation of Good Span n Sequences from Nonlinear Feedback Shift Registers (2012) (12)
- Framework for MIMO cross-layer secure communication based on STBC (2013) (12)
- A Survey of Recent Attacks on the Filter Generator (2007) (11)
- A Cryptanalysis of HummingBird-2: The Differential Sequence Analysis (2012) (11)
- A New Generalized Paraunitary Generator for Complementary Sets and Complete Complementary Codes of Size ${2^m}$ (2019) (11)
- New Hardware Implementations of WG(29, 11) and WG-16 Stream Ciphers Using Polynomial Basis (2015) (11)
- Signal Design for Good Correlation: Applications of Correlation to the Communication of Information (2005) (11)
- Crosscorrelation Properties of Binary Sequences with Ideal Two-Level Autocorrelation (2006) (11)
- WAGE: An Authenticated Cipher (2019) (10)
- On interleaved sequences over finite fields (2002) (10)
- Mesh: A Supply Chain Solution with Locally Private Blockchain Transactions (2019) (10)
- Efficient key agreement and signature schemes using compact representations in GF(p/sup 10/) (2004) (10)
- Odd Perfect Sequences and Sets of Spreading Sequences with Zero or Low Odd Periodic Correlation Zone (2012) (10)
- Towards a Cryptographic Minimal Design: The sLiSCP Family of Permutations (2018) (10)
- The Perfect Binary Sequence of Period 4 for Low Periodic and Aperiodic Autocorrelations (2007) (10)
- Constructions of Multiple Shift-Distinct Signal Sets with Low Correlation (2007) (9)
- Trace Function Representation of Hall's Sextic Residue Sequences of Period (2003) (9)
- Randomness and Representation of Span n Sequences (2007) (9)
- Sequences, DFT and Resistance against Fast Algebraic Attacks (2008) (9)
- Loxin — A solution to password-less universal login (2014) (9)
- On Data Aggregation with Secure Bloom Filter in Wireless Sensor Networks (2010) (9)
- A lightweight privacy-preserving mutual authentication protocol for RFID systems (2011) (9)
- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions (2016) (9)
- New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences (2012) (9)
- Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64 (2018) (8)
- Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator (2015) (8)
- Resilience to distinguishing attacks on WG-7 cipher and their generalizations (2013) (8)
- An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2 (2011) (8)
- Key revocation based on Dirichlet multinomial model for mobile ad hoc networks (2008) (8)
- Trace Representation of Hall’s Sextic Residue Sequences of Period P ≡ 7 (mod 8) (2003) (8)
- Character Sums and Polyphase Sequence Families with Low Correlation , DFT and Ambiguity (2012) (8)
- New Polyphase Sequence Families With Low Correlation Derived From the Weil Bound of Exponential Sums (2013) (8)
- WAGE: An Authenticated Encryption with a Twist (2020) (8)
- Hardware Optimizations and Analysis for the WG-16 Cipher with Tower Field Arithmetic (2019) (8)
- Efficient Composited de Bruijn Sequence Generators (2017) (8)
- The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions (2006) (8)
- Discrete Fourier Transform of Boolean Functions over the Complex Field and Its Applications (2018) (8)
- SLISCP-light (2018) (8)
- Constructions of Orthomorphisms of ℤ2n (2001) (8)
- Generating Good Span n Sequences Using Orthogonal Functions in Nonlinear Feedback Shift Registers (2014) (8)
- Randomness properties of stream ciphers for wireless communications (2013) (7)
- Hadamard transforms of three-term sequences (1999) (7)
- MIMO Cross-Layer Secure Communication Architecture Based on STBC (2010) (7)
- A MIMO Based Cross-layer Approach to Augment the Security of Wireless Networks (2008) (7)
- Some Cryptographic Properties of Exponential Functions (1994) (7)
- Large Zero Autocorrelation Zone of Golay Sequences and $4^q$-QAM Golay Complementary Sequences (2011) (7)
- Guess-then-Meet-in-the-Middle Attacks on the KTANTAN Family of Block Ciphers (2011) (7)
- Trace representation of binary jacobi sequences (2003) (7)
- SpoC : An Authenticated Cipher Submission to the NIST LWC Competition Submitters / Designers : (2019) (7)
- A Novel Physical Layer Security Scheme for MIMO Two-Way Relay Channels (2015) (7)
- Trace representation and linear complexity of binary-th residue sequences (2003) (7)
- Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms (2008) (7)
- Short Paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc Networks (2005) (6)
- Multi-service Oriented Broadcast Encryption (2004) (6)
- A generalized construction of OFDM M-QAM sequences with low peak-to-average power ratio (2009) (6)
- Securing NFC with Elliptic Curve Cryptography - Challenges and Solutions (2013) (6)
- On Ideal Autocorrelation Sequences Arising from Hyperovals (1998) (6)
- A new method to construct golay complementary set and near-complementary set by paraunitary matrices (2017) (6)
- Rotating-table game and construction of periodic sequences with lightweight calculation (2012) (6)
- A framework toward a self-organizing and self-healing certificate authority group in a Content Addressable Network (2010) (6)
- On the Linear Complexity of Generalised Legendre Sequence (2001) (6)
- On the optimality of ZCZ sequence sets (2011) (6)
- On a sequence conjectured to have ideal 2-level autocorrelation function (1998) (6)
- Security Assessment of TUAK Algorithm Set (2014) (6)
- On Welch-Gong Transformation Sequence Generators (2000) (6)
- New Constructions of Complementary Sequence Pairs Over 4q-QAM (2020) (6)
- Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case (2001) (6)
- Monitoring-Based Key Revocation Schemes for Mobile Ad Hoc Networks: Design and Security Analysis (2009) (6)
- MILP-Based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher (2017) (5)
- Large zero odd periodic autocorrelation zone of Golay sequences and QAM Golay sequences (2012) (5)
- Upper bound for algebraic immunity on a subclass of Maiorana McFarland class of bent functions (2011) (5)
- Constructions of complementary sequence sets and complete complementary codes by 2-level autocorrelation sequences and permutation polynomials (2020) (5)
- The editing generator and its cryptanalysis (2005) (5)
- Time-Memory-Data Trade-off Attack on Stream Ciphers based on Maiorana-McFarland Functions (2007) (5)
- Remedying the Hummingbird Cryptographic Algorithm (2011) (5)
- New Construction for Balanced Boolean Functions with Very High Nonlinearity (2007) (5)
- Bounded-to-unbounded poker game (2000) (5)
- Trace representation of binary e-th residue sequences of period p (2003) (5)
- Optimal parameters for the WG stream cipher family (2013) (4)
- Realizations from Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation (2005) (4)
- Secure simultaneous bit extraction from Koblitz curves (2019) (4)
- Enumeration and criteria for cyclically shift-distinct GMW sequences (2000) (4)
- Novel last passage time based jitter model with application to low slew rate/high noise ring oscillator (2014) (4)
- Hybrid Broadcast Encryption and Security Analysis (2003) (4)
- Preventing or Utilizing Key Escrow in Identity-Based Schemes Employed in Mobile Ad Hoc Networks (2006) (4)
- Some Notes on Constructions of Binary Sequences with Optimal Autocorrelation (2014) (4)
- Cryptographic D-morphic Analysis and Fast Implementations of Composited De Bruijn Sequences (2012) (4)
- Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms (2015) (4)
- An Efficient Stream Cipher WG-16 and its Application for Securing 4G-LTE Networks (2014) (4)
- Large zero correlation zone of Golay pairs and QAM Golay pairs (2013) (4)
- Even periodic and odd periodic complementary sequence pairs from generalized Boolean functions (2013) (4)
- Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications (2016) (4)
- A New Algorithm to Compute Remote Terms in Special Types of Characteristic Sequences (2006) (4)
- A New Family of Gold-like Sequen (2002) (4)
- Generating Large Instances of the Gong-Harn Cryptosystem (2001) (4)
- Error analysis of weak Poly-LWE instances (2019) (4)
- Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000 (2001) (4)
- Signal Design for Good Correlation: Feedback Shift Register Sequences (2005) (4)
- On linear complexity of sequences over GF(2n) (2006) (4)
- Securing Internet-of-Things (2018) (4)
- Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity (2008) (4)
- A cross-layer approach to enhance the security of wireless networks based on MIMO (2009) (4)
- Fast Linear Subspace Attacks on Stream Ciphers (2009) (3)
- Secure and Efficient HB-CM Entity Authentication Protocol (2009) (3)
- Integrated DH-like Key Exchange Protocols from LUC, GH and XTR (2006) (3)
- A Note on the Diagonalization of the Discrete Fourier Transform (2009) (3)
- Design Space Exploration of Hummingbird Implementations on FPGAs (2010) (3)
- New Constructions of Complete Non-cyclic Hadamard Matrices, Related Function Families and LCZ Sequences (2010) (3)
- Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem (2001) (3)
- Cyclic inequivalence of cascaded GMW-sequences (2000) (3)
- On Existence and Invariant of Algebraic Attacks (2004) (3)
- Selected Areas in Cryptography 7th International Workshop, SAC 2010, Revised Selected Papers (2011) (3)
- Correlation of Multiple Bent Function Signal Sets (2007) (3)
- On ideal t-tuple distribution of filtering de Bruijn sequence generators (2018) (3)
- Comparison of boolean function design (2005) (3)
- Cryptanalysis of Wang's original and revised digital signature scheme (2001) (3)
- PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model (2020) (3)
- New almost perfect, odd perfect, and perfect sequences from difference balanced functions with d-form property (2017) (3)
- Practical Forgery Attacks on Limdolen and HERN (2019) (3)
- Correlation Power Analysis and Higher-order Masking Implementation of WAGE (2020) (3)
- sLiSCP-light: Towards Lighter Sponge-specific Cryptographic Permutations (2018) (3)
- On Algebraic Immunity of Trace Inverse Functions over Finite Fields with Characteristic Two (2014) (3)
- Highly nonlinear s-boxes with reduced bound on maximum correlation (extended abstract) (2003) (2)
- A Round and Communication Efficient Secure Ranking Protocol (2006) (2)
- Interleaved Construction of Binary Sequences with Optimal Autocorrelation Magnitude (2006) (2)
- Two new message authentication codes based on APN functions and stream ciphers (2016) (2)
- Analysis and Efficient Implementations of a Class of Composited de Bruijn Sequences (2020) (2)
- Can LWC and PEC be Friends?: Evaluating Lightweight Ciphers in Privacy-enhancing Cryptography (2020) (2)
- A Study on the Pseudorandom Properties of Sequences Generated Via the Additive Order (2008) (2)
- New sequence families with zero or low correlation zone via interleaving techniques (2009) (2)
- Efficient Authenticators with Application to Key Exchange (2005) (2)
- CRYPTANALYSIS OF STREAM CIPHER|A SURVEY (2005) (2)
- Physical Layer Secure Information Exchange Protocol for MIMO Ad Hoc Networks against Passive Attacks (2016) (2)
- Securing ZigBee smart energy profile 1.x with OpenECC library (2013) (2)
- A new class of nonlinear PN sequences over GF(qn) (1997) (2)
- CORR 2001-34 On the Linear Complexity of Generalised Legendre Sequences (2001) (2)
- Lempel-Ziv Compression with Randomized Input-Output for Anti-compression Side-Channel Attacks Under HTTPS/TLS (2019) (2)
- Another View on Cube Attack , Cube Tester , AIDA and Higher Order Differential Cryptanalysis (2011) (2)
- Large zero periodic autocorrelation zone of Golay sequences (2012) (2)
- Rapid Hardware Design for Cryptographic Modules with Filtering Structures over Small Finite Fields (2018) (2)
- HBC entity authentication for low-cost pervasive devices (2012) (2)
- Constructions of Quadratic Bent Functions in (2006) (1)
- The Fourier spectral characterization for the correlation-immune functions over Fp$\phantom {\dot {i}\!}\mathbb {F}_{p}$ (2019) (1)
- Quadratic Bent Functions of Polynomial Forms and their Applications to Bent Sequences (2006) (1)
- On the structure of M-ary Sidelnikov sequences of period p2m − 1 (2010) (1)
- On the Multi-output Filtering Model and Its Applications (2017) (1)
- ON ASYMPTOTIC OPTIMALITY OF BINARY SEQUENCE FAMILIES (1)
- New Ternary and Quaternary Sequences with Two-Level Autocorrelation (2009) (1)
- Efficient Data Aggregation with Secure Bloom Filter in Wireless Sensor Networks (2012) (1)
- Near-Complementary Sequences of Various Lengths and Low PMEPR for Multicarrier Communications (2009) (1)
- A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach (2017) (1)
- A new class of ternary and quaternary sequences with two-level autocorrelation (2010) (1)
- Implementation of three LWC Schemes in the WiFi 4-Way Handshake with Software Defined Radio (2019) (1)
- A framework of physical layer technique assisted authentication for vehicular communication networks (2010) (1)
- On the Quadratic Span of Binary Sequences (2000) (1)
- Generalized constructions of polyphase sequence families using shift and addition of multiplicative character sequences (2010) (1)
- Signal Design for Good Correlation: General Properties of Correlation (2005) (1)
- On algebraic immunity of trace inverse functions on finite fields of characteristic two (2016) (1)
- Actions of the Unitary Group on Irreducible/Primitive Polynomials and Their Applications to Randomness of Sequences (2007) (1)
- Character Sums and Polyphase Sequence Families with Low Correlation, Discrete Fourier Transform (DFT), and Ambiguity (2013) (1)
- Signal Design for Good Correlation: Randomness Measurements and m -Sequences (2005) (1)
- Sequences with good correlation property based on depth and interleaving techniques (2015) (1)
- Array Correlation and Sequences with Equal Magnitude Correlation (2003) (1)
- A conjecture on binary sequences with the "Trinomial property" (2001) (1)
- A Direct Method to Construct Golay Complementary Sets Based on Boolean Functions (2018) (1)
- Elliptic Curve Digital Signatures and Accessories (2007) (1)
- Maximum correlation of binary signals over fading channels (2005) (1)
- A New Construction of QAM Golay Complementary Sequence Pair (2020) (0)
- Proceedings of the 17th international conference on Selected areas in cryptography (2010) (0)
- New Characterizations for the Multi-output Correlation-Immune Boolean Functions (2019) (0)
- Updates on SpoC (2020) (0)
- Signal Design for Good Correlation: Historical Introduction (2005) (0)
- Randomness and Discrepancy Transforms (2004) (0)
- A SURVEY OF KEY REVOCATION SCHEMES IN MOBILE AD HOC NETWORKS (2011) (0)
- Non-standard Golay Complementary Sequence Pair over QAM (2022) (0)
- A Simple Construction of Almost Perfect Quinary ASK and QAM Sequences (2014) (0)
- Key Establishment Using Polynomials (2012) (0)
- Cyclic Difference Sets and Binary Sequences with Two-Level Autocorrelation (2005) (0)
- On the Interpolation Attacks on Block (2001) (0)
- On ideal t-tuple distribution of orthogonal functions in filtering de bruijn generators (2022) (0)
- On the Perfect Cyclically Conjugated Even and Odd Periodic Autocorrelation Properties of Quaternary Golay Sequences (2012) (0)
- CORR 2000-60 Cryptanalysis of a Public Key Cryptosystem Using Matrices Over a Ring (2001) (0)
- A New Class of Sequences: Mapping Sequences (1993) (0)
- CORR 99-60 Discrepancy Transforms and their Applications (2000) (0)
- The Fourier spectral characterization for the correlation-immune functions over Fp\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin (2019) (0)
- Notes onq-ary interleaved sequences (2000) (0)
- Signal Design for Good Correlation: Correlation of Boolean Functions (2005) (0)
- Loxin – A Universal Solution to Password-Free Login (2013) (0)
- Cycle Structures of a Class of Cascaded FSRs (2020) (0)
- New Hardware Implementationsof WG<inline-formula><tex-math notation="LaTeX">$\bf {(29,11)}$</tex-math> <alternatives><inline-graphic xlink:type="simple" xlink:href="elrazouk-ieq1-2346207.gif"/></alternatives></inline-formula> and WG- <inline-formula><tex-math notation="LaTeX">$\bf {16}$</tex-math><a (2015) (0)
- Schemes , Codes and Quadratic Zero-Difference Balanced Functions (2015) (0)
- On the proof of Lin's conjecture (2014) (0)
- CORR 99-29 Decomposition and Classi cation of Cascaded GMW Functions (1999) (0)
- Signal Design for Good Correlation: Cyclic Hadamard Sequences, Part 2 (2005) (0)
- New Bounds and Constructions of Weak Systematic Algebraic Modification Detection Codes (2017) (0)
- Applications to Radar, Sonar, Synchronization, and CDMA (2005) (0)
- Notes on q-ary Interleaved Sequences (1998) (0)
- Homomorphic Evaluation of Lightweight Cipher Boolean Circuits (2021) (0)
- Cyclic Inequivalence of Cascaded GMW - (1998) (0)
- On the existence of aperiodic complementary hexagonal lattice arrays (2016) (0)
- A New Algorithm to Compute Terms in Special Types of Characteristic Sequences (2006) (0)
- Speeding Up Multi-Scalar Multiplication over Fixed Points Towards Efficient zkSNARKs (2023) (0)
- Signal Design for Good Correlation: Finite Fields (2005) (0)
- Investigation of binary sequences with the "trinomial property" (1998) (0)
- On large zero auto/cross correlation zone of Golay/QAM Golay sequences and their applications and related correlation properties (2013) (0)
- Updates on WAGE (2020) (0)
- Hyper-Cyclotomic Algebra (2001) (0)
- Secrecy Capacity Achieving with Physical Layer Security Approach in MIMO Two-Way Relay Channels (2015) (0)
- 2 Arazi ’ s Scheme and the Known-Key Attack (2005) (0)
- Protected Hardware Implementation of WAGE (2020) (0)
- CORR 2001-48 Linear Recursive Sequences over Elliptic Curves (2001) (0)
- New binary sequences with good correlation based on high-order difference and interleaving techniques (2014) (0)
- CORR 2001-35 The GH Public-key Cryptosystem (2001) (0)
- Cyclic Hadamard Sequences, Part 1 (2005) (0)
- New Family of Binary Sequences with Low Correlation and Large Size (0)
- Correlation of binary sequence families derived from the multiplicative characters of finite fields (2013) (0)
- Proceedings of the 2007 international conference on Sequences, subsequences, and consequences (2007) (0)
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64 (2014) (0)
- Signal Sets with Low Crosscorrelation (2005) (0)
- New Message Authentication Code Based on APN Functions and Stream Ciphers (2015) (0)
- A Comprehensive Security Analysis of the TUAK Algorithm Set (2015) (0)
- Updatable Linear Map Commitments and Their Applications in Elementary Databases (2021) (0)
- Polaris: Transparent Succinct Zero-Knowledge Arguments for R1CS with Efficient Verifier (2021) (0)
- U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme (2019) (0)
- Secure simultaneous bit extraction from Koblitz curves (2018) (0)
- Pisces: A New Zero-Knowledge Protocol for Blockchain Privacy (2020) (0)
- CORR 99-64 On the Interpolation Attacks on Block Ciphers (2000) (0)
- Distributing Fixed Time Slices in Heterogeneous Networks of Workstations (NOWs) (2007) (0)
- Systematic Constructions of Bent-Negabent Functions, 2-Rotation Symmetric Bent-Negabent Functions and Their Duals (2022) (0)
- Sequen es with Low Cross (2007) (0)
- On ω-cyclic-conjugated-perfect quaternary GDJ sequences (2016) (0)
- Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key (1990) (0)
- A New Family of Gold-like Sequences (Extended Abstract) (2002) (0)
- CORR 2001-33 Hyper-cyclotomic Algebra (2001) (0)
- An Upper Bound of the Set Size of Perfect Sequences with Optimal Cross-correlation (2022) (0)
- Secure and Energy Efficient Communication in Wireless Sensor Network (2020) (0)
- Updates on ACE (2020) (0)
- Stream and block ciphers (2013) (0)
- Progress in Cryptology – INDOCRYPT 2019: 20th International Conference on Cryptology in India, Hyderabad, India, December 15–18, 2019, Proceedings (2019) (0)
- Transforms of Sequences and Functions (2005) (0)
- A Lightweight Protocol to Robust TID-Based Anti-Counterfeiting (2010) (0)
- Updates on Spix (2020) (0)
- Algebraic Immunity of Some Cryptographic Boolean Functions (2005) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Guang Gong?
Guang Gong is affiliated with the following schools: