Signal design for good correlation: for wireless communication, cryptography, and radar SW Golomb, G Gong Cambridge University Press, 2005 | 1601 | 2005 |
The simeck family of lightweight block ciphers G Yang, B Zhu, V Suder, MD Aagaard, G Gong International workshop on cryptographic hardware and embedded systems, 307-329, 2015 | 359 | 2015 |
Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers Q Chai, G Gong 2012 IEEE international conference on communications (ICC), 917-922, 2012 | 354 | 2012 |
Theory and applications of q-ary interleaved sequences G Gong IEEE Transactions on Information Theory 41 (2), 400-411, 1995 | 293 | 1995 |
New designs for signal sets with low cross correlation, balance property, and large linear span: GF (p) case G Gong IEEE Transactions on Information Theory 48 (11), 2847-2867, 2002 | 238 | 2002 |
Hummingbird: ultra-lightweight cryptography for resource-constrained devices D Engels, X Fan, G Gong, H Hu, EM Smith International conference on financial cryptography and data security, 3-18, 2010 | 188 | 2010 |
Public-key cryptosystems based on cubic finite field extensions G Gong, L Harn IEEE Transactions on Information Theory 45 (7), 2601-2605, 1999 | 160 | 1999 |
Binary pseudorandom sequences of period 2/sup n/-1 with ideal autocorrelation JS No, SW Golomb, G Gong, HK Lee, P Gaal IEEE Transactions on Information Theory 44 (2), 814-817, 1998 | 150 | 1998 |
A new class of sequences with zero or low correlation zone based on interleaving technique Z Zhou, X Tang, G Gong IEEE Transactions on Information Theory 54 (9), 4267-4273, 2008 | 144 | 2008 |
Hyper-bent functions AM Youssef, G Gong Advances in Cryptology—EUROCRYPT 2001: International Conference on the …, 2001 | 143 | 2001 |
Hyperbent functions, Kloosterman sums, and Dickson polynomials P Charpin, G Gong IEEE Transactions on Information Theory 54 (9), 4230-4238, 2008 | 132 | 2008 |
Password based key exchange with mutual authentication S Jiang, G Gong International Workshop on Selected Areas in Cryptography, 267-279, 2004 | 127 | 2004 |
Cryptographic properties of the Welch-Gong transformation sequence generators G Gong, AM Youssef IEEE Transactions on Information Theory 48 (11), 2837-2846, 2002 | 115 | 2002 |
PrivFL: Practical privacy-preserving federated regressions on high-dimensional data over mobile networks K Mandal, G Gong Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security …, 2019 | 112 | 2019 |
A new characterization of semi-bent and bent functions on finite fields K Khoo, G Gong, DR Stinson Designs, Codes and Cryptography 38, 279-295, 2006 | 112 | 2006 |
Communication system security L Chen, G Gong CRC press, 2012 | 110 | 2012 |
New constructions of binary sequences with optimal autocorrelation value/magnitude X Tang, G Gong IEEE Transactions on Information Theory 56 (3), 1278-1286, 2010 | 108 | 2010 |
Elliptic curve pseudorandom sequence generators G Gong, TA Berson, DR Stinson International Workshop on Selected Areas in Cryptography, 34-48, 1999 | 106 | 1999 |
Constructions of quadratic bent functions in polynomial forms NY Yu, G Gong IEEE Transactions on Information Theory 52 (7), 3291-3299, 2006 | 102 | 2006 |
A unified method for finding impossible differentials of block cipher structures Y Luo, X Lai, Z Wu, G Gong Information Sciences 263, 211-220, 2014 | 100 | 2014 |