Signal design for good correlation: for wireless communication, cryptography, and radar SW Golomb, G Gong Cambridge University Press, 2005 | 1450 | 2005 |
The simeck family of lightweight block ciphers G Yang, B Zhu, V Suder, MD Aagaard, G Gong Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015 | 285 | 2015 |
Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers Q Chai, G Gong 2012 IEEE international conference on communications (ICC), 917-922, 2012 | 280 | 2012 |
Theory and applications of q-ary interleaved sequences G Gong IEEE Transactions on Information Theory 41 (2), 400-411, 1995 | 274 | 1995 |
New designs for signal sets with low cross correlation, balance property, and large linear span: GF (p) case G Gong IEEE Transactions on Information Theory 48 (11), 2847-2867, 2002 | 227 | 2002 |
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices D Engels, X Fan, G Gong, H Hu, EM Smith Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR …, 2010 | 173 | 2010 |
Public-key cryptosystems based on cubic finite field extensions G Gong, L Harn IEEE Transactions on Information Theory 45 (7), 2601-2605, 1999 | 155 | 1999 |
Binary pseudorandom sequences of period 2/sup n/-1 with ideal autocorrelation JS No, SW Golomb, G Gong, HK Lee, P Gaal IEEE Transactions on Information Theory 44 (2), 814-817, 1998 | 148 | 1998 |
Hyper-bent functions AM Youssef, G Gong Advances in Cryptology—EUROCRYPT 2001: International Conference on the …, 2001 | 141 | 2001 |
A new class of sequences with zero or low correlation zone based on interleaving technique Z Zhou, X Tang, G Gong IEEE Transactions on Information Theory 54 (9), 4267-4273, 2008 | 139 | 2008 |
Hyperbent functions, Kloosterman sums, and Dickson polynomials P Charpin, G Gong IEEE Transactions on Information Theory 54 (9), 4230-4238, 2008 | 125 | 2008 |
Password based key exchange with mutual authentication S Jiang, G Gong Selected Areas in Cryptography: 11th International Workshop, SAC 2004 …, 2005 | 123 | 2005 |
Cryptographic properties of the Welch-Gong transformation sequence generators G Gong, AM Youssef IEEE Transactions on Information Theory 48 (11), 2837-2846, 2002 | 109 | 2002 |
A new characterization of semi-bent and bent functions on finite fields K Khoo, G Gong, DR Stinson Designs, Codes and Cryptography 38, 279-295, 2006 | 107 | 2006 |
Communication system security L Chen, G Gong CRC press, 2012 | 105 | 2012 |
Constructions of quadratic bent functions in polynomial forms NY Yu, G Gong IEEE Transactions on Information Theory 52 (7), 3291-3299, 2006 | 99 | 2006 |
New constructions of binary sequences with optimal autocorrelation value/magnitude X Tang, G Gong IEEE Transactions on Information Theory 56 (3), 1278-1286, 2010 | 97 | 2010 |
Elliptic curve pseudorandom sequence generators G Gong, TA Berson, DR Stinson Selected Areas in Cryptography: 6th Annual International Workshop, SAC’99 …, 2000 | 97 | 2000 |
New nonbinary sequences with ideal two-level autocorrelation T Helleseth, G Gong IEEE Transactions on Information Theory 48 (11), 2868-2872, 2002 | 92 | 2002 |
Transform domain analysis of DES G Gong, SW Golomb IEEE transactions on Information Theory 45 (6), 2065-2073, 1999 | 88 | 1999 |