Guang Gong

Orcid: 0000-0003-2684-9259

According to our database1, Guang Gong authored at least 278 papers between 1990 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Awards

IEEE Fellow

IEEE Fellow 2014, "For contributions to sequences and cryptography applied to communications and security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The welch-gong stream cipher - evolutionary path.
Cryptogr. Commun., January, 2024

2023
Constructions of Complementary Sequence Sets and Complete Complementary Codes by Ideal Two-Level Autocorrelation Sequences and Permutation Polynomials.
IEEE Trans. Inf. Theory, July, 2023

FFCSA - Finite Field Constructions, Search, and Algorithms.
ACM Commun. Comput. Algebra, June, 2023

Several secondary methods for constructing bent-negabent functions.
Des. Codes Cryptogr., March, 2023

Status of three classes of sequences.
Cryptogr. Commun., March, 2023

Speeding Up Multi-Scalar Multiplication over Fixed Points Towards Efficient zkSNARKs.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Constructing Quadratic and Cubic Negabent Functions over Finite Fields.
Proceedings of the IEEE International Symposium on Information Theory, 2023

Fast Computation of Multi-Scalar Multiplication for Pairing-Based zkSNARK Applications.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

High-speed OFDM Physical-Layer Key Exchange.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
New Constructions of Complementary Sequence Pairs Over 4<sup>q</sup>-QAM.
IEEE Trans. Inf. Theory, 2022

Polaris: Transparent Succinct Zero-Knowledge Arguments for R1CS with Efficient Verifier.
Proc. Priv. Enhancing Technol., 2022

Systematic Constructions of Bent-Negabent Functions, 2-Rotation Symmetric Bent-Negabent Functions and Their Duals.
CoRR, 2022

Non-standard Golay Complementary Sequence Pair over QAM.
CoRR, 2022

On ideal t-tuple distribution of orthogonal functions in filtering de bruijn generators.
Adv. Math. Commun., 2022

An Upper Bound of the Set Size of Perfect Sequences with Optimal Cross-correlation.
Proceedings of the IEEE International Symposium on Information Theory, 2022

2021
New Construction of Complementary Sequence (or Array) Sets and Complete Complementary Codes.
IEEE Trans. Inf. Theory, 2021

Updatable Linear Map Commitments and Their Applications in Elementary Databases.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Implementation of Lightweight Ciphers and Their Integration into Entity Authentication with IEEE 802.11 Physical Layer Transmission.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

Homomorphic Evaluation of Lightweight Cipher Boolean Circuits.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

Batching Anonymous and Non-Anonymous Membership Proofs for Blockchain Applications.
Proceedings of the IEEE World AI IoT Congress, 2021

2020
Cycle Structures of a Class of Cascaded FSRs.
IEEE Trans. Inf. Theory, 2020

Analysis and Efficient Implementations of a Class of Composited de Bruijn Sequences.
IEEE Trans. Computers, 2020

PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model.
IACR Cryptol. ePrint Arch., 2020

Correlation Power Analysis and Higher-order Masking Implementation of WAGE.
IACR Cryptol. ePrint Arch., 2020

WAGE: An Authenticated Encryption with a Twist.
IACR Cryptol. ePrint Arch., 2020

Constructions of complementary sequence sets and complete complementary codes by 2-level autocorrelation sequences and permutation polynomials.
CoRR, 2020

The Fourier spectral characterization for the correlation-immune functions over $\phantom {\dot {i}\!}\mathbb {F}_{p}$.
Cryptogr. Commun., 2020

FANS: Fuzzing Android Native System Services via Automated Interface Analysis.
Proceedings of the 29th USENIX Security Symposium, 2020

A New Construction of QAM Golay Complementary Sequence Pair.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Pisces: A New Zero-Knowledge Protocol for Blockchain Privacy.
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020

2019
Hardware Optimizations and Analysis for the WG-16 Cipher with Tower Field Arithmetic.
IEEE Trans. Computers, 2019

A New Generalized Paraunitary Generator for Complementary Sets and Complete Complementary Codes of Size 2<sup>m</sup>.
IEEE Signal Process. Lett., 2019

Mesh: A Supply Chain Solution with Locally Private Blockchain Transactions.
Proc. Priv. Enhancing Technol., 2019

Practical Forgery Attacks on Limdolen and HERN.
IACR Cryptol. ePrint Arch., 2019

PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks.
IACR Cryptol. ePrint Arch., 2019

Secure simultaneous bit extraction from Koblitz curves.
Des. Codes Cryptogr., 2019

Implementation of three LWC Schemes in the WiFi 4-Way Handshake with Software Defined Radio.
CoRR, 2019

New Characterizations for the Multi-output Correlation-Immune Boolean Functions.
CoRR, 2019

The Fourier Spectral Characterization for the Correlation-Immune Functions over Fp.
CoRR, 2019

Error analysis of weak Poly-LWE instances.
Cryptogr. Commun., 2019

Lempel-Ziv Compression with Randomized Input-Output for Anti-compression Side-Channel Attacks Under HTTPS/TLS.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

2018
Discrete Fourier Transform of Boolean Functions over the Complex Field and Its Applications.
IEEE Trans. Inf. Theory, 2018

Solomon W. Golomb - Mathematician, Engineer, and Pioneer.
IEEE Trans. Inf. Theory, 2018

SLISCP-light: Towards Hardware Optimized Sponge-specific Cryptographic Permutations.
ACM Trans. Embed. Comput. Syst., 2018

Towards a Cryptographic Minimal Design: The sLiSCP Family of Permutations.
IEEE Trans. Computers, 2018

Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64.
IACR Cryptol. ePrint Arch., 2018

On ideal t-tuple distribution of filtering de Bruijn sequence generators.
Cryptogr. Commun., 2018

Rapid Hardware Design for Cryptographic Modules with Filtering Structures over Small Finite Fields.
Proceedings of the Arithmetic of Finite Fields - 7th International Workshop, 2018

Securing Internet-of-Things.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

2017
Efficient Composited de Bruijn Sequence Generators.
IEEE Trans. Computers, 2017

A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach.
Mob. Inf. Syst., 2017

sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives.
IACR Cryptol. ePrint Arch., 2017

Lelantos: A Blockchain-based Anonymous Physical Delivery System.
IACR Cryptol. ePrint Arch., 2017

New almost perfect, odd perfect, and perfect sequences from difference balanced functions with d-form property.
Adv. Math. Commun., 2017

A new method to construct golay complementary set and near-complementary set by paraunitary matrices.
Proceedings of the Eighth International Workshop on Signal Design and Its Applications in Communications, 2017

MILP-Based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher.
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017

2016
Analysis and Validation of Active Eavesdropping Attacks in Passive FHSS RFID Systems.
IEEE Trans. Inf. Forensics Secur., 2016

Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices.
ACM Trans. Embed. Comput. Syst., 2016

Feedback Reconstruction and Implementations of Pseudorandom Number Generators from Composited De Bruijn Sequences.
IEEE Trans. Computers, 2016

Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications.
EAI Endorsed Trans. Security Safety, 2016

Two new message authentication codes based on APN functions and stream ciphers.
Secur. Commun. Networks, 2016

On algebraic immunity of trace inverse functions on finite fields of characteristic two.
J. Syst. Sci. Complex., 2016

More constructions of differentially 4-uniform permutations on 𝔽<sub>2<sup>2k</sup></sub>.
Des. Codes Cryptogr., 2016

Quadratic zero-difference balanced functions, APN functions and strongly regular graphs.
Des. Codes Cryptogr., 2016

Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions.
Cryptogr. Commun., 2016

On ω-cyclic-conjugated-perfect quaternary GDJ sequences.
Adv. Math. Commun., 2016

Physical Layer Secure Information Exchange Protocol for MIMO Ad Hoc Networks against Passive Attacks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
New Hardware Implementations of WG(29, 11) and WG-16 Stream Ciphers Using Polynomial Basis.
IEEE Trans. Computers, 2015

WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices.
EAI Endorsed Trans. Security Safety, 2015

Conference key establishment protocol using a multivariate polynomial and its applications.
Secur. Commun. Networks, 2015

The Simeck Family of Lightweight Block Ciphers.
IACR Cryptol. ePrint Arch., 2015

Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator.
IACR Cryptol. ePrint Arch., 2015

Sequences with good correlation property based on depth and interleaving techniques.
Des. Codes Cryptogr., 2015

New Message Authentication Code Based on APN Functions and Stream Ciphers.
Proceedings of the Network and System Security - 9th International Conference, 2015

A Novel Physical Layer Security Scheme for MIMO Two-Way Relay Channels.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

Integer arithmetic over ciphertext and homomorphic data aggregation.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
New Implementations of the WG Stream Cipher.
IEEE Trans. Very Large Scale Integr. Syst., 2014

On the PMEPR of Binary Golay Sequences of Length $2^{n}$.
IEEE Trans. Inf. Theory, 2014

The Proof of Lin's Conjecture via the Decimation-Hadamard Transform.
IEEE Trans. Inf. Theory, 2014

New Families of Optimal Frequency-Hopping Sequences of Composite Lengths.
IEEE Trans. Inf. Theory, 2014

Fuzzy Authorization for Cloud Storage.
IEEE Trans. Cloud Comput., 2014

Truly Random Number Generator Based on a Ring Oscillator Utilizing Last Passage Time.
IEEE Trans. Circuits Syst. II Express Briefs, 2014

A unified method for finding impossible differentials of block cipher structures.
Inf. Sci., 2014

Pleco and Plectron - Two Provably Secure Password Hashing Algorithms.
IACR Cryptol. ePrint Arch., 2014

On the Multi-output Filtering Model and Its Applications.
IACR Cryptol. ePrint Arch., 2014

Some Notes on Constructions of Binary Sequences with Optimal Autocorrelation.
CoRR, 2014

Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64.
Cryptogr. Commun., 2014

Optimal parameters for the WG stream cipher family.
Cryptogr. Commun., 2014

A Simple Construction of Almost Perfect Quinary ASK and QAM Sequences.
Proceedings of the Sequences and Their Applications - SETA 2014, 2014

New binary sequences with good correlation based on high-order difference and interleaving techniques.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

On the proof of Lin's conjecture.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Loxin - A solution to password-less universal login.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

A new efficient physical layer OFDM encryption scheme.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Generating Good Span n Sequences Using Orthogonal Functions in Nonlinear Feedback Shift Registers.
Proceedings of the Open Problems in Mathematics and Computational Science, 2014

2013
On the Node Clone Detection in Wireless Sensor Networks.
IEEE/ACM Trans. Netw., 2013

New Polyphase Sequence Families With Low Correlation Derived From the Weil Bound of Exponential Sums.
IEEE Trans. Inf. Theory, 2013

Secure and Efficient LCMQ Entity Authentication Protocol.
IEEE Trans. Inf. Theory, 2013

Framework for MIMO cross-layer secure communication based on STBC.
Telecommun. Syst., 2013

Large Zero Autocorrelation Zones of Golay Sequences and Their Applications.
IEEE Trans. Commun., 2013

More Constructions of Differentially 4-uniform Permutations on $\gf_{2^{2k}}$.
CoRR, 2013

Resilience to distinguishing attacks on WG-7 cipher and their generalizations.
Cryptogr. Commun., 2013

Even periodic and odd periodic complementary sequence pairs from generalized Boolean functions.
Adv. Math. Commun., 2013

Correlation of binary sequence families derived from the multiplicative characters of finite fields.
Adv. Math. Commun., 2013

A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power.
Proceedings of the Radio Frequency Identification System Security, 2013

Securing NFC with Elliptic Curve Cryptography - Challenges and Solutions.
Proceedings of the Radio Frequency Identification System Security, 2013

Randomness properties of stream ciphers for wireless communications.
Proceedings of the Sixth International Workshop on Signal Design and Its Applications in Communications, 2013

On large zero auto/cross correlation zone of Golay/QAM Golay sequences and their applications and related correlation properties.
Proceedings of the Sixth International Workshop on Signal Design and Its Applications in Communications, 2013

Large zero correlation zone of Golay pairs and QAM Golay pairs.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Hardware implementations of the WG-5 cipher for passive RFID tags.
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013

On selection of optimal parameters for the WG stream cipher family.
Proceedings of the 13th Canadian Workshop on Information Theory, 2013

Efficient hardware implementation of the stream cipher WG-16 with composite field arithmetic.
Proceedings of the TrustED'13, 2013

Securing ZigBee smart energy profile 1.x with OpenECC library.
Proceedings of the SEGS'13, 2013

Design space exploration of the lightweight stream cipher WG-8 for FPGAs and ASICs.
Proceedings of the Workshop on Embedded Systems Security, 2013

Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

Character Sums and Polyphase Sequence Families with Low Correlation, Discrete Fourier Transform (DFT), and Ambiguity.
Proceedings of the Finite Fields and Their Applications - Character Sums and Polynomials., 2013

Stream and block ciphers.
Proceedings of the Handbook of Finite Fields., 2013

2012
On the Dual of Certain Ternary Weakly Regular Bent Functions.
IEEE Trans. Inf. Theory, 2012

A Three-Valued Walsh Transform From Decimations of Helleseth-Gong Sequences.
IEEE Trans. Inf. Theory, 2012

HB<sup>C</sup> entity authentication for low-cost pervasive devices.
IET Inf. Secur., 2012

The Weakness of Integrity Protection for LTE.
IACR Cryptol. ePrint Arch., 2012

A Cryptanalysis of HummingBird-2: The Differential Sequence Analysis.
IACR Cryptol. ePrint Arch., 2012

Accelerating signature-based broadcast authentication for wireless sensor networks.
Ad Hoc Networks, 2012

How to develop clairaudience - active eavesdropping in passive RFID systems.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Odd Perfect Sequences and Sets of Spreading Sequences with Zero or Low Odd Periodic Correlation Zone.
Proceedings of the Sequences and Their Applications - SETA 2012, 2012

New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences.
Proceedings of the Sequences and Their Applications - SETA 2012, 2012

Cryptographically Strong de Bruijn Sequences with Large Periods.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 Tags.
Proceedings of the Radio Frequency Identification System Security, 2012

Rotating-table game and construction of periodic sequences with lightweight calculation.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Large zero odd periodic autocorrelation zone of Golay sequences and QAM Golay sequences.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Large zero periodic autocorrelation zone of Golay sequences.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers.
Proceedings of IEEE International Conference on Communications, 2012

LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks.
Proceedings of the Ad Hoc Networks - 4th International ICST Conference, 2012

2011
Near-Complementary Sequences With Low PMEPR for Peak Power Control in Multicarrier Communications.
IEEE Trans. Inf. Theory, 2011

New Sequences Design From Weil Representation With Low Two-Dimensional Correlation in Both Time and Phase Shifts.
IEEE Trans. Inf. Theory, 2011

Fast Discrete Fourier Spectra Attacks on Stream Ciphers.
IEEE Trans. Inf. Theory, 2011

Trace Representation and Linear Complexity of Binary eth Power Residue Sequences of Period p.
IEEE Trans. Inf. Theory, 2011

Upper bound for algebraic immunity on a subclass of Maiorana McFarland class of bent functions.
Inf. Process. Lett., 2011

On the (in)security of two Joint Encryption and Error Correction schemes.
Int. J. Secur. Networks, 2011

Periods on Two Kinds of nonlinear Feedback Shift Registers with Time Varying Feedback Functions.
Int. J. Found. Comput. Sci., 2011

Guess-then-Meet-in-the-Middle Attacks on the KTANTAN Family of Block Ciphers.
IACR Cryptol. ePrint Arch., 2011

An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2.
IACR Cryptol. ePrint Arch., 2011

Large Zero Autocorrelation Zone of Golay Sequences and $4^q$-QAM Golay Complementary Sequences
CoRR, 2011

Computationally efficient mutual entity authentication in wireless sensor networks.
Ad Hoc Networks, 2011

On the Security of Hummingbird-2 against Side Channel Cube Attacks.
Proceedings of the Research in Cryptology - 4th Western European Workshop, 2011

Remedying the Hummingbird Cryptographic Algorithm.
Proceedings of the IEEE 10th International Conference on Trust, 2011

BUPLE: Securing Passive RFID Communication through Physical Layer Enhancements.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

On the optimality of ZCZ sequence sets.
Proceedings of the Fifth International Workshop on Signal Design and its Applications in Communications, 2011

A lightweight privacy-preserving mutual authentication protocol for RFID systems.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

Differential Cryptanalysis of Two Joint Encryption and Error Correction Schemes.
Proceedings of the Global Communications Conference, 2011

2010
Multiplicative Characters, the Weil Bound, and Polyphase Sequence Families With Low Correlation.
IEEE Trans. Inf. Theory, 2010

New construction of M -ary sequence families with low correlation from the structure of Sidelnikov sequences.
IEEE Trans. Inf. Theory, 2010

New constructions of binary sequences with optimal autocorrelation value/magnitude.
IEEE Trans. Inf. Theory, 2010

New sets of zero or low correlation zone sequences via interleaving techniques.
IEEE Trans. Inf. Theory, 2010

Physical layer assisted authentication for distributed ad hoc wireless sensor networks.
IET Inf. Secur., 2010

A Generalized Construction of OFDM M-QAM Sequences With Low Peak-to-Average Power Ratio
CoRR, 2010

A framework of physical layer technique assisted authentication for vehicular communication networks.
Sci. China Inf. Sci., 2010

A framework toward a self-organizing and self-healing certificate authority group in a Content Addressable Network.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

New Constructions of Complete Non-cyclic Hadamard Matrices, Related Function Families and LCZ Sequences.
Proceedings of the Sequences and Their Applications - SETA 2010, 2010

Generalized constructions of polyphase sequence families using shift and addition of multiplicative character sequences.
Proceedings of the IEEE International Symposium on Information Theory, 2010

On the structure of M-ary Sidelnikov sequences of period p<sup>2m</sup> - 1.
Proceedings of the IEEE International Symposium on Information Theory, 2010

A new class of ternary and quaternary sequences with two-level autocorrelation.
Proceedings of the IEEE International Symposium on Information Theory, 2010

FPGA Implementations of the Hummingbird Cryptographic Algorithm.
Proceedings of the HOST 2010, 2010

MIMO Cross-Layer Secure Communication Architecture Based on STBC.
Proceedings of the Global Communications Conference, 2010

A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication.
Proceedings of the Global Communications Conference, 2010

Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices.
Proceedings of the Financial Cryptography and Data Security, 2010

Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks.
Proceedings of the Ad-Hoc, Mobile and Wireless Networks, 9th International Conference, 2010

2009
Algebraic immunity of S-boxes based on power mappings: analysis and construction.
IEEE Trans. Inf. Theory, 2009

New results on periodic sequences with large k-error linear complexity.
IEEE Trans. Inf. Theory, 2009

Build-in wiretap channel I with feedback and LDPC codes.
J. Commun. Networks, 2009

Time-Memory-Data Trade-Off Attack on Stream Ciphers Based on Maiorana-McFarland Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Secure and Efficient HB-CM Entity Authentication Protocol.
IACR Cryptol. ePrint Arch., 2009

A trace representation of binary Jacobi sequences.
Discret. Math., 2009

A Note on the Diagonalization of the Discrete Fourier Transform
CoRR, 2009

A generalized construction of OFDM <i>M</i>-QAM sequences with low peak-to-average power ratio.
Adv. Math. Commun., 2009

Randomly Directed Exploration: An Efficient Node Clone Detection Protocol in Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

New sequence families with zero or low correlation zone via interleaving techniques.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Near-Complementary Sequences of Various Lengths and Low PMEPR for Multicarrier Communications.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

A Novel Framework for Message Authentication in Vehicular Communication Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences.
Proceedings of the Coding and Cryptology, Second International Workshop, 2009

A cross-layer approach to enhance the security of wireless networks based on MIMO.
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009

DHT-Based Detection of Node Clone in Wireless Sensor Networks.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

2008
A New Class of Sequences With Zero or Low Correlation Zone Based on Interleaving Technique.
IEEE Trans. Inf. Theory, 2008

New Binary Sequences With Optimal Autocorrelation Magnitude.
IEEE Trans. Inf. Theory, 2008

Hyperbent Functions, Kloosterman Sums, and Dickson Polynomials.
IEEE Trans. Inf. Theory, 2008

WG: A family of stream ciphers with designed randomness properties.
Inf. Sci., 2008

Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity.
Appl. Algebra Eng. Commun. Comput., 2008

A Study on the Pseudorandom Properties of Sequences Generated Via the Additive Order.
Proceedings of the Sequences and Their Applications, 2008

Sequences, DFT and Resistance against Fast Algebraic Attacks.
Proceedings of the Sequences and Their Applications, 2008

Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms.
Proceedings of the Pairing-Based Cryptography, 2008

Key revocation based on Dirichlet multinomial model for mobile ad hoc networks.
Proceedings of the LCN 2008, 2008

2007
A Note on Low-Correlation Zone Signal Sets.
IEEE Trans. Inf. Theory, 2007

The Status of Costas Arrays.
IEEE Trans. Inf. Theory, 2007

Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks.
Int. J. Secur. Networks, 2007

Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems over binary fields.
IET Inf. Secur., 2007

New Construction for Balanced Boolean Functions with Very High Nonlinearity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

The Perfect Binary Sequence of Period 4 for Low Periodic and Aperiodic Autocorrelations.
Proceedings of the Sequences, Subsequences, and Consequences, International Workshop, 2007

On Attacks on Filtering Generators Using Linear Subspace Structures.
Proceedings of the Sequences, Subsequences, and Consequences, International Workshop, 2007

Randomness and Representation of Span <i>n</i> Sequences.
Proceedings of the Sequences, Subsequences, and Consequences, International Workshop, 2007

Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007

Correlation of Multiple Bent Function Signal Sets.
Proceedings of the IEEE Information Theory Workshop on Information Theory for Wireless Networks, 2007

Actions of the Unitary Group on Irreducible/Primitive Polynomials and Their Applications to Randomness of Sequences.
Proceedings of the IEEE Information Theory Workshop on Information Theory for Wireless Networks, 2007

Distributing Fixed Time Slices in Heterogeneous Networks of Workstations (NOWs).
Proceedings of the Parallel and Distributed Processing and Applications, 2007

Constructions of Multiple Shift-Distinct Signal Sets with Low Correlation.
Proceedings of the IEEE International Symposium on Information Theory, 2007

A Survey of Recent Attacks on the Filter Generator.
Proceedings of the Applied Algebra, 2007

2006
Constructions of Quadratic Bent Functions in Polynomial Forms.
IEEE Trans. Inf. Theory, 2006

A new binary sequence family with low correlation and large size.
IEEE Trans. Inf. Theory, 2006

On linear complexity of sequences over <i>GF</i>(2<sup><i>n</i></sup>).
Theor. Comput. Sci., 2006

On some probabilistic approximations for AES-like s-boxes.
Discret. Math., 2006

A New Characterization of Semi-bent and Bent Functions on Finite Fields*.
Des. Codes Cryptogr., 2006

Two-tuple balance of non-binary sequences with ideal two-level autocorrelation.
Discret. Appl. Math., 2006

Crosscorrelation Properties of Binary Sequences with Ideal Two-Level Autocorrelation.
Proceedings of the Sequences and Their Applications, 2006

A New Algorithm to Compute Remote Terms in Special Types of Characteristic Sequences.
Proceedings of the Sequences and Their Applications, 2006

Crosscorrelation of q-ary Power Residue Sequences of Period p.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Integrated DH-like Key Exchange Protocols from LUC, GH and XTR.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Upper Bounds on Algebraic Immunity of Boolean Power Functions.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

A Round and Communication Efficient Secure Ranking Protocol.
Proceedings of the Topics in Cryptology, 2006

Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006

The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
The editing generator and its cryptanalysis.
Int. J. Wirel. Mob. Comput., 2005

A 32-bit RC4-like Keystream Generator.
IACR Cryptol. ePrint Arch., 2005

Realizations from Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation.
Proceedings of the Coding and Cryptography, International Workshop, 2005

Short Paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc Networks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Comparison of boolean function design.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Maximum correlation of binary signals over fading channels.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Efficient Authenticators with Application to Key Exchange.
Proceedings of the Information Security and Cryptology, 2005

Towards a General RC4-Like Keystream Generator.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

2004
Asymptotic Behavior of Normalized Linear Complexity of Ultimately Nonperiodic Binary Sequences.
IEEE Trans. Inf. Theory, 2004

Password Based Key Exchange with Mutual Authentication.
IACR Cryptol. ePrint Arch., 2004

Editorial.
EURASIP J. Wirel. Commun. Netw., 2004

New LFSR-Based Cryptosystems and the Trace Discrete Log Problem (Trace-DLP).
Proceedings of the Sequences and Their Applications, 2004

Efficient key agreement and signature schemes using compact representations in GF(p<sup>10</sup>).
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Asymptotic behavior of normalized linear complexity of ultimately non-periodic binary sequences.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Multi-service Oriented Broadcast Encryption.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Hybrid Broadcast Encryption and Security Analysis.
IACR Cryptol. ePrint Arch., 2003

Additive Autocorrelation of Resilient Boolean Functions.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

New Constructions for Resilient and Highly Nonlinear Boolean Functions.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
New nonbinary sequences with ideal two-level autocorrelation.
IEEE Trans. Inf. Theory, 2002

Cryptographic properties of the Welch-Gong transformation sequence generators.
IEEE Trans. Inf. Theory, 2002

The decimation-Hadamard transform of two-level autocorrelation sequences.
IEEE Trans. Inf. Theory, 2002

New designs for signal sets with low cross correlation, balance property, and largelinear span: GF(p) case.
IEEE Trans. Inf. Theory, 2002

On interleaved sequences over finite fields.
Discret. Math., 2002

Message Authentication Codes with Error Correcting Capabilities.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

2001
A conjecture on binary sequences with the "Trinomial property".
IEEE Trans. Inf. Theory, 2001

New Families of Ideal 2-Level Autocorrelation Ternary Sequences From Second Order DHT.
Electron. Notes Discret. Math., 2001

Linear Recursive Sequences over Elliptic Curves.
Proceedings of the Sequences and their Applications, 2001

Hyper-Cyclotomic Algebra.
Proceedings of the Sequences and their Applications, 2001

On the Linear Complexity of Generalised Legendre Sequence.
Proceedings of the Sequences and their Applications, 2001

Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

The GH Public-Key Cryptosystem.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem.
Proceedings of the Progress in Cryptology, 2001

Generating Large Instances of the Gong-Harn Cryptosystem.
Proceedings of the Cryptography and Coding, 2001

Hyper-bent Functions.
Proceedings of the Advances in Cryptology, 2001

Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Enumeration and criteria for cyclically shift-distinct GMW sequences.
IEEE Trans. Inf. Theory, 2000

On a conjectured ideal autocorrelation sequence, a related triple-error correcting cyclic code.
IEEE Trans. Inf. Theory, 2000

Cyclic inequivalence of cascaded GMW-sequences.
Discret. Math., 2000

On Welch-Gong Transformation Sequence Generators.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

On the Interpolation Attacks on Block Ciphers.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

1999
Public-key cryptosystems based on cubic finite field extensions.
IEEE Trans. Inf. Theory, 1999

Transform domain analysis of DES.
IEEE Trans. Inf. Theory, 1999

Hadamard transforms of three-term sequences.
IEEE Trans. Inf. Theory, 1999

Binary Sequences with Two-Level Autocorrelation.
IEEE Trans. Inf. Theory, 1999

Periodic Binary Sequences with the "Trinomial Property".
IEEE Trans. Inf. Theory, 1999

Generating all linear orthomorphisms without repetition.
Discret. Math., 1999

Elliptic Curve Pseudorandom Sequence Generators.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999

1998
Binary Pseudorandom Sequences of Period 2<sup>n</sup>-1 with Ideal Autocorrelation.
IEEE Trans. Inf. Theory, 1998

Notes on q-ary Interleaved Sequences.
Proceedings of the Sequences and their Applications, 1998

On Ideal Autocorrelation Sequences Arising from Hyperovals.
Proceedings of the Sequences and their Applications, 1998

1997
A new class of nonlinear PN sequences over GF(q<sup>n</sup>).
IEEE Trans. Inf. Theory, 1997

1996
Q-ary cascaded GMW sequences.
IEEE Trans. Inf. Theory, 1996

1995
Theory and applications of q-ary interleaved sequences.
IEEE Trans. Inf. Theory, 1995

1994
Synthesis and uniqueness of m-sequences over GF(q<sup>n</sup>) as n-phase sequences over GF(q).
IEEE Trans. Commun., 1994

Some Cryptographic Properties of Exponential Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
A New Class of Sequences: Mapping Sequences.
Proceedings of the Applied Algebra, 1993

1990
Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key.
Proceedings of the Advances in Cryptology, 1990


  Loading...