Seguir
Guang Gong
Guang Gong
Professor, Dept. ECE, University of Waterloo
Dirección de correo verificada de uwaterloo.ca - Página principal
Título
Citado por
Citado por
Año
Signal design for good correlation: for wireless communication, cryptography, and radar
SW Golomb, G Gong
Cambridge University Press, 2005
15572005
The simeck family of lightweight block ciphers
G Yang, B Zhu, V Suder, MD Aagaard, G Gong
International workshop on cryptographic hardware and embedded systems, 307-329, 2015
3382015
Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers
Q Chai, G Gong
2012 IEEE international conference on communications (ICC), 917-922, 2012
3282012
Theory and applications of q-ary interleaved sequences
G Gong
IEEE Transactions on Information Theory 41 (2), 400-411, 1995
2861995
New designs for signal sets with low cross correlation, balance property, and large linear span: GF (p) case
G Gong
IEEE Transactions on Information Theory 48 (11), 2847-2867, 2002
2342002
Hummingbird: ultra-lightweight cryptography for resource-constrained devices
D Engels, X Fan, G Gong, H Hu, EM Smith
International conference on financial cryptography and data security, 3-18, 2010
1882010
Public-key cryptosystems based on cubic finite field extensions
G Gong, L Harn
IEEE Transactions on Information Theory 45 (7), 2601-2605, 1999
1571999
Binary pseudorandom sequences of period 2/sup n/-1 with ideal autocorrelation
JS No, SW Golomb, G Gong, HK Lee, P Gaal
IEEE Transactions on Information Theory 44 (2), 814-817, 1998
1471998
Hyper-bent functions
AM Youssef, G Gong
Advances in Cryptology—EUROCRYPT 2001: International Conference on the …, 2001
1432001
A new class of sequences with zero or low correlation zone based on interleaving technique
Z Zhou, X Tang, G Gong
IEEE Transactions on Information Theory 54 (9), 4267-4273, 2008
1422008
Hyperbent functions, Kloosterman sums, and Dickson polynomials
P Charpin, G Gong
IEEE Transactions on Information Theory 54 (9), 4230-4238, 2008
1332008
Password based key exchange with mutual authentication
S Jiang, G Gong
International Workshop on Selected Areas in Cryptography, 267-279, 2004
1252004
Cryptographic properties of the Welch-Gong transformation sequence generators
G Gong, AM Youssef
IEEE Transactions on Information Theory 48 (11), 2837-2846, 2002
1162002
A new characterization of semi-bent and bent functions on finite fields
K Khoo, G Gong, DR Stinson
Designs, Codes and Cryptography 38, 279-295, 2006
1132006
Communication system security
L Chen, G Gong
CRC press, 2012
1082012
New constructions of binary sequences with optimal autocorrelation value/magnitude
X Tang, G Gong
IEEE Transactions on Information Theory 56 (3), 1278-1286, 2010
1072010
Elliptic curve pseudorandom sequence generators
G Gong, TA Berson, DR Stinson
International Workshop on Selected Areas in Cryptography, 34-48, 1999
1051999
Constructions of quadratic bent functions in polynomial forms
NY Yu, G Gong
IEEE Transactions on Information Theory 52 (7), 3291-3299, 2006
1012006
New nonbinary sequences with ideal two-level autocorrelation
T Helleseth, G Gong
IEEE Transactions on Information Theory 48 (11), 2868-2872, 2002
992002
PrivFL: Practical privacy-preserving federated regressions on high-dimensional data over mobile networks
K Mandal, G Gong
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security …, 2019
982019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20