Zidaric, N., G. Gong, M. Aagaard, and A. Jurisic, "What does a CAS need for hardware design automation", International Symposium on Symbolic and Algebraic Computation (ISSAC'23), Tromso, Norway, July 24-27, 2023.
Fei, Y., G. Gong, C. Gongye, K. Mandal, R. Rohit, T. Xu, Y. Yi, and N. Zidaric, "Protected Hardware Implementation of WAGE", NIST Lightweight Cryptography Workshop, Gaithersburg, United States, 10/2020.
Altawy, R., G. Gong, K. Mandal, and R. Rohit, "WAGE: An Authenticated Encryption with a Twist", IACR Transactions on Symmetric Cryptology - Special Issue on Designs for the NIST Lightweight Standardisation Process, vol. 2020, pp. 132–159, 06/2020.
Chen, Y., B. Case, S.H. Gao, and G. Gong, "Error Analysis of Weak Poly-LWE Instances", Journal of Cryptography and Communication Special Issue on Mathematical Methods for Cryptography, pp. 1-16, May/2018.
Gong, G., T. Helleseth, V. Kumar, and S. W. Golomb, "Mathematician, Engineer, and Pioneer", IEEE Transactions on Information Theory Special Issue on Shift - Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb, vol. 64, issue 4, pp. 2844-2857, April/2018.
Rohit, R., R. Altawy, and G. Gong, "MILP-based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher", in the 16th IMA International Conference on Cryptography and Coding (IMACC 2017), LNCS, CACR Technical Report, cacr2017-06, University of Waterloo, vol. 10655, St Catherine's College, University of Oxford, Oxford, UK, pp. 12-14, December/2017.
Wu, T., Y. Tan, K. Mandal, and G. Gong, "On the Multi-Output Filtering Model and Its Applications", in the Proceedings of 2nd International Conference on Codes, Cryptology and Information Security (C2SI), Lecture Notes in Computer Sciences (LNCS), S.E. Hajji et al. Eds., Springer, vol. 10194, pp. 265-281, 2017.
Chen, Y., B. Case, S. Gao, and G. Gong, "Error Analysis of Weak Poly-LWE Instances", In submission Journal of Cryptography and Communications Special Issue on Mathematical Methods for Cryptography, vol. CACR Technical Report cacr2-17-8, University of Waterloo, November/2017.
Gong, G., T. Helleseth, and V. Kumar, "Solomon W. Golomb - A Great Mind in our Era", IEEE Transactions on Information Theory Special Issue on Shift-Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb, April/2018, 2017.
Yang, G., B. Zhu, V. Suder, M. Aagaard, and G. Gong, "The Simeck Family of Lightweight Block Ciphers", Workshop on Cryptographic Hardware and Embedded Systems (CHES 2015), LNCS 9293, pp. 307-329, September/2015.
Zhu, S., and G. Gong, "Fuzzy authorization for cloud storage", IEEE Transactions on Cloud Computing, Special Issue on Cloud Security, vol. 2, issue No. 4, pp. 422-435, October/2014, 2015.
Huo, F., and G. Gong, "A new efficient physical layer OFDM encryption scheme", Proceedings of The 33rd Annual IEEE International Conference on Computer Communications (INFOCOM'14), Technical Report, CACR 2013-01, University of Waterloo, 2013, Toronto, Canada, pp. 1024--1032, 2014.
Zhu, B., X. Fan, and G. Gong, "Loxin -- A Solution to Password-less Universal Login", Proceedings of 2014 IEEE INFOCOM Workshop on Security and Privacy in Big Data (BigSecurity), Technical Report, CACR 2013-24, University of Waterloo, 2013., Toronto, Canada, pp. 494-499, 2014.
Hu, H.G., S. Shao, G. Gong, and T. Helleseth, "On the proof of Lin's conjecture", IEEE International Symposium on Information Theory (ISIT), Honolulu, HI, pp. 1822-1826, July/2014.
Huo, F., C. Yang, G. Gong, and R. Poovendran, "A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power", TCryptology and Information Security Series - The 2013 Workshop on RFID and IoT Security (RFIDSec'13 Asia), Ma and J. Weng (Eds.), vol. 11, Amsterdam, Netherlands, IOS Press, pp. 57-68, November/2013.
Wu, T., and G. Gong, "The weakness of integrity protection for LTE", Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec'13, CACR 2013-04, 2013, University of Waterloo, Canada, Budapest, Hungary, Technical Report, pp. 79-88, April/2013.
Fan, X., K. Mandal, and G. Gong, "WG-8: a lightweight stream cipher for resource-constrained smart devices", Quality, Reliability, Security and Robustness in Heterogeneous Networking (Qshine 2013), , ser. LNICST 115, K. Singh, A.K. Awasthi, and R. Mishra (Eds.), Berlin, Germany: Springer-Verlag, pp. 617-632, 2013.
El-Razouk, H., A. Reyhani-Masoleh, and G. Gong, "New Implementations of the WG Stream Cipher", IEEE Transactions on Very Large Scale Integration (VLSI) Systems, September/2013.
Gong, G., F. Huo, and Y. Yang, "Large zero autocorrelation zone of Golay sequences", The Proceedings of 2012 IEEE International Symposium on Information Theory (ISIT), Cambridge, MA, USA, pp. 1019-1023, 2012.
Fan, X., and G. Gong, "On the security of Hummingbird-2 against side channel cube attacks", The 4th Western European Workshop on Research in Cryptology (WEWoRC 2011), Lecture Notes in Computer Science, F. Armknecht and S. Lucks (Eds.), Springer Verlag, pp. 18-29, 2012.
Fan, X., G. Gong, and H. Hu, "Remedying the Hummingbird Cryptographic Algorithm", The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (SPIoT 2011), Changsha, Hunan, China, November/2011.
Fan, X., G. Gong, and H. Hu, "Remedying the Hummingbird Cryptographic Algorithm", The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (SPIoT 2011), Changsha, Hunan, China, November/2011.
Fan, X.X., and G. Gong, "Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks", Proceedings of the Second International Conference on Ad Hoc Networks (AdHocNets 2010), . Zheng, D. Simplot-Ryl, and V.C.M. Leung (Eds.), Berlin, Germany: Springer-Verlag, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 328-343, 2010.
Li, Z.J., and G. Gong, "Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks", Proceedings of 9th International Conference on Ad Hoc Networks and Wireless (ADHOC-NOW 2010), Lecture Notes in Computer Science, I. Nikolaidis and K. Wu (Eds.), vol. 6288, Berlin, Germany: Springer-Verlag, pp. 149-162, 2010.
Engels, D., X.X. Fan, G. Gong, H.G. Hu, and E. M. Smith, "Hummingbird: ultra-lightweight cryptography for resource-constrained devices", The 14th International Conference on Financial Cryptography and Data Security - FC 2010, LNCS 6054, R. Curtmola et al. (Eds.), Tenerife, Canary Islands, Spain, pp. 3-18, 2010.
Fan, X.X., G. Gong, and D. Jao, "Efficient pairing computation on genus 2 curves in projective coordinates", Pre-proceedings of the 15th Annual Workshop on Selected Areas in Cryptography (SAC 2008), vol. Technical Report, University of Waterloo, CACR 2008-03, Mount Allison University, Sackville, New Brunswick, Canada, Technical Report, University of Waterloo, CACR 2008-03, pp. 17-33, 01-2008.
Hu, H.G., G. Gong, and F.D. Guo, "New results on periodic sequences with large $k$-error linear Error!", New results on periodic sequences with large $k$-error linear Error!, Toronto, Canada, the Proceedings of International Symposium on Information Theory (ISIT 2008), pp. 2409-2413, 07-2008.
Nawaz, Y., and G. Gong, "Distributing fixed time slices in heterogeneous networks of workstations (NOWs)", The Proceedings of the Fifth International Symposium on Parallel and Distributed Processing and Applications (ISPA07), Lecture Notes in Computer Sciences, Stojmenovic et al. (Eds.), , vol. 4742: Springer-Verlag, pp. 612-621, 09-2007.
Gong, G., "Randomness and representation of span n sequences", Sequences, Subsequences, and Consequences, Lecture Notes in Computer Science, S.W. Golomb et al (Eds.), vol. 4893: Springer-Verlag, pp. 192-203, 2007.
Gong, G., S. W. Golomb, and H-Y. Song, "A Note on Low Correlation Zone SignalSets", 40th Annual Conference of Information Sciences and Systems (CISS 2006), vol. Princeton University, Technical Co-Sponsorship With IEEE Information Theory Society, 2006.
Hoeper, K., and G. Gong, "Key revocation for identity-based schemes in mobile ad hoc networks", Proceedings of 5th International Conference on AD-HOC Networks and Wireless -AD HOCNOW, Lecture Notes in Computer Science, vol. 4104, issue T. Kunz and S.S. Ravi (Eds.), pp. 224-237, 2006.
Jiang, S., and G. Gong, "A Round and Communication Efficient Secure Ranking Protocol", RSA Conference 2006, Cryptographers' Track, D. Pointvheval (Ed.), vol. 3860: Lecture Notes in Computer Science, Springer-verlag, pp. 350-364, 02-2005.
Khoo, K., G. Gong, G-E. Tan, and H. -KiatLee, "Comparison of boolean function design", Proceedings of International Symposium on Information Theory (ISIT 2005): Adelaide, Australia, 09-2005.
Xiao, L., S. Tavares, A. Youssef, and G. Gong, "Improved Cascaded Stream Ciphers Using Feedback", Proceedings of 18th Annual Canadian Conference onElectrical and Computer Engineering (CCECE'05), Saskatoon, Canada, 05-2005.
Hoeper, K., and G. Gong, "Limitations of Key Escrow in Ad Hoc Networks", Proceedings of first International Conference on Security and Privacy for Emerging Areas in Communication Networks, Athens, Greece, 10-2005.
"Correlation among signal sets", Sixth International Joint Meeting of the American Mathematics Society (AMS) and the Sociedad Matemtica Mexicana (SMM), Houston, Texas, Coding and Cryptography Session, 2004.
Jiang, S., and G. Gong, "Multi-service Oriented Broadcast Encryption", Australian Conference on Information Security and Privacy, LNCS 3108, vol. H.Wang. et al (Eds.): Springer-verlag, pp. 1-12, 2004.
Gong, G., "Array correlation and sequences with equal magnitude correlation", Mathematical Properties of Sequences and Other Combinatorial Structures, J.-S. No, H.-Y. Song, T. Helleseth, and V.Kumar (Ed), NewYork, Kluwer Academic Publishers, pp. 33-43, 2003.
Jiang, S., and G. Gong, "On Edit Distance Attack to Alternating Step Generator", Mathematical Properties of Sequences and Other Combinatorial Structures, J.-S. No, H.-Y. Song, T. Helleseth, and V.Kumar (Ed), New York, Kluwer Academic Publishers, pp. 85-92, 2003.
Gong, G., and K.M. Khoo, "Additive autocorrelation of resilient boolean functions", the Proceedings of TenthAnnual Workshop on Selected Areas in Cryptography, M. Matrui and R. Zuccherato (Ed.), vol. Berlin, Springer-Verlag, vol. 3006., Ottawa, Canada, Lectures Notes in Computer Science (LNCS), 2003.
Gong, G., and S.Q. Jiang, "The editing generators and its cryptanalysis", the Annual International Workshop on Cryptology and Network Security, the proceedings integrated in the Proceedings of the Ninth International Conference on Distributed Multimedia Systems, Miami, Florida, USA, pp. 673-678, 09-2003.
Dai, Z. D., G. Gong, and H. Y. Song, "Trace Representation of Binary Jacobi Sequences", Proceedings of 2003 IEEE International Symposium on Information Theory (ISIT2003), Yokohama, Japan, pp. 379, 07-2003.
Khoo, K., G. Gong, and D. R. Stinson, "A new family of Gold-like sequences", IEEE International Symposium on Information Theory, Lausanne, Switzerland, 07-2002.
Youssef, A.M., and G. Gong, "Cryptanalysis of a public-key cryptosystem proposed at ACISP2000", Information Security and Privacy, Lectures Notes in Computer Science, Vijay Varadharajan and Yi Mu (Ed.), vol. 2119, Berlin, Germany, Springer-Verlag, pp. 15-20, 2001.
Youssef, A.M., and G. Gong, "Hyper-Bent Functions", Advances in Cryptology- Eurocrypto'2001, CACR 2001-58, vol. Lecture Notes in Computer Science 2045: Springer, pp. 406-419, 2001.
Golomb, S.W., and G. Gong, "Hyper-Cyclotomic Algebra", Sequences and their Applications, Proceedings of SETA'01, CACR 2001-33, vol. Discrete Mathematics and Theoretical Computer Science: Springer, pp. 154-165, 2001.
Dai, Z.D., J.H. Yang, G. Gong, and P. Wang, "Linear complexities of generalized Legendre sequences", Sequences and their Applications, Proceedings of SETA'01, Discrete Mathematics and Theoretical Computer Science, CACR 2001-34: Springer, 2001.
Gong, G., and C. C. Y. Lam, "Recursive sequences over elliptic curves", Sequences and their Applications, Proceedings of SETA'01, CACR 2001-35, vol. Discrete Mathematics and Theoretical Computer Science: Springer, pp. 182-196, 2001.
Gong, G., L. Harn, and H.P. Wu, "The GH public-key cryptosystems", the Proceedings of the Eighth Annual Workshop on Selected Areas in Cryptography, CACR 2001-35, Toronto, 09-2001.
Golomb, S. W., G. Gong, and Z.D. Dai, "Cyclic inequivalence of cascaded GMW sequences", Discrete Mathathematics, vol. 219, issue Technical Report, University of Waterloo, CACR 98-37, pp. 279-285, 2000.
Harn, L., H.Y. Lin, and G. Gong, "A global key recovery system", the Proceeding of the International Workshop on Cryptographic Techniques & E-Commerce, Hong Kong, pp. 81-86, 07-1999.
Golomb, S. W., G. Gong, and L. Mittenthal, "Constructions of or thomorphisms of $Z_2^n$ numbers", Proceedings of the Fifth International Conference on Finite Fields and Applications, Augsburg, Germany, 09-1999.
Gong, G., T. Berson, and D. Stinson, "Elliptic curve pseudo-random sequence generator", the Proceedings of the Sixth Annual Workshop on Selected Areas in Cryptography, Kingston, Canada, 09-1999.
Jiang, S., ZD. Dai, and G. Gong, "Notes on q-ary interleaved sequences", International Conference on Sequences and their Applications,, Singapore, 12-1998.
Gong, G., "A new class of sequences: mapping sequences", the Proceedings of the 10th International Symposium of Applied Algebra, Algebraic Algorithms and Error Correcting Codes: Lecture Notesin Computer Science, 05-1993.