Sort by: Author Type Year

2020

Jiang, S., G. Gong, J. He, K. Nguyen, and H. Wang, "PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model", The International Conference on Practice and Theory of Public-Key Cryptography (PKC), Edinburgh, Scotland, May 4-7 2020, 2020.
Chang, Z., G. Gong, and Q. Wang, Cycle Structures of a Class of Cascaded FSRs, 2020.
Gong, G., "Private Computing and Applications to Supply Chain Managements with Locally Private Blockchain Transactions", Blockchain Technology Symposium 2020, Toronto, Canada, 02/2020.

2019

Yi, Y., G. Gong, and K. Mandal, "Implementation of three LWC Schemes in the WiFi 4-Way Handshake with Software Defined Radio", NIST LWC Workshop, NIST Gaithersburg Campus, 2019.
Yang, M., and G. Gong, "Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS", 12th International Symposium on Foundations & Practice of Security, Toulouse, France, Springer, 11/2019.
Yang, M., and G. Gong, "Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS", The 12th International Symposium on Foundations & Practice of Security, 2019, Toulouse, France, 2019.
Rohit, R., and G. Gong, "Practical forgery attacks on Limdolen and HERN", NIST LWC Workshop, NIST Gaithersburg Campus, NIST, 2019.
Mandal, K., and G. Gong, "PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks", The 2019 ACM Cloud Computing Security Workshop (AMC-CCSW), London, UK, London, UK, 11/2019.
Gong, G., M. He, R. Rohit, and Y. Yi, "U-EPS: An ultra-small and efficient post-quantum signature scheme", The 12th International Symposium on Foundations & Practice of Security, Toulouse, France, Springer, 2019.
AlTawy, R., and G. Gong, "Mesh: A Supply Chain Solution with Locally Private Blockchain Transactions", Proceedings on Privacy Enhancing Technologies, vol. 3, pp. 149–169, 2019.
Gong, G., "Securing Internet-of-Things", 11th International Symposium on Foundations & Practice of Security, LNSC, vol. 11358 , Montreal, Nov., 2018, Springer, 2019.
Mandal, K., B. Yang, and G. Gong, "Analysis and Efficient Implementation of a Class of Composited de Bruijn Sequences", IEEE Transactions on Computers, 2019.
Fan, X., G. Gong, B. Schoenmakers, and F. Sica, "Secure Simultaneous Bit Extraction from Koblitz Curves", Journal Designs, Codes and Cryptography, vol. 87, issue 1, pp. 1-13, April/2018, 2019.

2018

Rohit, R., R. Altawy, and G. Gong, "MILP-based Cube Attack on the Reduced-round WG-5 Lightweight Stream Cipher", Cryptography and Coding, Lecture Notes in Computer Science (LNCS), vol. 10655, pp. 333-351, 2018.
Wang, Z., J. Chai, and G. Gong, "The Fourier Spectral Characterization for the Correlation - Immune Functions over $F_p$", Sequences and Their Applications (SETA), Hong Kong, pp. 14, 2018.
Ma, D., Z. Wang, and G. Gong, "A Direct Method to Construct Golay Complementary Sets Based on Boolean Functions", 29th Biennial Symposium on Communications, Toronto, Canada, pp. 5, June/2018.
Rohit, R., and G. Gong, "Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64", Ramp Session Presentation, Crypto 2018, vol. Available in IACR Cryptology, ePrint Archive 2018, Santa Barbara, pp. 699, August/2018.
Zidaric, N., M. D. Aagaard, and G. Gong, "Rapid Hardware Design for Cryptographic Modules with Filtering Structure over Small Finite Fields", International Workshop on the Arithmetic of Finite Fields (WAIFI 2018), Bergen, Norway, June/2018.
Altawy, R., R. Rohit, M. He, K. Mandal, G. Yang, and G. Gong, "sLiSCP-light: Towards Lighter Sponge-specific Cryptographic Permutations", Poster presentation at Cryptographic Hardware and Embedded Systems (CHES 2018), Amsterdam, Netherlands, September 2018.
Ma, D., S. Budisin, Z. Wang, and G. Gong, "A New Generalized Paraunitary Generator for Complementary Sets and Complete Complementary Codes of size 2m", IEEE Signal processing letters, October/2018.
Wang, Z.L., and G. Gong, "Discrete Fourier Transform of Boolean functions over the Complex Field and its Applications", IEEE Transactions on Information Theory Special Issue on Shift-Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb, vol. 64, April/2018.
Chen, Y., B. Case, S.H. Gao, and G. Gong, "Error Analysis of Weak Poly-LWE Instances", Journal of Cryptography and Communication Special Issue on Mathematical Methods for Cryptography, pp. 1-16, May/2018.
Zidaric, N., M. Aagaard, and G. Gong, "Hardware Optimizations and Analysis for the WG-16 Cipher with Tower Field Arithmetic", IEEE Transactions on Computers, January/2019, 2018.
Yang, M., and G. Gong, "Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS", In submission Communication Network Security (CNS), May 30 - June 1, 2018.
Gong, G., T. Helleseth, V. Kumar, and S. W. Golomb, "Mathematician, Engineer, and Pioneer", IEEE Transactions on Information Theory Special Issue on Shift - Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb, vol. 64, issue 4, pp. 2844-2857, April/2018.
Mandal, K., G. Gong, and C. Liu, "NIKE-based Fast Privacy-preserving High-dimensional Data Aggregation for Mobile Devices", Submitted to IEEE Transaction on dependable and secure computing, vol. Technical Report, University of Waterloo, issue CACR 2018-10, December/2018. PDF icon NIKE-based Fast Privacy-preserving High-dimensional DataAggregation for Mobile Devices (PDF) (1.04 MB)
Mandal, K., and G. Gong, "On Ideal t-Tuple Distribution of Orthogonal Functions in Filtering De Bruijn Generators", Journal of Advances in Mathematics of Communications, 09/2018.
Altawy, R., R. Rohit, M. He, K. Mandal, G. Yang, and G. Gong, "sLiSCP-light: Towards Lighter Sponge-specific Cryptographic Permutations", ACM Transactions on Embedded Computing Systems, vol. 17, issue 4, pp. 1-26, 2018.
Altawy, R., R. Rohit, M. He, K. Mandal, G. Yang, and G. Gong, "Towards a Cryptographic Minimal Design: The sLiSCP Family of Permutations", IEEE Transactions on Computers, vol. 67, issue 9, pp. 1341-1358, 2018.

2017

Altawy, R., R. Rohit, M. He, K. Mandal, G. Yang, and G. Gong, "sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives", in Selected Areas in Cryptography, 2017.
Ma, D., Z. Wang, and G. Gong, "A New Method to Construct Golay Complementary set and Near-Complementary set by Paraunitary Matrices", the proceedings of IEEE 2017 Eighth International Workshop on Signal Design and Its Applications in Communications (IWSDA), Sapporo, Japan, September/2017.
Altawy, R., M. ElSheikh, A. Youssef, and G. Gong, "Lelantos: A Blockchain-based Anonymous Physical Delivery System", the 15th International Conference on Privacy, Security and Trust (PST'17), Calgary, Canada, August/2017. PDF icon Lelantos: A Blockchain-based Anonymous PhysicalDelivery System (PDF) (1.27 MB)
Rohit, R., R. Altawy, and G. Gong, "MILP-based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher", in the 16th IMA International Conference on Cryptography and Coding (IMACC 2017), LNCS, CACR Technical Report, cacr2017-06, University of Waterloo, vol. 10655, St Catherine's College, University of Oxford, Oxford, UK, pp. 12-14, December/2017. PDF icon MILP-based Cube Attack on the Reduced-Round WG-5Lightweight Stream Cipher (PDF) (365.7 KB)
Wu, T., Y. Tan, K. Mandal, and G. Gong, "On the Multi-Output Filtering Model and Its Applications", in the Proceedings of 2nd International Conference on Codes, Cryptology and Information Security (C2SI), Lecture Notes in Computer Sciences (LNCS), S.E. Hajji et al. Eds., Springer, vol. 10194, pp. 265-281, 2017.
Gong, G., "Strong Cryptographic Properties of WG Transformation Filtering on de Bruijn Sequences", invited talk at Coding Theory, Cryptography, and Number Theory, at the AMS Meeting at College of Charleston in Charleston, March/2017.
Liu, Q., G. Gong, Y. Wang, and H. Li, "A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach", Mobile Information Systems, vol. 2017, issue Article ID 7843843, pp. 12, 2017.
Wang, Z., and G. Gong, "Discrete Fourier Transform of Boolean Functions over the Complex Field and Its Applications", IEEE Transactions on Information Theory Special Issue on Shift-Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb, April/2018, 2017.
Yang, B., K. Mandal, M. Aagaard, and G. Gong, "Efficient Composited de Bruijn Sequence Generators", IEEE Transactions on Computers, vol. 66, issue 8, pp. 1354-1368, 2017.
Tan, Y., G. Gong, and B. Zhu, "Enhanced criteria on differential uniformity and nonlinearity of cryptographic significant functions", Journal of Cryptography and Communications, vol. 8, issue 2, pp. 291-311, April/2016, 2017.
Chen, Y., B. Case, S. Gao, and G. Gong, "Error Analysis of Weak Poly-LWE Instances", In submission Journal of Cryptography and Communications Special Issue on Mathematical Methods for Cryptography, vol. CACR Technical Report cacr2-17-8, University of Waterloo, November/2017. PDF icon cacr2017-08.pdf (288.05 KB)
Yang, Y., X. Tang, and G. Gong, "New Almost Perfect, Odd Perfect, and Perfect Sequences from Difference Balanced Functions with d-form Property", Advances in Mathematics of Communications, vol. 11, issue 1, pp. 67-76, 2017.
Mandal, K., B. Yang, G. Gong, and M. Aagaard, On Ideal t-Tuple Distribution of Filtering de Bruijn Sequence Generators, vol. 10, issue 4, pp. 629-641, 2017.
Gong, G., T. Helleseth, and V. Kumar, "Solomon W. Golomb - A Great Mind in our Era", IEEE Transactions on Information Theory Special Issue on Shift-Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb, April/2018, 2017.
Altawy, R., R. Rohit, M. He, K. Mandal, G. Yang, and G. Gong, "Towards a Cryptographic Minimal Design: The sLiSCP Family of Permutations", To appear at IEEE Transactions on Computers. CACR Technical Report cacr2017-04, University of Waterloo , 2017. PDF icon sLiSCP: Simeck-based Permutations for Lightweight SpongeCryptographic Primitives (PDF) (1.41 MB)

2016

Chen, Y., Y. Tan, and G. Gong, "New Bounds and Constructions of Weak Systematic Algebraic Modification Detection Codes", Sequences and Their Applications (SETA) 2016, Chengdu, China, October/2016.
Mandal, K., B. Yang, G. Guang, and M. Aagaard, "On ideal t-tuple distribution of filtering de. Bruijn sequence generators", Sequences and Their Applications (SETA) 2016, Chengdu, China, October/2016.
Tan, Y., and G. Gong, "On the existence of aperiodic complementary hexagonal lattice arrays", Contemporary Developments in Finite Fields and Applications, A. Canteaut et al. (Eds.), World Scientific Press, pp. 341-362, 2016.
Liu, Q., and G. Gong, "Physical Layer Secure Information Exchange Protocol for MIMO Ad hoc Networks Against Passive Attacks", the Proceedings of IEEE Globecom 2016 - CISS}, Washington DC, USA, December/2016.
Tan, Y., K. Mandal, T. Wu, and G. Gong, "Security Analysis of TUAK Algorithms for 4G-LTE Authentication and Key Agreement", the 25th International Conference on Computer Communication and Networks (ICCCN)}, Waikoloa, Hawaii, USA, August/2016.
Ma, D., Z. Wang, and H. Li, "A Generalized Construction of Non-Square M-QAM Sequences with Low PMEPR for OFDM Systems", IEICE Transactions, vol. 99-A, issue 6, pp. 1222-1227, 2016.
Huo, F., P. Mitran, and G. Gong, "Analysis and validation of active eavesdropping attacks in passive FHSS RFID systems", IEEE Transactions on Information Forensics and Security, vol. 11, issue 7, pp. 1528-1541, July/2016.
Mandal, K., X. Fan, and G. Gong, "Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices", ACM Transactions on Embedded Computing Systems, vol. 15, issue 1, pp. 1-28, 2016.
Mandal, K., and G. Gong, "Feedback Reconstruction and Implementations of Pseudorandom Number Generators from Composited De Bruijn Sequences", IEEE Transactions on Computers, vol. 65, issue No. 9, pp. 2725-2738, 2016.
Mandal, K., and G. Gong, "Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications", ICST Transactions on Security Safety, vol. 16, issue No. 7, 2016.
Qu, L., Y. Tan, C. Li, and G. Gong, "More results on differentially 4-uniform permutations on $F_2^2k}$", Designs, Codes and Cryptography}, vol. 78, issue 2, pp. 391-408, February/2016.
Carlet, C., G. Gong, and Y. Tan, "Quadratic zero-difference balanced functions, APN functions and strongly regular graphs", Designs, Codes and Cryptography}, vol. 78, issue 3, pp. 629-654, March/2016.

2015

Fuhr, T., G. Leurent, and V. Suder, "Collision Attacks against CAESAR Candidates, Forgery and Key-Recovery against AEZ and Marble", inASIACRYPT’15, Part II, LNCS 9453, 2015.
Mandal, K., and G. Gong, "Generating Good Span n Sequences Using Orthogonal Functions in Nonlinear Feedback Shift Registers", Open Problems in Mathematics and Computational Science, C.K. Koç (Ed.), pp. 127-162, 2015.
Liu, Q., G. Gong, Y. Wang, and H. Li, "A novel physical layer security scheme for MIMO Two-Way relay channels", IEEE Globecom 2015 Workshop on Trusted Communications with Physical Layer Security (GC'15-TCPLS), San Diego, USA, December/2015.
Tan, Y., and G. Gong, "Codes, schemes and quadratic zero-difference balanced functions", Functions and Geometries over Finite Fields, Ottawa, July/2015.
Yang, G., M. Aagaard, and G. Gong, "Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator", NIST Lightweight Cryptography workshop, July/2015.
Chen, Y., and G. Gong, "Integer Arithmetic over Ciphertext and Homomorphic Data Aggregation", Proceedings of 2015 IEEE CNS Workshop on Security and Privacy in the Cloud (SPC), Florence, Italy, pp. 592-596, September/2015.
Suder, V., "International Workshop on Coding and Cryptography", WCC2015, April/2015.
Tan, Y., and G. Gong, "On the existence of aperiodic complementary hexagonal lattice arrays", the 12th International Conference on Finite fields and their applications, Saratoga Spring, NY, July/2015.
Zhu, B., X. Fan, and G. Gong, "Pleco and Plectron - Two Provably Secure Password Hashing Algorithms", The 5th ACM Conference on Data and Application Security and Privacy (CODASPY 2015), pp. 127-129, 2015.
Yang, G., B. Zhu, V. Suder, M. Aagaard, and G. Gong, "The Simeck Family of Lightweight Block Ciphers", Workshop on Cryptographic Hardware and Embedded Systems (CHES 2015), LNCS 9293, pp. 307-329, September/2015.
Mandal, K., Y. Tan, T. Wu, and G. Gong, "A comprehensive security analysis of the TUAK algorithm set", IEEE Transactions on Information Forensics and Security, September/2015.
Tan, Y., and G. Gong, "Codes, schemes and quadratic zero-difference balanced functions", Design, Codes and Cryptography, September/2015.
Harn, L., and G. Gong, "Conference key establishment protocol using a multivariate polynomial and its applications", Journal of Security and Communication Networks, vol. 8, issue 9, pp. 1794-1800, June/2015.
Tan, Y., G. Gong, and B. Zhu, "Enhanced Criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions", Journal of Cryptography and Communications, Springer, June/2015.
Zhu, S., and G. Gong, "Fuzzy authorization for cloud storage", IEEE Transactions on Cloud Computing, Special Issue on Cloud Security, vol. 2, issue No. 4, pp. 422-435, October/2014, 2015.
El-Razouk, H., A. Reyhani-Masoleh, and G. Gong, "New Hardware Implementations of WG(29,11) and WG-16 Stream Ciphers Using Polynomial Basis", IEEE Trans. Comput., vol. 64, issue no. 7, pp. 2020-2035, August/2015.
Wu, T., Y. Tan, K. Mandal, and G. Gong, "On the multi-output filtering model and its applications", Submitted to Journal of Cryptography and Communications, September/2015.
Wu, T., and G. Gong, "Two new message authentication codes based on APN functions and stream ciphers", Security and Communication Networks, December/2015.
Huo, F., and G. Gong, "XOR encryption vs phase encryption: an in-depth analysis", IEEE Transactions on Electromagnetic Compatibility, issue No. 99, pp. 1-9, January/2015.

2014

Gong, G., and S.W. Golomb, "A Simple Construction of Almost Perfect Quinary ASK and QAM Sequences", Sequences and Their Applications - SETA 2014, Lecture Notes in Computer Science, vol. 2014, pp. 109-120, 2014.
Huo, F., and G. Gong, "A new efficient physical layer OFDM encryption scheme", Proceedings of The 33rd Annual IEEE International Conference on Computer Communications (INFOCOM'14), Technical Report, CACR 2013-01, University of Waterloo, 2013, Toronto, Canada, pp. 1024--1032, 2014.
Zhu, B., X. Fan, and G. Gong, "Loxin -- A Solution to Password-less Universal Login", Proceedings of 2014 IEEE INFOCOM Workshop on Security and Privacy in Big Data (BigSecurity), Technical Report, CACR 2013-24, University of Waterloo, 2013., Toronto, Canada, pp. 494-499, 2014.
Hu, H.G., S. Shao, G. Gong, and T. Helleseth, "On the proof of Lin's conjecture", IEEE International Symposium on Information Theory (ISIT), Honolulu, HI, pp. 1822-1826, July/2014.
Huo, F., and G. Gong, "Physical Layer Phase Encryption for Combating the Traffic Analysis Attack", IEEE International Symposium on EMC, Raleigh, USA, pp. 604-608, August/2014.
Huo, F., and G. Gong, "Physical Layer Phase Encryption for Combating the Traffic Analysis Attack", IEEE International Symposium on EMC, Raleigh, USA, pp. 604-608, August/2014.
Feng, J.L., and G. Gong, "WiFi-based Location Services Attack on Dual-band Hardware", IEEE International Symposium on EMC 2014, Raleigh, USA, pp. 155-158, August/2014.
Tan, Y., K. Mandal, and G. Gong, "Characterization of Theta Effect Kernel and Differential Cryptanalysis of Keccak", Design, Codes and Cryptography, 2014.
Tan, Y., G. Gong, and B. Zhu, "Enhanced criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions", Journal of Cryptography and Communications, 2014.
Tan, Y., G. Gong, and B. Zhu, "Enhanced criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions", Journal of Cryptography and Communications, 2014.
Qu, L., Y. Tan, C. Li, and G. Gong, "More Constructions of differentially 4-uniform permutations on GF", Designs, Codes and Cryptography, pp. 1-18, September/2014.
Zhu, B., and G. Gong, "Multidimensional Meet-in-the-Middle Attack and Its Applications to KATAN32/48/64", Journal of Cryptography and Communications, Discrete Structures, Boolean Functions and Sequences (CCDS), vol. 6, issue 4, pp. 313-333, December/2014.
Chung, J.-H., G. Gong, and K. Yang, "New Families of Optimal Frequency-Hopping Sequences of Composite Lengths", IEEE Transactions on Information Theory, vol. 60, issue No. 6, pp. 3688-3697, June/2014.
El-Razouk, H., A. Reyhani-Masoleh, and G. Gong, "New implementations of the WG stream cipher", IEEE Transactions on VLSI, vol. 22, issue No. 9, September/2014.
Leung, B., G. Gong, D. Mcleish, and S. Robson, "Novel last passage time based jitter model with application to low slew rate/high noise ring oscillator", Journal of Analog Integrated Circuits and Signal Processing, vol. 78, issue No. 3, pp. 853-863, March/2014.
Wang, Z., M. Parker, G. Gong, and G.F. Wu, "On the PMEPR of binary Golay sequences of length 2^n", IEEE Transactions on Information Theory, vol. 60, issue 4, pp. 2391-2398, April/2014.
Mandal, K., G. Gong, X. Fan, and M. Aagaard, "Optimal Parameters for the WG Stream Cipher Family", Cryptography and Communications, vol. 6, issue 2, pp. 117-135, June/2014.
Zhu, B., X. Fan, and G. Gong, "Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms", IEEE Trans on Dependable and Secure Computing, 2014.
Carlet, C., G. Gong, and Y. Tan, "Quadratic zero-difference balanced functions, APN functions and strongly regular graphs", Designs, Codes and Cryptography, pp. 1-26, 2014.
Hu, H., S. Shao, G. Gong, and T. Helleseth, "The Proof of Lin's Conjecture via the Decimation-Hadamard Transform", IEEE Transactions on Information Theory, vol. 60, issue No. 8, pp. 5054-5064, August/2014.
Robson, B., B. Leung, and G. Gong, "Truly Random Number Generator Based on Ring Oscillator Utilizing Last Passage Time", IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 61, issue No. 2, pp. 937-941, December/2014.
Huo, F., and G. Gong, "XOR Encryption vs Phase Encryption: An In-depth Analysis", IEEE Transactions on Electromagnetic Compatibility, 2014.
Kaleem, M., and G. Gong, "A Physical Layer DSB Enc Scheme for RFID Systems", Technical Report, CACR 2014-17, University of Waterloo, 2014., 2014.
Zhu, S., and G. Gong, "Fuzzy Authorization for Cloud Storage", Technical Report, CACR 2014-16, University of Waterloo, 2014.
El-Razouk, H., A. Reyhani-Masoleh, and G. Gong, "New Hardware Implementations of WG(29.11) and WG-13 Stream Ciphers Using Polynomial Basis", Technical Report, CACR 2014-02, University of Waterloo, 2014.
Gong, G., K. Mandal, Y. Tan, and T. Wu, "On the multi-ouput filtering model and its applications", Technical Report, CACR 2014-14, University of Waterloo., 2014.
Gong, G., K. Mandal, Y. Tan, and T. Wu, Security Assessment of TUAK Algorithm Set, pp. 119 pages, 2014.
Feng, J., and G. Gong, "WiFi-based Location Services Attack on Dual-band Hardware", IEEE International Symposium on Electromagnetic Compatibility, Raleigh, NC, USA, August/2014.

2013

Gong, G., and K.C. Gupta, "Stream and Block Ciphers", Handbook of Finite Fields, 2013.
Huo, F., C. Yang, G. Gong, and R. Poovendran, "A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power", TCryptology and Information Security Series - The 2013 Workshop on RFID and IoT Security (RFIDSec'13 Asia), Ma and J. Weng (Eds.), vol. 11, Amsterdam, Netherlands, IOS Press, pp. 57-68, November/2013.
Fan, X., T. Wu, and G. Gong, "An Efficient Stream Cipher WG-16 and Its Application for Securing 4G-LTE Networks", The 3rd International Conference on Communication and Network Security (ICCNS'13), London, UK, pp. 16-17, November/2013.
Gong, G., "Character sums and polyphase sequence families with low correlation, DFT and ambiguity", Character Sums and Polynomials, A. Winterhof et al. (Eds.), De Gruyter, Germany, pp. 1-43, 2013.
Yang, G., X. Fan, M. Aagaard, and G. Gong, "Design Space Exploration of the Lightweight Stream Cipher WG-8 for FPGAs and ASICs", The 8th Workshop on Embedded Systems Security (WESS'13), vol. Article No. 8, Montreal, Canada, ACM Press, September/2013.
Fan, X., N. Zidaric, M. Aagaard, and G. Gong, "Efficient Hardware Implementation of the Stream Cipher WG-16 with Composite Field Arithmetic", The 3rd International Workshop on Trustworthy Embedded Devices (TrustED'13), Berlin, Germany, ACM Press, pp. 21-34, November/2014, 2013.
Mandal, K., and G. Gong, "Filtering nonlinear feedback shift registers using Welch-Gong transformations for securing RFID applications", Quality, Reliability, Security and Robustness in Heterogeneous Networking (Qshine 2013), ser. LNICST 115, K. Singh, A.K. Awasthi, and R. Mishra (Eds.), Berlin, Germany: Springer-Verlag, pp. 643-657, 2013.
Aagaard, M. D., G. Gong, and R. K. Mota, "Hardware Implementations of the WG-5 Cipher for Passive RFID Tags", IEEE International Symposium on Hardware-Oriented Security and Trust (HOST'13), Austin, TX, USA, pp. 29-34, June/2013.
Gong, G., F. Huo, and Y. Yang, "Large Zero Correlation Zone of Golay Pairs and QAM Golay Pairs", 2013 IEEE International Symposium on Information Theory Proceedings (ISIT'13), Istanbul, Turkey, pp. 3135-3139, July/2013.
Weng, G., Y. Tan, and G. Gong, "On Quadratic APN Functions and Their Related Algebraic Objects", Proceedings of the International Workshop on Coding and Cryptography (WCC 2013), Bergen, Norway, pp. 48-57, April/2013.
Mandal, K., G. Gong, X. Fan, and M. Aagaard, "On Selection of Optimal Parameters for the WG Stream Cipher Family", Proceedings of 13th Canadian Workshop on Information Theory (CWIT'13), Toronto, Canada, pp. 17-21, June/2013.
Zhang, B.Y., and G. Gong, "Randomness Properties of Stream Ciphers for Wireless Communications", Proceedings of 2013 Sixth International Workshop on Signal Design and its Applications in Communications (IWSDA), Tokyo, Japan, pp. 107-108, October/2013.
Zhu, B., Y. Tan, and G. Gong, "Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation", Cryptology and Network Security - CANS'13, Lecture Notes in Computer Science, vol. 8257, Berlin, Germany: Springer-Verlag, M. Abdalla, C. Nita-Rotaru and R. Dahab (Eds.), pp. 20-38, November/2013.
Fan, X., and G. Gong, "Securing NFC with Elliptic Curve Cryptography -- Challenges and Solutions (Short Paper)", TCryptology and Information Security Series - The 2013 Workshop on RFID and IoT Security (RFIDSec'13 Asia), C. Ma and J. Weng (Eds.), vol. 11, Amsterdam, Netherlands, IOS Press, pp. 97-106, November/2013.
Fan, X., and G. Gong, "Securing ZigBee Smart Energy Profile 1.x with OpenECC Library", The First ACM Workshop on Smart Energy Grid Security (SEGS'13), Berlin, Germany, ACM Press, pp. 17-22, November/2013.
Wu, T., and G. Gong, "The weakness of integrity protection for LTE", Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec'13, CACR 2013-04, 2013, University of Waterloo, Canada, Budapest, Hungary, Technical Report, pp. 79-88, April/2013.
Fan, X., K. Mandal, and G. Gong, "WG-8: a lightweight stream cipher for resource-constrained smart devices", Quality, Reliability, Security and Robustness in Heterogeneous Networking (Qshine 2013), , ser. LNICST 115, K. Singh, A.K. Awasthi, and R. Mishra (Eds.), Berlin, Germany: Springer-Verlag, pp. 617-632, 2013.
Wang, Z.L., and G. Gong, "Correlation of binary sequence families derived from multiplicative character of finite fields", Advances in Mathematics of Communications, vol. 7, issue No. 4, pp. 475-484, October/2013.
Gong, G., S. Goh, and Y. Tan, "Determining All Permutation Polynomials of the Form G(x) + Tr(H(x))", Finite Fields and Their Applications, 2013.
Gong, G., Y. Tan, and B. Zhu, "Enhanced Criteria on Differential Uniformity and Nonlinearity of Cryptographically Signicant Functions", IEEE Trans on Information Theory, 2013.
Yang, Y., X.H. Tang, and G. Gong, "Even periodic and odd periodic complementary sequence pairs from generalized Boolean functions", Advances in Mathematics of Communications, vol. 7, issue No. 2, pp. 113-125, May/2013.
Gong, G., F. Huo, and Y. Yang, "Large Zero Autocorrelation Zone of Golay Sequences and Their Applications", IEEE Transactions on Communications, vol. 61, issue No. 9, pp. 3967-3979, August/2013.
El-Razouk, H., A. Reyhani-Masoleh, and G. Gong, "New Implementations of the WG Stream Cipher", IEEE Transactions on Very Large Scale Integration (VLSI) Systems, September/2013.
Wang, Z.L., G. Gong, and N.Y. Yu, "New polyphase sequence families with low correlation derived from the Weil bound of exponential sums", IEEE Transactions on Information Theory, vol. 59, issue No. 6, pp. 3990-3998, June/2013.
Weng, G., Y. Tan, and G. Gong, "On Quadratic APN Functions and Their Related Algebraic Objects", Designs, Codes and Cryptography, 2013.
Li, Z.J., and G. Gong, "On the node clone detection in wireless sensor networks", IEEE/ACM Transactions on Networking, vol. 21, issue No. 6, pp. 1799-1811, December/2013.
Gong, G., M. Aagaard, and X. Fan, "Resilience to distinguishing attacks on WG-7 cipher and their generalizations", Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences, vol. 5, issue No. 4, pp. 277-289, December/2013.
Li, Z.J., G. Gong, and Z.G. Qin, "Secure and efficient LCMQ entity authentication protocol", IEEE Transactions on Information Theory, June/2013.
Fan, X., and G. Gong, "Security Challenges in Smart-Grid Metering and Control Systems", Technology Innovation Management (TIM) Review, pp. 42-49, July/2013.
Hu., H., S. Shao, G. Gong, and T. Helleseth, The Proof of Lin's Conjecture via the Decimation-Hadamard Transform, 2013.
Mandal, K., X. Fan, and G. Gong, "Warbler: a lightweight pseudorandom number generator for EPC C1 Gen2 passive RFID tags", Journal of RFID Security and Cryptography, vol. 2, issue 1-4, pp. 82-91, 2013.
Hou, F., and G. Gong, "A new efficient physical layer OFDM encryption scheme", Technical Report, CACR 2013-02, 2013, University of Waterloo, Canada, 2013.
Mandal, K., and G. Gong, "Cryptographic D-morphic analysis and fast implementations of composited de Bruijn sequences", Technical Report, CACR 2012-27, 2012, University of Waterloo, 2013.
Mandal, K., G. Gong, X. Fan, and M. Aagaard, "Optimal Parameters for the WG Stream Cipher Family", Technical Report CACR 2013-15 University of Waterloo, 2013.

2012

Gong, G., "Character sums and polyphase sequence families with low correlation, DFT and ambiguity", Character Sums and Polynomials, De Gruyter, Germany, pp. 1-43, 2012.
Chai, Q., and G. Gong, "BUPLE: securing passive RFID communication through physical layer enhancements", RFID Security and Privacy, Lecture Notes in Computer Science, Ari Juels and Christof Paar (Eds.), vol. 7055, Springer, Heidelberg, pp. 127-146, 2012.
Mandal, K., and G. Gong, "Cryptographically strong de Bruijn sequences with large periods", Selected Areas in Cryptography, Lecture Notes in Computer Science, L.R. Knudsen and H. Wu (Eds.), vol. 7707, Springer, Heidelberg, pp. 104-118, 2012.
Chai, Q., G. Gong, and D. Engels, "How to develop clairaudience -- active eavesdropping in passive RFID systems (invited)", The Proceedings of 2012 IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM), San Francisco, CA, USA, pp. 1-6, June/2012.
Gong, G., F. Huo, and Y. Yang, "Large zero autocorrelation zone of Golay sequences", The Proceedings of 2012 IEEE International Symposium on Information Theory (ISIT), Cambridge, MA, USA, pp. 1019-1023, 2012.
Yang, Y., F. Huo, and G. Gong, "Large zero odd periodic autocorrelation zone of Golay sequences and QAM Golay sequences", The Proceedings of 2012 IEEE International Symposium on Information Theory (ISIT), Cambridge, MA, USA, pp. 1024-1028, 2012.
Fan, X., and G. Gong, "LPKM: A lightweight polynomial-based key management protocol for distributed wireless sensor networks", the Proceedings of The 4th International Conference on Ad Hoc Networks, October/2012.
Yang, Y., G. Gong, and X.H. Tang, "Odd perfect sequences and sets of spreading sequences with zero or low odd periodic correlation zone", Sequences and Their Applications (SETA), Lecture Notes in Computer Science, J. Jedwab and T. Helleseth (Eds.), vol. 7280, pp. 1-12, 2012.
Fan, X., and G. Gong, "On the security of Hummingbird-2 against side channel cube attacks", The 4th Western European Workshop on Research in Cryptology (WEWoRC 2011), Lecture Notes in Computer Science, F. Armknecht and S. Lucks (Eds.), Springer Verlag, pp. 18-29, 2012.
Chai, Q., and G. Gong, "Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers", The Proceedings of IEEE ICC 2012 - Communication and Information Systems Security Symposium, Communication and Information Systems Security Symposium, Ottawa, Canada, pp. 917-922, June/2012.
Mandal, K., X. Fan, and G. Gong, "Warbler: a lightweight pseudorandom number generator gor EPC C1 Gen2 RFID tags", Cryptology and Information Security Series - The 2012 Workshop on RFID and IoT Security (RFIDsec'12 Asia), N.W. Lo and Y. Li (Eds.), vol. 8, Amsterdam, Netherlands, IOS Press, pp. 73-84, 2012.
Chai, Q., and G. Gong, "A cryptanalysis of hummingbird-2: the differential sequence analysis", International Journal of Applied Cryptography, 2012.
Gong, G., T. Helleseth, and H.G. Hu, "A three-valued Walsh transform from decimations of Helleseth-Gong sequences", IEEE Transactions on Information Theory, vol. 58, issue No. 2, pp. 1158-1162, February/2012.
Fan, X., and G. Gong, "Accelerating signature-based broadcast authentication for wireless sensor networks", Journal of Ad Hoc Networks, vol. 10, issue No. 4, pp. 723-736, June/2012.
Harn, L., and G. Gong, "Conference key establishment using polynomials", IEEE Transactions on Computers, 2012.
Li, Z.J., and G. Gong, "HB^C entity authentication for low-cost pervasive devices", IET Information Security, 2012.
Gong, G., F. Huo, and Y. Yang, "Large zero autocorrelation zones of Golay sequences and their applications", IEEE Transactions on Communication, November/2012.
Gong, G., T. Helleseth, H.G. Hu, and A. Kholosha, "On the dual of certain ternary weakly regular bent functions", IEEE Transactions on Information Theory, vol. 58, issue No. 2, pp. 2237-2243, April/2012.
Yang, Y., G. Gong, and X.H. Tang, "On the perfect cyclically conjugated even and odd periodic autocorrelation properties of quaternary Golay sequences", IEEE Transactions on Information Theory, 2012.
Gong, G., M. Aagaard, and X. Fan, "Resilience to distinguishing attacks on WG-7 cipher and their generalizations", Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences, 2012.

2011

Fan, X., G. Gong, D. Engels, and E. Smith, "A Lightweight Privacy-Preserving Mutual Authentication Protocol for RFID Systems", Joint Workshop of SCPA 2011 and SaCoNAS 2011, Houston, TX, USA, December/2011.
Mandal, K., X. Fan, and G. Gong, "A Lightweight Pseudorandom Number Generator For EPC Class 1 Gen2 RFID Tags", Western European Workshop on Research in Cryptology (WEWoRC 2011), Bauhaus-University Weimar, Germany, July/2011.
Chai, Q., and G. Gong, "BUPLE: Securing Passive RFID Communication through Physical Layer Enhancements", 7th Annual Workshop on RFID Security and Privacy (RFIDsec'11), Amherst, MA, USA, June/2011.
Chai, Q., and G. Gong, "Differential Cryptanalysis of Two Joint Encryption and Error Correction Schemes", IEEE Global Communications Conference (GLOBECOM'11), Houston, TX, USA, December/2011.
Yang, Y., X.H. Tang, G. Gong, and Z.C. Zhou, "On the optimality of ZCZ sequence sets", IWSDA, Guilin, Guangxi, pp. 36-39, 2011.
Fan, X., and G. Gong, "On the Security of Hummingbird-2 against Side Channel Cube Attacks", Western European Workshop on Research in Cryptology (WEWoRC 2011), Bauhaus-University Weimar, Germany, July/2011.
Fan, X., G. Gong, and H. Hu, "Remedying the Hummingbird Cryptographic Algorithm", The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (SPIoT 2011), Changsha, Hunan, China, November/2011.
Fan, X., G. Gong, and H. Hu, "Remedying the Hummingbird Cryptographic Algorithm", The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (SPIoT 2011), Changsha, Hunan, China, November/2011.
Safkhani, M., N. Bagheri, M. Naderi, Y. Luo, and Q. Chai, "Tag Impersonation Attack on Two RFID Mutual Authentication Protocols", First International Workshop on Lightweight Cryptography (LWCrypt 2011), Vienna, Austria, August/2011.
Li, Z.J., and G. Gong, "Computationally Efficient Mutual Entity Authentication in Wireless Sensor Networks", Journal of Ad Hoc Networks, vol. 9, issue No. 2, pp. 202-215, 2011.
Gong, G., S. Ronjom, T. Helleseth, and H. Hu, "Fast Discrete Fourier Spectra Attacks on Stream Ciphers", IEEE Transactions on Information Theory, vol. 57, pp. 5555-5565, August/2011.
Yu, N.Y., and G. Gong, "Near-complementary sequences with low PMEPR for peak power control in multicarrier communications", IEEE Transactions on Information Theory, vol. 57, issue No. 1, pp. 505-513, January/2011.
Wang, Z.L., and G. Gong, "New sequences design from Weil representation with low two-dimensional correlation in both time and phase shifts", IEEE Transactions on Information Theory, vol. 57, issue No. 7, pp. 4600 - 4611, July/2011.
Hu, H., and G. Gong, "Periods on two kinds of nonlinear feedback shift registers with time varying feedback functions", International Journal of Foundations of Computer Science, vol. 22, issue No. 6, pp. 1317-1329, 2011.
Dai, Z. D., G. Gong, H.Y. Song, and D.F. Ye, "Trace representation and linear complexity of binary e-th power residue sequences of period p", IEEE Trans. on Inform Theory, accepted., 2011.
Gupta, K.C., Y. Nawaz, and G. Gong, "Upper Bound for Algebraic Immunity on a Subclass of Maiorana McFarland Class of Bent Functions", Information Processing Letters, vol. 111, pp. 247-249, 2011.
Gong, G., "A Closer Look at Selective DFT Attacks", Technical Report, CACR 2011-35., University of Waterloo, 2011.
Chai, Q., X. Fan, and G. Gong, "An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2", Cryptology ePrint Archive, Report 2011/247, 2011.
Zhu, and G. Gong, "Guess-then-meet-in-the-middle attacks on the KTANTAN family of block ciphers", Technical Report, CACR 2011-34, University of Waterloo, Canada, 2011.
Lam, C., M. Aagaard, and G. Gong, "Hardware Implementations of Multi-output Welch-Gong Ciphers", Technical Report, CACR 2011-01, University of Waterloo, 2011.
Chai, Q., and G. Gong, "Verifiable Symmetric Searchable Encryption For Semi-honest-but-curious Cloud Servers", , Technical Report CACR 2011-22, 2011.

2010

Guo, K., and G. Gong, "New Constructions of Complete Non-cyclic Hadamard Matrices, Related Function Families and LCZ Sequences", Proceedings of Sequences and Their Applications, Lecture Notes in Computer Sciences, vol. 6338, Springer, pp. 259-269, 2010.
Tassanaviboon, A., and G. Gong, "A Framework Toward a Self-Organizing and Self-Healing Certificate Authority Group in a Content Addressable Network", Proceedings of the 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2010), pp. 614-621, 2010. PDF icon A Framework Toward a Self-Organizing and Self-Healing Certificate Authority Group in a Content Addressable Network (PDF) (188.56 KB)
Chai, Q., and G. Gong, "A lightweight protocol to robust TID-based anti-counterfeiting", Poster Presentation at IEEE RFID 2010, Orlando, Florida, USA, pp. April 14-15, 2010.
Chai, Q., and G. Gong, "A Lightweight Protocol to Robust TID-Based Anti-Counterfeiting (Full Paper)", Technical Report CACR 2010-09, 2010.
Hu, H.G., and G. Gong, "A new class of ternary and quaternary sequences with two-level autocorrelation", Proceedings of 2010 IEEE International Symposium on Information Theory (ISIT 2010), pp. 1292-1296, 2010.
Fan, X.X., and G. Gong, "Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks", Proceedings of the Second International Conference on Ad Hoc Networks (AdHocNets 2010), . Zheng, D. Simplot-Ryl, and V.C.M. Leung (Eds.), Berlin, Germany: Springer-Verlag, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 328-343, 2010.
Li, Z.J., and G. Gong, "Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks", Proceedings of 9th International Conference on Ad Hoc Networks and Wireless (ADHOC-NOW 2010), Lecture Notes in Computer Science, I. Nikolaidis and K. Wu (Eds.), vol. 6288, Berlin, Germany: Springer-Verlag, pp. 149-162, 2010.
Fan, X.X., G. Gong, K. Lauffenburger, and T. Hicks, "FPGA Implementations of the Hummingbird Cryptographic Algorithm", Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), California, USA, June/2010. PDF icon FPGA Implementations of the Hummingbird Cryptographic Algorithm (PDF) (165.56 KB)PDF icon Poster (PDF) (351.25 KB)
Yu, N.Y., and G. Gong, "Generalized constructions of polyphase sequence families using shift and addition of multiplicative character sequences", Proceedings of 2010 IEEE International Symposium on Information Theory (ISIT 2010), pp. 1258-1262, 2010.
Engels, D., X.X. Fan, G. Gong, H.G. Hu, and E. M. Smith, "Hummingbird: ultra-lightweight cryptography for resource-constrained devices", The 14th International Conference on Financial Cryptography and Data Security - FC 2010, LNCS 6054, R. Curtmola et al. (Eds.), Tenerife, Canary Islands, Spain, pp. 3-18, 2010. PDF icon Hummingbird: ultra-lightweight cryptography for resource-constrained devices (170.96 KB)
Wen, H., G. Gong, and P.H. Ho, "MIMO Cross-Layer Secure Communication Architecture Based on STBC", Proceedings of IEEE Global Communications Conference (GLOBECOM'10), Miami, Florida, USA, December/2010.
Yu, N.Y., and G. Gong, "On the structure of M-ary Sidelnikov sequences of period p2m-1", Proceedings of 2010 IEEE International Symposium on Information Theory (ISIT 2010), pp. 1233-1237, 2010.
Luo, Y.Y., Q. Chai, G. Gong, and X.J. Lai, "WG-7, A Lightweight Stream Cipher With Good Cryptographic Properties", Proceedings of IEEE Global Communications Conference (GLOBECOM'10), Miami, Florida, USA, December/2010.
Wang, Z.L., and G. Gong, "A note on the diagonalization of the discrete Fourier transform", Applied and Computational Harmonic Analysis, vol. 28, issue No. 1, pp. 114-120, 2010.
Yu, N.Y., and G. Gong, "Multiplicative characters, the Weil bound, and polyphase sequence families with low correlation", IEEE Transactions on Information Theory, vol. 56, pp. 1702-1713, April/2010.
Tang, X.H., and G. Gong, "New constructions of binary sequences with optimal autocorrelation value/magnitude", IEEE Transactions on Information Theory, vol. 56, issue No. 3, pp. 1278-1286, March/2010.
Hu, H.G., and G. Gong, "New sets of zero or low correlation zone sequences via interleaving techniques", IEEE Transactions on Information Theory, vol. 56, pp. 1702-1713, April/2010.
Gong, G., "Lightweight Cryptography for RFID Systems", Tutorial talk at Indocrypt'10, December/2010. PDF icon Part I (1.07 MB)PDF icon Part II (1.71 MB)PDF icon Part III (2.01 MB)

2009

Wen, H., and G. Gong, "A cross-layer approach to enhance the security of wireless networks based on MIMO", 43rd Annual Conference on Information Sciences and Systems (CISS 2009), pp. 935 - 939, 2009.
Wen, H., P. Han Ho, and G. Gong, "A Novel Framework for Message Authentication in Vehicular Communication Networks", Globe communication conference, IEEE GLOBECOMb , 2009.
Li, Z., and G. Gong, "Computationally Efficient Mutual Entity Authentication in Wireless Sensor Networks", Proceedings of First International Conference on Ad Hoc Networks (ADHOCNETS 2009), LNICST 28, Niagara Falls, Ontario, Canada, pp. 192-207, 2009.
Li, Z., and G. Gong, "DHT-Based Detection of Node Clone in Wireless Sensor Networks", Proceedings of First International Conference on Ad Hoc Networks (ADHOCNETS 2009), LNICST 28, Niagara Falls, Ontario, Canada, pp. 240-255, 2009.
Fan, X.X., H.G. Hu, G. Gong, E. Smith, and D. Engels, "Lightweight Implementation of Hummingbird Cryptographic Algorithm on 4-Bit Microcontroller, to appear in the Proceedings of The 1st International Workshop on RFID Security and Cryptography 2009 (RISC'09)", Lightweight Implementation of Hummingbird Cryptographic Algorithm on 4-Bit Microcontroller, to appear in the Proceedings of The 1st International Workshop on RFID Security and Cryptography 2009 (RISC'09), London, UK, October/2009.
Yu, N.Y., and G. Gong, "Multiplexing realizations of the decimation-Hadamard transform of two-level autocorrelation sequences", Coding and Cryptology, Lecture Notes in Computer Science, Y.M. Chee, et al. (Eds.), vol. 5557, Springer, pp. 248-258, 2009.
Hu, H., and G. Gong, "New sequence families with zero or low correlation zone via interleaving techniques", IEEE International Symposium on Information Theory (ISIT 2009), Seoul, Korea, 2009.
Dai, Z. D., G. Gong, and H.Y. Song, A trace representation of binary Jacobi sequences, Discrete Mathematics, vol. 309, pp. 1517-1527, 2009.
Wen, H., G. Gong, and P.H. H, "Build-in Wiretap Channel I with Feedback and LDPC Codes", JOURNAL OF COMMUNICATIONS AND NETWORKS, vol. 11, issue No. 6, pp. 538-543, 2009.
Hu, H., G. Gong, and D. Feng, "New results on periodic sequences with large k-error linear complexity", IEEE Transactions on Information Theory, 2009.
Wang, Z., and G. Gong, A Note on the Diagonalization of the Discrete Fourier Transform, University of Waterloo, Canada, Technical Report, CACR 2009-12, 2009. PDF icon A Note on the Diagonalization of the Discrete Fourier Transform (PDF) (198.11 KB)
Gong, G., S. Ronjom, T. Helleseth, and H.G. Hu, Fast Discrete Fourier Spectra Attacks on Stream Ciphers, University of Waterloo, Canada, Technical Report, CACR 2009-04, 2009. PDF icon Fast Discrete Fourier Spectra Attacks on Stream Ciphers (PDF) (264.65 KB)PDF icon Slides (PDF) (612.64 KB)
Hu, H.G., and G. Gong, "New sequence families with zero or low correlation zone via interleaving techniques", Technical Report, CACR 2009-03, January 2009, University of Waterloo, Canada, IEEE Transactions on Information Theory, 2009. PDF icon New sequence families with zero or low correlation zone via interleaving techniques (PDF) (205.75 KB)PDF icon Slides (PDF) (779.4 KB)
Wang, Z., and G. Gong, "New sequences design from Weil representation with low two-dimensional correlation in both time and phase shifts", Technical Report, CACR 2009-01, January 2009, University of Waterloo, Canada, Seoul, Korea, IEEE Transactions on Information Theory, 2009. PDF icon New Sequences Design from Weil Representation with LowTwo-Dimensional Correlation in Both Time and Phase Shifts (PDF) (267.88 KB)
Hu, H.G., and G. Gong, New Ternary and Quaternary Sequences with Two-Level Autocorrelation, University of Waterloo, Canada, Technical Report, CACR 2009-16, 2009. PDF icon New Ternary and Quaternary Sequences with Two-Level Autocorrelation (PDF) (205.75 KB)
Engels, D., X.X. Fan, G. Gong, H.G. Hu, and E. Smith, Ultra-lightweight cryptography for low-cost RFID tags: Hummingbird algorithm and protocol,, University of Waterloo, Canada, Technical Report, CACR 2009-29, 2009. PDF icon Ultra-lightweight cryptography for low-cost RFID tags: Hummingbird algorithm and protocol (PDF) (285.65 KB)

2008

Hu, H.G., and G. Gong, "A study on the pseudorandom properties of sequences generated via the additive order, Sequences and Their Applications (SETA)", Lecture Notes in Computer Sciences, S.W. Golomb, et al. (Eds.), vol. 5203, Springer, pp. 51-60, 2008.
Fan, X.X., G. Gong, and D. Jao, "Efficient pairing computation on genus 2 curves in projective coordinates", Pre-proceedings of the 15th Annual Workshop on Selected Areas in Cryptography (SAC 2008), vol. Technical Report, University of Waterloo, CACR 2008-03, Mount Allison University, Sackville, New Brunswick, Canada, Technical Report, University of Waterloo, CACR 2008-03, pp. 17-33, 01-2008. PDF icon Efficient pairing computation on genus 2 curves in projective coordinates (PDF) (297.28 KB)
Fan, X.X., and G. Gong, "Key revocation based on Dirichlet multinomial model for mobile ad hoc networks", Proceedings of the Fourth IEEE LCN Workshop on Network Security (WNS 2008), Montreal, Technical Report, University of Waterloo, CACR 2008-05, October 2008. PDF icon Key revocation based on Dirichlet multinomial model for mobile ad hoc networks (PDF) (349.83 KB)
Hu, H.G., G. Gong, and F.D. Guo, "New results on periodic sequences with large $k$-error linear Error!", New results on periodic sequences with large $k$-error linear Error!, Toronto, Canada, the Proceedings of International Symposium on Information Theory (ISIT 2008), pp. 2409-2413, 07-2008.
Gong, G., "Sequences, DFT and Resistance against Fast Algebraic Attacks", Sequences and Their Applications (SETA), Lecture Notes in Computer Sciences, S.W. Golomb, et al. (Eds.), vol. 5203, Springer, pp. 197-218, 2008. PDF icon Sequences, DFT and Resistance against Fast Algebraic Attacks (PDF) (621.36 KB)
Fan, X.X., G. Gong, and D. Jao, "Speeding up pairing computations on genus 2 hyperelliptic curves with efficiently computable automorphisms", Pairing-based Cryptography, Lecture Notes of Computer Sciences, S.D. Galbraith, and K.G. Paterson (Eds.), vol. 5209, Berlin, Germany, Springer-Verlag, pp. 243-264, 2008. PDF icon Speeding up pairing computations on genus 2 hyperelliptic curves with efficiently computable automorphisms (PDF) (298.53 KB)
Zhou, Z., X.H. Tang, and G. Gong, "A new class of sequences with zero or low correlation zone based on interleaving technique", IEEE Trans. on Inform., vol. 54, issue No. 9, pp. 4267-4273, September/2008.
Khoo, K.M., C. W. Lim, and G. Gong, "Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity", Applicable Algebra in Engineering, Communication and Computing, vol. 19, issue No. 4, pp. 323 - 338, August/2008.
Charpin, P., and G. Gong, "Hyperbent functions, Kloosterman sums and Dickson polynomials", IEEE Trans. on Inform, vol. 54, issue No. 9, pp. 4230-4238, September/2008.
Yu, N. Yul, and G. Gong, "New binary sequences with optimal autocorrelation magnitude", IEEE Trans. on Inform. , vol. 54, issue No. 10, pp. 4771 - 4779, October/2008.
Li, Z., and G. Gong, Survey on Security in Wireless Sensor, Special English Edition of Journal of KIISC, vol. 18, issue No. 6 (B), pp. 233-248, December/2008.
Nawaz, Y., and G. Gong, WG: A family of stream ciphers with designed randomness properties, Information Sciences, vol. 178, issue No. 7, pp. 1903-1916, April/2008.
Li, Z.J., and G. Gong, A survey on security in wireless sensor networks: Technical Report, University of Waterloo, CACR 2008-20, 10-2008. PDF icon A survey on security in wireless sensor networks (PDF) (229.59 KB)

2007

Hoeper, K., and G. Gong, "Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes", in the book series on Computer and Network Security: Y. Xiao and Y. Pan (Eds.), World Scientific Publishing Co., 2007.
Hoeper, K., and G. Gong, Pre-Authentication and Authentication Models in Ad Hoc Networks: edited by Y. Xiao, X. (Sherman) Shen, and D.-Z. Du, Springer Verlag, 2007.
Golomb, S.W., and G. Gong, "Actions of the unitary group on irreducible/primitive polynomials and their applications to randomness of sequences", the Proceedings of 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, Bergen, Norway, 07-2007.
Gong, G., "Constructions of multiple shift-distinct signal sets with low correlation", Proceedings of International Symposium on Information Theory (ISIT 2007), Nice, France, pp. 2306-2310, 06-2007.
Gong, G., "Correlation of multiple bent function signal sets, invited talk", the Proceedings of 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, Bergen, Norway, 07-2007.
Nawaz, Y., and G. Gong, "Distributing fixed time slices in heterogeneous networks of workstations (NOWs)", The Proceedings of the Fifth International Symposium on Parallel and Distributed Processing and Applications (ISPA07), Lecture Notes in Computer Sciences, Stojmenovic et al. (Eds.), , vol. 4742: Springer-Verlag, pp. 612-621, 09-2007.
Fan, X., and G. Gong, "Efficient explicit formulae for genus 2 hyperelliptic curves over prime fields and their implementations", the Proceedings of Selected Areas in Cryptography, Lecture Notes in Computer Science, Adams et al. (Eds), vol. 4876, Ottawa, Canada, Springer-Verlag, pp. 155-172, 09-2007.
Nawaz, Y., K. C. Gupta, and G. Gong, "Efficient techniques to find algebraic immunity of s-boxes based on power mappings", Proceedings of International Workshop on Coding and Cryptography, Versailles, France, pp. 237-246, 04-2007.
Rønjom, S., G. Gong, and T. Helleseth, "On attacks on filtering generators using linear subspace structures, Sequences, Subsequences, and Consequences", Lecture Notes in Computer Science, S.W. Golomb et al. (Eds.), vol. 4893: Springer-Verlag, pp. 204-217, 2007.
Gong, G., "Randomness and representation of span n sequences", Sequences, Subsequences, and Consequences, Lecture Notes in Computer Science, S.W. Golomb et al (Eds.), vol. 4893: Springer-Verlag, pp. 192-203, 2007. PDF icon Randomness and representation of span n sequences (PDF) (195.44 KB)
Yu, N.Y., and G. Gong, "The Perfect Binary Sequence of Period 4 for Low Periodic and Aperiodic Autocorrelations, Sequences, Subsequences, and Consequences", Lecture Notes in Computer Science, S.W. Golomb et al. (Eds.), vol. 4893: Springer-Verlag, pp. 37-49, 2007.
Gong, G., S. W. Golomb, and H.Y. Song, "A note on low correlation zone signal sets", IEEE Trans. on Information Theory, vol. 53, issue No. 7, pp. 2575 - 2581, 07-2007.
Fan, X.X., T. Wollinger, and G. Gong, "Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems over binary fields", IET Information Security, vol. 1, issue 2, pp. 65-81, 06-2007.
Khoo, K.M., and G. Gong, "New construction for balanced boolean functions with very high nonlinearity", IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, vol. E90-A, issue No. 1, pp. 29-35, 01-2007.
Hoeper, K., and G. Gong, "Preventing or utilizing key escrow in identity-based schemes employed in mobile ad hoc networks", International Journal of Security and Networks (IJSN), Special Issue on Cryptography in Networks, vol. 2, issue 3/4, pp. 239-250, 2007.
Golomb, S.W., and G. Gong, "The Status of Costas Arrays", IEEE Trans. on Information Theory, vol. 53, issue No. 11, pp. 4260 - 4265, 11-2007.

2006

Giuliani, K., and G. Gong, "A new algorithm to compute remote terms in special types of characteristic sequences", Sequences and Their Applications, LNCS, vol. G. Gong et al.(Eds.), issue 4047, pp. 242-252, 2006. PDF icon A new algorithm to compute remote terms in special types of characteristic sequences (PDF) (180.9 KB)
Khoo, K., G. Gong, and D. R. Stinson, "A new characterization of semi-bent and bent functions on finite fields", Designs,Codes, and Cryptography, vol. 38-2, pp. 279-295, 02-2006.
Gong, G., S. W. Golomb, and H-Y. Song, "A Note on Low Correlation Zone SignalSets", 40th Annual Conference of Information Sciences and Systems (CISS 2006), vol. Princeton University, Technical Co-Sponsorship With IEEE Information Theory Society, 2006. PDF icon A Note on Low Correlation Zone SignalSets (PDF) (240.96 KB)
Yu, N. Yul, and G. Gong, "Cross correlation properties of binary sequences with ideal two-level autocorrelation", Sequences and Their Applications (SETA06), LNCS, vol. 4086, issue G. Gong et al. (Eds.), pp. 104-118, 2006. PDF icon Cross correlation properties of binary sequences with ideal two-level autocorrelation (PDF) (242.05 KB)
Hoeper, K., and G. Gong, "Integrated DH-like key exchange protocols from LUC, GH and XTR", Proceedings of International Symposium on Information Theory(ISIT 2006), 2006.
Yu, N.Y., and G. Gong, "Interleaved construction of binary sequences with optimal autocorrelation magnitude", Proc. of IEEE Information Theory Workshop (ITW), pp. 530-534, 10-2006.
Hoeper, K., and G. Gong, "Key revocation for identity-based schemes in mobile ad hoc networks", Proceedings of 5th International Conference on AD-HOC Networks and Wireless -AD HOCNOW, Lecture Notes in Computer Science, vol. 4104, issue T. Kunz and S.S. Ravi (Eds.), pp. 224-237, 2006. PDF icon Key revocation for identity-based schemes in mobile ad hoc networks (PDF) (188.18 KB)
K, M.K., and G. Gong, "New construction for balanced boolean functions with very high nonlinearity", IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Cryptography and Information Security, vol. E90-A, issue No. 1, pp. 29-35, 01-2007, 2006.
Yu, N.Y., and G. Gong, "New family of binary sequences with low correlation and large size", IEEE Trans. on Inform. Theory, vol. 52, issue No. 4, pp. 1624-1636, 04-2006. PDF icon New family of binary sequences with low correlation and large size (PDF) (232.49 KB)
Youssef, A., S. E. Tavares, and G. Gong, "On Some Probabilistic Approximations forAES-like S-boxes", Discrete Mathematics, vol. 306, pp. 2016-2020, 2006.
Youssef, A.M., and G. Gong, "On the linear complexity of sequences over $GF(2^n)$", Theoretical ComputerScience, vol. 352, issue 1-3, pp. 288-292, 03-2006.
Yu, N.Y., and G. Gong, "Quadratic bent functions of polynomial forms and their applications to bent sequences", Proc. of 23rd Biennial Symposium on Communication, pp. 128-131, 2006.
Yu, N. Yul, and G. Gong, "Realizations from decimation Hadamard transform for special classes of binary sequences with two-level autocorrelation", Coding and Cryptography, Lecture Notes in Computer Science, vol. 3969, issue T. Helleseth et al. (Eds.), pp. 371-385, 2006. PDF icon Realizations from decimation Hadamard transform for special classes of binary sequences with two-level autocorrelation (PDF) (299.86 KB)
Gong, G., and H.Y. Song, "Two-tuple balance of non-binary sequences with ideal 2-level autocorrelation", Discrete Applied Mathematics, vol. 153, issue 18, pp. 2590-2598, 12-2006.
Nassir, Y., G. Gong, and K.C. Gupta, "Upper bounds on algebraic immunity of boolean power functions", Fast Software Encryption, Lecture Notes in Computer Science (LNCS), vol. M. Robshaw (Ed.), issue 4047, pp. 375-389, 01-2006. PDF icon Upper bounds on algebraic immunity of boolean power functions (PDF) (216.21 KB)
Nawaz, Y., K. Gupta, and G. Gong, "Algebraic immunity of S-boxes based on power mappings: Analysis andconstruction", CACR 2006-34, University of Waterloo, Canada, 10-2006.
Gong, G., "Design of SignalSets with Low Interference for CDMA Applications in Networking Environment", CACR 2006-05, University of Waterloo, Canada, 01-2006.
Fan, X., T. Wollinger, and G. Gong, "Efficient explicit formulae for genus 3 hyper elliptic curve cryptosystems", CACR 2006-38, University of Waterloo, Canada, 12-2006.
Yul, N.Y., and G. Gong, "On asymptotic optimality of binary sequence families", CACR2006-28, University of Waterloo, Canada, 05-2006.

2005

Jiang, S., and G. Gong, "A Round and Communication Efficient Secure Ranking Protocol", RSA Conference 2006, Cryptographers' Track, D. Pointvheval (Ed.), vol. 3860: Lecture Notes in Computer Science, Springer-verlag, pp. 350-364, 02-2005. PDF icon A Round and Communication Efficient Secure Ranking Protocol (PDF) (259.77 KB)
Nawaz, Y., and G. Gong, "Algebraic immunity of some cryptographic Boolean functions", Proceedings of Canadian Workshop on Information Theory (CWIT'05), Montreal, Canada, pp. 371-374, 06-2005. PDF icon Algebraic immunity of some cryptographic Boolean functions (PDF) (73.72 KB)
Khoo, K., G. Gong, G-E. Tan, and H. -KiatLee, "Comparison of boolean function design", Proceedings of International Symposium on Information Theory (ISIT 2005): Adelaide, Australia, 09-2005.
Yu, N. Y., and G. Gong, "Higher order autocorrelation of binary sequences with ideal two-level autocorrelation", Proceedings of Canadian Workshop on Information Theory (CWIT'05), Montreal, Canada, June 5-8, 2005, pp. 391-394, 2005.
Hoeper, K., and G. Gong, "Identity-Based Key Exchange Protocols for Ad Hoc Networks", Proceedings of Canadian Workshop on Information Theory (CWIT '05), Montreal, Canada, 06-2005.
Xiao, L., S. Tavares, A. Youssef, and G. Gong, "Improved Cascaded Stream Ciphers Using Feedback", Proceedings of 18th Annual Canadian Conference onElectrical and Computer Engineering (CCECE'05), Saskatoon, Canada, 05-2005. PDF icon Improved Cascaded Stream Ciphers Using Feedback (PDF) (108.43 KB)
Hoeper, K., and G. Gong, "Limitations of Key Escrow in Ad Hoc Networks", Proceedings of first International Conference on Security and Privacy for Emerging Areas in Communication Networks, Athens, Greece, 10-2005.
Gong, G., and K. Chand Gupta, "Martin Hell, and Yassir Nawaz, Towards a General RC4-like Keystream Generator", SKLOIS Conference on Information Security and Cryptology (CICS05), Beijing, China, Springer-verlag, 2005. PDF icon Martin Hell, and Yassir Nawaz, Towards a General RC4-like Keystream Generator (PDF) (183.95 KB)
Chiu, F., N. Y. Yu, and G. Gong, "Maximum correlationof binary signals over fading channels", Proceedings of International Symposium on Information Theory (ISIT 2005), Adelaide, Australia, 09-2005. PDF icon Maximum correlationof binary signals over fading channels (PDF) (143.08 KB)
Giuliani, K., and G. Gong, "New LFSR-based cryptosystems and the trace discrete logarithm problem (Trace-DLP)", Sequences and Their Applications, Tor Helleseth et al. (Eds.), Springer-verlag, vol. 3486: Lecture Notes in Computer Science, pp. 298-312, 2005. PDF icon New LFSR-based cryptosystems and the trace discrete logarithm problem (Trace-DLP) (PDF) (268.96 KB)
Yu, N. Y., and G. Gong, "Realization of decimation-Hadamard transform for binary generalized GMW sequences", Proceedings of Workshop on Coding and Cryptography (WCC2005), Bergen, Norway, Technical Report, CORR 2005-08, Springer-verlag, 2005.
Nawaz, Y., and G. Gong, "The WG Steam Cipher", Proceedings of the Symmetric Key Encryption Workshop, Denmark, 05-2005.
Dai, ZD., S. Jiang, K. Imamura, and G. Gong, "Asymptotic Behavior of Normalized Linear Complexity of Ultimately Non-periodic sequences", IEEE Trans. on Inform. Theory, vol. 50, issue No. 11, pp. 2911-2915, 11-2005.
Hoeper, K., and G. Gong, "Pre-Authentication and Authentication Models in AdHocNetworks", Wireless and Mobile Network Security, vol. Y.Xiao et al. (Eds.), 2005. PDF icon Pre-Authentication and Authentication Models in AdHocNetworks (PDF) (198.5 KB)
Gong, G., "Design of Signal Sets with Low Interference for CDMA Applications in Networking Environment", Technical Report, CACR 2006-5, University of Waterloo, 2005.
Yu, N., and G. Gong, Realizations of Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation, University of Waterloo, Technical Report, CACR2005-14, 2005.

2004

Lam, C.Y., and G. Gong, "A Lower Bound for the Linear Span of Filtering Sequences", Proceedings of conference on State of the Art of Stream Ciphers, Brugge, Belgium, pp. 220-233, 10-2004. PDF icon A Lower Bound for the Linear Span of Filtering Sequences (PDF) (203.03 KB)
"Correlation among signal sets", Sixth International Joint Meeting of the American Mathematics Society (AMS) and the Sociedad Matemtica Mexicana (SMM), Houston, Texas, Coding and Cryptography Session, 2004. PDF icon Correlation among signal sets (PDF) (1.45 MB)
Jiang, S., and G. Gong, "Multi-service Oriented Broadcast Encryption", Australian Conference on Information Security and Privacy, LNCS 3108, vol. H.Wang. et al (Eds.): Springer-verlag, pp. 1-12, 2004.
Giulianiand, K., and G. Gong, "New LFSR-based cryptosystems and the trace discrete logarithm problem", the third international conference on sequences and their applications (SETA'04), Full paper at Lectures Notes in Computer Science, Springer, Seoul, South Korea, 10-2004.
Gong, G., and S.Q. Jiang, "Editing Generator and its Cryptanalysis, Special issue on Multimedia Networking and Wireless Communications", International Journal of Wireless and Mobile Computing, Inderscience Publishers, 2004.
Jiang, S., and G. Gong, "Password Based Key Exchange with Mutual Authentication", Selected Area in Cryptography, vol. 3357, issue H.Handschuh et al. (Eds.), pp. pre-proceeding, pp. 291-306, 10-2004. PDF icon Password Based Key Exchange with Mutual Authentication (PDF) (235.62 KB)
Jiang, S., and G. Gong, "Password Based Key Exchange with Mutual Authentication", Selected Area in Cryptography, Waterloo, Canada, issue H.Handschuh et al. (Eds.), pp. pre-proceeding, pp. 291-306, 09-2004. PDF icon Password Based Key Exchange with Mutual Authentication (PDF) (235.62 KB)
Gong, G., "Randomness and Discrepancy Transforms, Progress on Cryptography", Kluwer Academic Publishing, issue K.F. Chen (Ed.), pp. 1-8, 2004.
Kim, Y., H. Song, and G. Gong, Cross correlation of q-ary Power Residue Sequences of Period p is Upper Bounded by $sqrt(p)+2$: Technical Report, University of Waterloo, CACR 2004-07, 2004.
Hoeper, K., and G. Gong, Models of Authentication in Ad Hoc Networks and Their RelatedNetwork Properties: Technical Report, University of Waterloo, CACR 2004-03, 2004.
Gong, G., On Existence and Invariant of Algebraic Attacks: Technical Report, University of Waterloo, CACR 2004-17, 2004.

2003

Gong, G., "Array correlation and sequences with equal magnitude correlation", Mathematical Properties of Sequences and Other Combinatorial Structures, J.-S. No, H.-Y. Song, T. Helleseth, and V.Kumar (Ed), NewYork, Kluwer Academic Publishers, pp. 33-43, 2003. PDF icon Array correlation and sequences with equal magnitude correlation (PDF) (194.41 KB)
Khoo, K. M., and G. Gong, "New constructions for resilient and highly nonlinear boolean functions", Information Security and Privacy, Lectures Notes in Computer Science, R. Safavi-Naini and J.Seberry (Ed), vol. 2727: Springer-Verlag, pp. 498-509, 2003. PDF icon New constructions for resilient and highly nonlinear boolean functions (PDF) (214.38 KB)
Jiang, S., and G. Gong, "On Edit Distance Attack to Alternating Step Generator", Mathematical Properties of Sequences and Other Combinatorial Structures, J.-S. No, H.-Y. Song, T. Helleseth, and V.Kumar (Ed), New York, Kluwer Academic Publishers, pp. 85-92, 2003.
Kim, J. H., H. Y. Song, and G. Gong, "Trace Function Representation of Hall's Sextic Residue Sequences of Period $p \equiv 7 ~\mbox(mod $8$)$", Mathematical Properties of Sequences andOther Related Structures, J. S. No,H. Y. Song, T. Helleseth, and V. Kumar (Ed), NewYork, Kluwer Academic Publishers, pp. 23-32, 2003.
Gong, G., and K.M. Khoo, "Additive autocorrelation of resilient boolean functions", the Proceedings of TenthAnnual Workshop on Selected Areas in Cryptography, M. Matrui and R. Zuccherato (Ed.), vol. Berlin, Springer-Verlag, vol. 3006., Ottawa, Canada, Lectures Notes in Computer Science (LNCS), 2003. PDF icon Additive autocorrelation of resilient boolean functions (PDF) (249.56 KB)
Khooand, K. M., and G. Gong, "Highly nonlinear s-boxes with reduced bound on maximum correlation", Proceedings of 2003 IEEE International Symposium on Information Theory (ISIT2003), Yokohama, Japan, pp. 254, 07-2003.
Gong, G., and S.Q. Jiang, "The editing generators and its cryptanalysis", the Annual International Workshop on Cryptology and Network Security, the proceedings integrated in the Proceedings of the Ninth International Conference on Distributed Multimedia Systems, Miami, Florida, USA, pp. 673-678, 09-2003. PDF icon The editing generators and its cryptanalysis (PDF) (105.87 KB)
Dai, Z. D., G. Gong, and H.Y. Song, "Trace representation and linear complexity of binary e-th residue sequences", Proceedings of International Workshop on Coding and Cryptography (WCC2003), Versailles, France, pp. 121-133, 03-2003. PDF icon Trace representation and linear complexity of binary e-th residue sequences (PDF) (290 KB)
Dai, Z. D., G. Gong, and H.Y. Song, "Trace Representation of Binary e-th ResidueSequence of Period p", Proceedings of 2003 IEEE International Symposium on Information Theory (ISIT2003), Yokohama, Japan, pp. 378, 2003.
Dai, Z. D., G. Gong, and H. Y. Song, "Trace Representation of Binary Jacobi Sequences", Proceedings of 2003 IEEE International Symposium on Information Theory (ISIT2003), Yokohama, Japan, pp. 379, 07-2003.
Gong, G., and H.Y. Song, "Two-Tuple-Balance of Non-Binary Sequences with Ideal Two-Level Autocorrelation", Proceedings of 2003 IEEE International Symposium onInformation Theory (ISIT2003), Yokohama, Japan, pp. 404, 07-2003.
Gong, G., and A. Youssef, "Cryptographic Properties of the Welch-Gong Transformation Sequence Generators", IEEE Trans.on Inform., vol. 48, issue No. 11, pp. 2847-2867, 11-2002, 2003. PDF icon Cryptographic Properties of the Welch-Gong Transformation Sequence Generators (PDF) (397.37 KB)
Jiang, S., and G. Gong, "On Edit Distance Attack to Alternating Step Generator", CACR 2002-28, New York, Kluwer Academic Publishers, pp. 85-92, 2003. PDF icon On Edit Distance Attack to Alternating Step Generator (PDF) (267.14 KB)

2002

Khoo, K., G. Gong, and D. R. Stinson, "A new family of Gold-like sequences", IEEE International Symposium on Information Theory, Lausanne, Switzerland, 07-2002.
Gong, G., "Array correlation and sequences with equal magnitude correlation", Golomb Symposium, University of Southern California, Los Angeles, 07-2002.
Gong, G., ZD. Dai, and S. W. Golomb, "On existence of 2-level autocorrelation sequences realized from the decimation-Hadamard transformation", 2002 IEEE International Symposium on Information Theory, Lausanne, Switzerland, 07-2002.
Helleseth, T., and G. Gong, "New nonbinary sequences with ideal two-level autocorrelation functions", IEEE Trans.on Inform. , vol. 48, issue No. 11, pp. 2868-2872, 11-2002. PDF icon New nonbinary sequences with ideal two-level autocorrelation functions (PDF) (280.47 KB)
Gong, G., and S.W. Golomb, "The Decimation-Hadamard transform of two-level autocorrelation sequences", IEEE Trans. on Inform. Theory, vol. 48, issue No. 4, pp. 853-865, 04-2002. PDF icon The Decimation-Hadamard transform of two-level autocorrelation sequences (PDF) (550.35 KB)
Gong, G., A. Hasan, H. Wu, and A. Youssef, "An Efficient Algorithm for Exponentiation in DH Key Exchange and DSA inCubicExtension Fields", CACR 2002-27, 2002.
Jiang, S., and G. Gong, "Cryptanalysis of Stream Cipher -- A Survey", CACR 2002-29, 2002. PDF icon Cryptanalysis of Stream Cipher -- A Survey (PDF) (371.07 KB)
Lam, C.Y., and G. Gong, "Randomness of Elliptic Curve Sequences", CACR 2002-18, 2002.
Jiang, S., and G. Gong, "The Editing Generator and Its Cryptanalysis", CACR 2002-30, 2002.

2001

Youssef, A.M., and G. Gong, "Boolean functions with large distance to all bijective monomials: N odd case", the Proceedings of the Eighth Annual Workshop on Selected Areas in Cryptography, Toronto, CACR 2001-57 , 10-2001.
Youssef, A.M., and G. Gong, "Cryptanalysis of a public-key cryptosystem proposed at ACISP2000", Information Security and Privacy, Lectures Notes in Computer Science, Vijay Varadharajan and Yi Mu (Ed.), vol. 2119, Berlin, Germany, Springer-Verlag, pp. 15-20, 2001.
Giuliani, K. J., and G. Gong, "Generating large instances of the Gong-Harn cryptosystems", Conference on Cryptography and Coding, Cirencester, UK, 12-2001. PDF icon Generating large instances of the Gong-Harn cryptosystems (PDF) (193.16 KB)
Youssef, A.M., and G. Gong, "Hyper-Bent Functions", Advances in Cryptology- Eurocrypto'2001, CACR 2001-58, vol. Lecture Notes in Computer Science 2045: Springer, pp. 406-419, 2001.
Golomb, S.W., and G. Gong, "Hyper-Cyclotomic Algebra", Sequences and their Applications, Proceedings of SETA'01, CACR 2001-33, vol. Discrete Mathematics and Theoretical Computer Science: Springer, pp. 154-165, 2001.
Dai, Z.D., J.H. Yang, G. Gong, and P. Wang, "Linear complexities of generalized Legendre sequences", Sequences and their Applications, Proceedings of SETA'01, Discrete Mathematics and Theoretical Computer Science, CACR 2001-34: Springer, 2001.
Ludkovski, M., and G. Gong, "New families of ideal 2-level autocorrelation ternary sequences from second order DHT", Proceedings of the second International Workshop in Coding and Cryptography, Paris, France, pp. 345-354, 01-2001.
Gong, G., and C. C. Y. Lam, "Recursive sequences over elliptic curves", Sequences and their Applications, Proceedings of SETA'01, CACR 2001-35, vol. Discrete Mathematics and Theoretical Computer Science: Springer, pp. 182-196, 2001.
Gong, G., L. Harn, and H.P. Wu, "The GH public-key cryptosystems", the Proceedings of the Eighth Annual Workshop on Selected Areas in Cryptography, CACR 2001-35, Toronto, 09-2001.
Cusick, T.W., and G. Gong, "A conjecture onbinary sequences with the "trinomial property"", IEEE Trans. on Inform. Theory, vol. 47, issue No. 1, pp. 426-427, 01-2001.
Dai, Z.D., G. Gong, and D.F. Ye, "Cascaded GMW functions and its classification", Sciences in China (Series A), vol. 44, issue No. 6, pp. 709-71, 06-2001.
Dai, Z.D., J.H. Yang, D.F. Ye, and G.Gong, "Cryptanalysis of the original and the revised Xinmei digital signature scheme", Electronics Letters, vol. 37, issue No. 4, pp. 220, 03-2001.

2000

Gong, G., and S.W. Golomb, "Inverse Hadamard transforms of two-level autocorrelation sequences", Proceedings of 2000 IEEE International Sumposium on Information Theory, Sorrento, Italy, pp. 300, 06-2000.
Gong, G., and A. Youssef, "On Welch-Gong Transformation Sequence Generators", the Proceedings of the Sevenh Annual Workshop on Selected Areas in Cryptography, Waterloo, Canada, 10-2000.
Harn, L., H.-Y. Lin, and G. Gong, "Bounded-to-unbounded poker game", Electronics Letters, vol. 36, issue No. 3, pp. 214-215, 2000.
Gong, G., Z.T. Dai, and S.W. Golomb, "Criterion and Counting for Cyclically shift distinct q-ary GMW sequences of period qn-1", IEEE Trans. on Inform. Theory, vol. 46, issue No. 2, pp. 474-484, 03-2000.
Golomb, S. W., G. Gong, and Z.D. Dai, "Cyclic inequivalence of cascaded GMW sequences", Discrete Mathathematics, vol. 219, issue Technical Report, University of Waterloo, CACR 98-37, pp. 279-285, 2000.
Jiang, S., Z. T. Dai, and G. Gong, "Notes on q-ary interleaved sequences", Chinese Sci. Bull, vol. 45, issue No. 6, pp. 502-507, 2000.
Chang, A., P. Gaal, S. W. Golomb, G. Gong, T. Helleseth, and V. P. Kumar, "On a conjectured ideal auto correaltion sequences and a realted triple error correcting cyclic code", IEEE Trans. on Inform. Theory, vol. 46, issue No. 2, pp. 680-686, 03-2000.
Gong, G., and L. Harn, "Public-key cryptosystems based on cubic finite field extensions", IEEE Trans. on Inform. Theory, vol. 45, issue No. 7, pp. 2601-2605, 11-1999, 2000.
Youssef, A. M., and G. Gong, On the quadratic span of binary sequences: Technical Report, University of Waterloo, CACR 2000-20, 03-2000.
Gong, G., and A. M. Youssef, "On the Welch-Gong transformation sequence generators", submitted to IEEE Trans. on Inform. Theory: Technical Report, University of Waterloo, CACR 2000-30, 05-2000.

1999

Harn, L., H.Y. Lin, and G. Gong, "A global key recovery system", the Proceeding of the International Workshop on Cryptographic Techniques & E-Commerce, Hong Kong, pp. 81-86, 07-1999.
Golomb, S. W., G. Gong, and L. Mittenthal, "Constructions of or thomorphisms of $Z_2^n$ numbers", Proceedings of the Fifth International Conference on Finite Fields and Applications, Augsburg, Germany, 09-1999.
Harn, L., and G. Gong, "Elliptic curve digital signatures and accessories", the Proceedings of the International Workshop on Cryptographic Techniques & E-Commerce, pp. 126-131, 07-1999.
Gong, G., T. Berson, and D. Stinson, "Elliptic curve pseudo-random sequence generator", the Proceedings of the Sixth Annual Workshop on Selected Areas in Cryptography, Kingston, Canada, 09-1999.
Gong, G., and S.W. Golomb, "Binary Sequences with Two-Level Autocorrelation", IEEE Trans. on Inform. Theory, vol. 45, issue No. 2, pp. 692-693, 03-1999.
Dai, Z.T., S.W. Golomb, and G. Gong, "Generating all linear or thomorphism without repetitions", Discrete Mathematics, vol. 205, pp. 47-55, 1999.
Gong, G., and S.W. Golomb, "Hadamard Transforms of Three Term Sequences", Hadamard Transforms of Three Term Sequences, vol. 45, issue No. 6, pp. 2059-2060, 09-1999.
Golomb, S.W., and G. Gong, "Periodic sequences with the "Trinomial Property"", IEEE Trans. on Inform. Theory, vol. 45, issue No. 4, pp. 1276-1279, 05-1999.
Gong, G., and S.W. Golomb, "Transform Domain Analysis of DES", IEEE Trans. on Inform. Theory, vol. 45, issue No. 6, pp. 2065-2073, 09-1999. PDF icon Transform Domain Analysis of DES (PDF) (188.72 KB)
Gong, G., Discrepancy transforms and their applications: , University ofWaterloo, CACR 99-60, 09-1999.

1998

Gong, G., and L. Harn, "A new approach for public key distribution", the Proceedings of China-Crypto'98, Chengdu, China, 05-1998.
Golomb, S.W., and G. Gong, "Investigation of periodic sequences with the "TrinomialProperty"", the Proceedings of 1998 IEEE International Symposium on Information Theory, MIT, Cambridge, MA, 09-1998.
Jiang, S., ZD. Dai, and G. Gong, "Notes on q-ary interleaved sequences", International Conference on Sequences and their Applications,, Singapore, 12-1998.
Gaal, P., S.W. Golomb, G. Gong, and P.V. Kumar, "On a sequence conjectured to have ideal 2-level autocorrelation function", the Proceedings of 1998 IEEE International Symposium on Information Theory, MIT, Cambridge, MA, 09-1998.
Chang, A., S. W. Golomb, G. Gong, and V. P. Kumar, "On the linear span of ideal autocorrelation sequences arising from the Segre hyperoval", the Proceedings of International Conference on Sequences and their Applications, Singapore, 12-1998.
No, J.S., S.W. Golomb, G. Gong, H.K. Lee, and P.Gaal, "New binary pseudo-random sequences of period $2^n - 1$ with ideal autocorrelation", IEEE Trans. on Inform. Theory, vol. 44, issue No. 2, pp. 814-817, 03-1998.
Harn, L., G. Gong, and H.Y. Lin, A public-key cryptosystem based on LFSR state-space, 09-1999, 1998.

1997

Gong, G., P. Gaal, and S.W. Golomb, "A suspected infinity class of cyclic Hadamard difference sets", the Proceedings of 1997 IEEE Information Workshop, Longyearbyen, Svalbard, Norway, 07-1997.
Gong, G., "A new class of q-ary PN sequences", IEEE Trans.on Inform., vol. 43, issue No. 3, pp. 1007-1012, 05-1997.
Harn, L., and G. Gong, "Digital signature with subliminal channel", IEE, Proc. Comput. Digital Tech. , vol. 144, issue No. 5, 09-1997.
Gong, G., and Z.D. Dai, On constructions of SAC permutation polynomials, Systems Science and Mathematical Sciences, vol. 10, issue No. 2, pp. 120-128, 1997.
Gong, G., and S.W. Golomb, "A Construction of Latin Squares of Orders 16, 32 and 64", Technical Report, Teledyne Electronic Technologies, 05-1997.

1996

Gong, G., and L. Harn, "Efficiency Lucas-type public key cryptosystems", the Proceedings of 1996 International Conference on Cryptology and InformationSecurity, pp. 19-21, 12-1996.
Gong, G., "On q-ary cascaded GMW sequences", IEEE Trans. on Inform. Theory, vol. 42, issue No. 1, pp. 263-267, 01-1996.

1995

Gong, G., "Theory and applications of q-ary interleaved sequences", IEEE Trans. on Inform. Theory, vol. 41, issue No. 2, pp. 400-411, 03-1995.

1994

Gong, G., "GMW-type permutation polynomial sequences", the Proceedings of ChinaCrypt'94, 11-1994.
Chang, X.G., Z.D. Dai, and G. Gong, "Some cryptographic properties of exponential functions", Advanced in Cryptology - ASIACYPTO'94: Springer's Lecture Notes in Computer Science, 11-1994.
Chang, X.G., Z.D. Dai, and G. Gong, "Some cryptographic properties of exponential functions", Proceedings of ChinaCrypt'94, 11-1994.
Gong, G., and G.Z. Xiao, "Synthesis and uniqueness of m-sequences over GF(q^n) as n-phase sequences over GF(q)", IEEE Trans. on Communications, vol. 42, issue No. 8, 09-1994.

1993

Gong, G., "A new class of sequences: mapping sequences", the Proceedings of the 10th International Symposium of Applied Algebra, Algebraic Algorithms and Error Correcting Codes: Lecture Notesin Computer Science, 05-1993.
, A. Di Porto, and W. Wolfowicz, "Performance testing of Galois linear group sequences", the Proceedings of the 3rd Symposium of State and Progress of Research in Cryptography, Rome, Italy, pp. 90-105, 1993.
Gong, G., A. Di Porto, and W. Wolfowicz, "Galois linear group sequences", LA COMUNICAZIONE, Note Recensioni Notizie, vol. XLII, pp. 83-89, 12-1993.

1992

Gong, G., A. Di Porto, and W. Wolfowicz, "A public key cryptosystem based on Dickson permutation polynomials in finite fields", FUB report: 3T04492, 10-1992.

1991

Gong, G., "Solving phase sets of nonlinear feed forward sequences with maximal linear complexity", Science Bulletin of China, vol. China, issue N0. 7, pp. 551-554, 04-1991.
Gong, G., "Spectral analysis and algorithm of nonlinear feed forward generators", J. of China Institute of Communications, vol. 12, issue No. 6, pp. 61-64, 11-1991.

1990

Gong, G., "Non linear generators of binary sequences with controllable complexity and double key", Advanced in Cryptology - AUSCRYPT'90, Springer's Lecture Notes in Computer Science453, pp. 32-35, 01-1990.
Gong, G., "Quadratic span of feedback shift register sequences", the Proceedings of the 2nd Symposium of State and Progress of Research in Secure Communications, 09-1990.

1987

"Abstract Algebra for Electrical Engineering and Computer Science", Printed by the Administration Office for Graduate Students, Chengdu, China, University of Electronic Science and Technology of China (UESTC), 1987.

1986

Gong, G., "Runs, component sequences and vector sequences of m-sequences over Galois fields", ACTA ELECTRONICS SILICA, vol. 14, issue No. 4, pp. 94-100, 07-1986.

1984

Gong, G., "An new public-key cryptosystem based on matrix rings", the First National Conference of Cryptography, vol. Xian (in Chinese), 10-1984.

1979

Publications search