# Publications

Sort by: Author Type Year

## 2020

Jiang, S., G. Gong, J. He, K. Nguyen, and H. Wang, , The International Conference on Practice and Theory of Public-Key Cryptography (PKC), Edinburgh, Scotland, May 4-7 2020, 2020.
Fei, Y., G. Gong, C. Gongye, K. Mandal, R. Rohit, T. Xu, Y. Yi, and N. Zidaric, , Proceedings on Selected Areas in Cryptography 2020, 2020.
Chang, Z., G. Gong, and Q. Wang, , IEEE Transactions on Information Theory, vol. 66, issue 6, pp. pp3766 - 3774, 06/2020.
Altawy, R., G. Gong, K. Mandal, and R. Rohit, , IACR Transactions on Symmetric Cryptology - Special Issue on Designs for the NIST Lightweight Standardisation Process, vol. 2020, pp. 132–159, 06/2020.
Yi, Y., G. Gong, and K. Mandal, , IEEE Internet of Things Journal, 2020.
Wang, Z., D. Ma, G. Gong, and E. Xue, New construction of complementary sequence (or array) sets and complete complementary codes: arXiv:2001.04898, 2020.
Gong, G., , Blockchain Technology Symposium 2020, Toronto, Canada, 02/2020.

## 2019

Yi, Y., G. Gong, and K. Mandal, , NIST LWC Workshop, NIST Gaithersburg Campus, 2019.
Yang, M., and G. Gong, , 12th International Symposium on Foundations & Practice of Security, Toulouse, France, Springer, 11/2019.
Yang, M., and G. Gong, , The 12th International Symposium on Foundations & Practice of Security, 2019, Toulouse, France, 2019.
Rohit, R., and G. Gong, , NIST LWC Workshop, NIST Gaithersburg Campus, NIST, 2019.
Mandal, K., and G. Gong, , The 2019 ACM Cloud Computing Security Workshop (AMC-CCSW), London, UK, London, UK, 11/2019.
Gong, G., M. He, R. Rohit, and Y. Yi, , The 12th International Symposium on Foundations & Practice of Security, Toulouse, France, Springer, 2019.
AlTawy, R., and G. Gong, , Proceedings on Privacy Enhancing Technologies, vol. 3, pp. 149–169, 2019.
Gong, G., , 11th International Symposium on Foundations & Practice of Security, LNSC, vol. 11358 , Montreal, Nov., 2018, Springer, 2019.
Mandal, K., B. Yang, and G. Gong, , IEEE Transactions on Computers, 2019.
Fan, X., G. Gong, B. Schoenmakers, and F. Sica, , Journal Designs, Codes and Cryptography, vol. 87, issue 1, pp. 1-13, April/2018, 2019.

## 2018

Rohit, R., R. Altawy, and G. Gong, , Cryptography and Coding, Lecture Notes in Computer Science (LNCS), vol. 10655, pp. 333-351, 2018.
Wang, Z., J. Chai, and G. Gong, , Sequences and Their Applications (SETA), Hong Kong, pp. 14, 2018.
Ma, D., Z. Wang, and G. Gong, , 29th Biennial Symposium on Communications, Toronto, Canada, pp. 5, June/2018.
Rohit, R., and G. Gong, , Ramp Session Presentation, Crypto 2018, vol. Available in IACR Cryptology, ePrint Archive 2018, Santa Barbara, pp. 699, August/2018.
Zidaric, N., M. D. Aagaard, and G. Gong, , International Workshop on the Arithmetic of Finite Fields (WAIFI 2018), Bergen, Norway, June/2018.
Altawy, R., R. Rohit, M. He, K. Mandal, G. Yang, and G. Gong, , Poster presentation at Cryptographic Hardware and Embedded Systems (CHES 2018), Amsterdam, Netherlands, September 2018.
Ma, D., S. Budisin, Z. Wang, and G. Gong, , IEEE Signal processing letters, October/2018.
Wang, Z.L., and G. Gong, , IEEE Transactions on Information Theory Special Issue on Shift-Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb, vol. 64, April/2018.
Chen, Y., B. Case, S.H. Gao, and G. Gong, , Journal of Cryptography and Communication Special Issue on Mathematical Methods for Cryptography, pp. 1-16, May/2018.
Zidaric, N., M. Aagaard, and G. Gong, , IEEE Transactions on Computers, January/2019, 2018.
Yang, M., and G. Gong, , In submission Communication Network Security (CNS), May 30 - June 1, 2018.
Gong, G., T. Helleseth, V. Kumar, and S. W. Golomb, , IEEE Transactions on Information Theory Special Issue on Shift - Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb, vol. 64, issue 4, pp. 2844-2857, April/2018.
Mandal, K., G. Gong, and C. Liu, , Submitted to IEEE Transaction on dependable and secure computing, vol. Technical Report, University of Waterloo, issue CACR 2018-10, December/2018.
Mandal, K., and G. Gong, , Journal of Advances in Mathematics of Communications, 09/2018.
Altawy, R., R. Rohit, M. He, K. Mandal, G. Yang, and G. Gong, , ACM Transactions on Embedded Computing Systems, vol. 17, issue 4, pp. 1-26, 2018.
Altawy, R., R. Rohit, M. He, K. Mandal, G. Yang, and G. Gong, , IEEE Transactions on Computers, vol. 67, issue 9, pp. 1341-1358, 2018.

## 2017

Altawy, R., R. Rohit, M. He, K. Mandal, G. Yang, and G. Gong, , in Selected Areas in Cryptography, 2017.
Ma, D., Z. Wang, and G. Gong, , the proceedings of IEEE 2017 Eighth International Workshop on Signal Design and Its Applications in Communications (IWSDA), Sapporo, Japan, September/2017.
Altawy, R., M. ElSheikh, A. Youssef, and G. Gong, , the 15th International Conference on Privacy, Security and Trust (PST'17), Calgary, Canada, August/2017.
Rohit, R., R. Altawy, and G. Gong, , in the 16th IMA International Conference on Cryptography and Coding (IMACC 2017), LNCS, CACR Technical Report, cacr2017-06, University of Waterloo, vol. 10655, St Catherine's College, University of Oxford, Oxford, UK, pp. 12-14, December/2017.
Wu, T., Y. Tan, K. Mandal, and G. Gong, , in the Proceedings of 2nd International Conference on Codes, Cryptology and Information Security (C2SI), Lecture Notes in Computer Sciences (LNCS), S.E. Hajji et al. Eds., Springer, vol. 10194, pp. 265-281, 2017.
Gong, G., , invited talk at Coding Theory, Cryptography, and Number Theory, at the AMS Meeting at College of Charleston in Charleston, March/2017.
Liu, Q., G. Gong, Y. Wang, and H. Li, , Mobile Information Systems, vol. 2017, issue Article ID 7843843, pp. 12, 2017.
Wang, Z., and G. Gong, , IEEE Transactions on Information Theory Special Issue on Shift-Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb, April/2018, 2017.
Yang, B., K. Mandal, M. Aagaard, and G. Gong, , IEEE Transactions on Computers, vol. 66, issue 8, pp. 1354-1368, 2017.
Tan, Y., G. Gong, and B. Zhu, , Journal of Cryptography and Communications, vol. 8, issue 2, pp. 291-311, April/2016, 2017.
Chen, Y., B. Case, S. Gao, and G. Gong, , In submission Journal of Cryptography and Communications Special Issue on Mathematical Methods for Cryptography, vol. CACR Technical Report cacr2-17-8, University of Waterloo, November/2017.  (288.05 KB)
Yang, Y., X. Tang, and G. Gong, , Advances in Mathematics of Communications, vol. 11, issue 1, pp. 67-76, 2017.
Mandal, K., B. Yang, G. Gong, and M. Aagaard, On Ideal t-Tuple Distribution of Filtering de Bruijn Sequence Generators, vol. 10, issue 4, pp. 629-641, 2017.
Gong, G., T. Helleseth, and V. Kumar, , IEEE Transactions on Information Theory Special Issue on Shift-Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb, April/2018, 2017.
Altawy, R., R. Rohit, M. He, K. Mandal, G. Yang, and G. Gong, , To appear at IEEE Transactions on Computers. CACR Technical Report cacr2017-04, University of Waterloo , 2017.

## 2016

Chen, Y., Y. Tan, and G. Gong, , Sequences and Their Applications (SETA) 2016, Chengdu, China, October/2016.
Mandal, K., B. Yang, G. Guang, and M. Aagaard, , Sequences and Their Applications (SETA) 2016, Chengdu, China, October/2016.
Tan, Y., and G. Gong, , Contemporary Developments in Finite Fields and Applications, A. Canteaut et al. (Eds.), World Scientific Press, pp. 341-362, 2016.
Liu, Q., and G. Gong, , the Proceedings of IEEE Globecom 2016 - CISS}, Washington DC, USA, December/2016.
Tan, Y., K. Mandal, T. Wu, and G. Gong, , the 25th International Conference on Computer Communication and Networks (ICCCN)}, Waikoloa, Hawaii, USA, August/2016.
Ma, D., Z. Wang, and H. Li, , IEICE Transactions, vol. 99-A, issue 6, pp. 1222-1227, 2016.
Huo, F., P. Mitran, and G. Gong, , IEEE Transactions on Information Forensics and Security, vol. 11, issue 7, pp. 1528-1541, July/2016.
Mandal, K., X. Fan, and G. Gong, , ACM Transactions on Embedded Computing Systems, vol. 15, issue 1, pp. 1-28, 2016.
Mandal, K., and G. Gong, , IEEE Transactions on Computers, vol. 65, issue No. 9, pp. 2725-2738, 2016.
Mandal, K., and G. Gong, , ICST Transactions on Security Safety, vol. 16, issue No. 7, 2016.
Qu, L., Y. Tan, C. Li, and G. Gong, , Designs, Codes and Cryptography}, vol. 78, issue 2, pp. 391-408, February/2016.
Carlet, C., G. Gong, and Y. Tan, , Designs, Codes and Cryptography}, vol. 78, issue 3, pp. 629-654, March/2016.
Gong, G., Sequences and Cryptography, 2016.  (8.04 MB)

## 2015

Fuhr, T., G. Leurent, and V. Suder, , inASIACRYPT’15, Part II, LNCS 9453, 2015.
Mandal, K., and G. Gong, , Open Problems in Mathematics and Computational Science, C.K. Koç (Ed.), pp. 127-162, 2015.
Liu, Q., G. Gong, Y. Wang, and H. Li, , IEEE Globecom 2015 Workshop on Trusted Communications with Physical Layer Security (GC'15-TCPLS), San Diego, USA, December/2015.
Tan, Y., and G. Gong, , Functions and Geometries over Finite Fields, Ottawa, July/2015.
Yang, G., M. Aagaard, and G. Gong, , NIST Lightweight Cryptography workshop, July/2015.
Chen, Y., and G. Gong, , Proceedings of 2015 IEEE CNS Workshop on Security and Privacy in the Cloud (SPC), Florence, Italy, pp. 592-596, September/2015.
Suder, V., , WCC2015, April/2015.
Tan, Y., and G. Gong, , the 12th International Conference on Finite fields and their applications, Saratoga Spring, NY, July/2015.
Zhu, B., X. Fan, and G. Gong, , The 5th ACM Conference on Data and Application Security and Privacy (CODASPY 2015), pp. 127-129, 2015.
Yang, G., B. Zhu, V. Suder, M. Aagaard, and G. Gong, , Workshop on Cryptographic Hardware and Embedded Systems (CHES 2015), LNCS 9293, pp. 307-329, September/2015.
Mandal, K., Y. Tan, T. Wu, and G. Gong, , IEEE Transactions on Information Forensics and Security, September/2015.
Tan, Y., and G. Gong, , Design, Codes and Cryptography, September/2015.
Harn, L., and G. Gong, , Journal of Security and Communication Networks, vol. 8, issue 9, pp. 1794-1800, June/2015.
Tan, Y., G. Gong, and B. Zhu, , Journal of Cryptography and Communications, Springer, June/2015.
Mandal, K., and G. Gong, , IEEE Transactions on Computers, 2015.
Zhu, S., and G. Gong, , IEEE Transactions on Cloud Computing, Special Issue on Cloud Security, vol. 2, issue No. 4, pp. 422-435, October/2014, 2015.
El-Razouk, H., A. Reyhani-Masoleh, and G. Gong, , IEEE Trans. Comput., vol. 64, issue no. 7, pp. 2020-2035, August/2015.
Wu, T., Y. Tan, K. Mandal, and G. Gong, , Submitted to Journal of Cryptography and Communications, September/2015.
Wu, T., and G. Gong, , Security and Communication Networks, December/2015.
Huo, F., and G. Gong, , IEEE Transactions on Electromagnetic Compatibility, issue No. 99, pp. 1-9, January/2015.

## 2014

Gong, G., and S.W. Golomb, , Sequences and Their Applications - SETA 2014, Lecture Notes in Computer Science, vol. 2014, pp. 109-120, 2014.
Huo, F., and G. Gong, , Proceedings of The 33rd Annual IEEE International Conference on Computer Communications (INFOCOM'14), Technical Report, CACR 2013-01, University of Waterloo, 2013, Toronto, Canada, pp. 1024--1032, 2014.
Zhu, B., X. Fan, and G. Gong, , Proceedings of 2014 IEEE INFOCOM Workshop on Security and Privacy in Big Data (BigSecurity), Technical Report, CACR 2013-24, University of Waterloo, 2013., Toronto, Canada, pp. 494-499, 2014.
Hu, H.G., S. Shao, G. Gong, and T. Helleseth, , IEEE International Symposium on Information Theory (ISIT), Honolulu, HI, pp. 1822-1826, July/2014.
Huo, F., and G. Gong, , IEEE International Symposium on EMC, Raleigh, USA, pp. 604-608, August/2014.
Huo, F., and G. Gong, , IEEE International Symposium on EMC, Raleigh, USA, pp. 604-608, August/2014.
Feng, J.L., and G. Gong, , IEEE International Symposium on EMC 2014, Raleigh, USA, pp. 155-158, August/2014.
Tan, Y., K. Mandal, and G. Gong, , Design, Codes and Cryptography, 2014.
Tan, Y., G. Gong, and B. Zhu, , Journal of Cryptography and Communications, 2014.
Tan, Y., G. Gong, and B. Zhu, , Journal of Cryptography and Communications, 2014.
Qu, L., Y. Tan, C. Li, and G. Gong, , Designs, Codes and Cryptography, pp. 1-18, September/2014.
Zhu, B., and G. Gong, , Journal of Cryptography and Communications, Discrete Structures, Boolean Functions and Sequences (CCDS), vol. 6, issue 4, pp. 313-333, December/2014.
Chung, J.-H., G. Gong, and K. Yang, , IEEE Transactions on Information Theory, vol. 60, issue No. 6, pp. 3688-3697, June/2014.
El-Razouk, H., A. Reyhani-Masoleh, and G. Gong, , IEEE Transactions on VLSI, vol. 22, issue No. 9, September/2014.
Leung, B., G. Gong, D. Mcleish, and S. Robson, , Journal of Analog Integrated Circuits and Signal Processing, vol. 78, issue No. 3, pp. 853-863, March/2014.
Wang, Z., M. Parker, G. Gong, and G.F. Wu, , IEEE Transactions on Information Theory, vol. 60, issue 4, pp. 2391-2398, April/2014.
Mandal, K., G. Gong, X. Fan, and M. Aagaard, , Cryptography and Communications, vol. 6, issue 2, pp. 117-135, June/2014.
Zhu, B., X. Fan, and G. Gong, , IEEE Trans on Dependable and Secure Computing, 2014.
Carlet, C., G. Gong, and Y. Tan, , Designs, Codes and Cryptography, pp. 1-26, 2014.
Hu, H., S. Shao, G. Gong, and T. Helleseth, , IEEE Transactions on Information Theory, vol. 60, issue No. 8, pp. 5054-5064, August/2014.
Robson, B., B. Leung, and G. Gong, , IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 61, issue No. 2, pp. 937-941, December/2014.
Huo, F., and G. Gong, , IEEE Transactions on Electromagnetic Compatibility, 2014.
Gong, G., Communication System Security, 2014.  (20.32 MB)
Kaleem, M., and G. Gong, , Technical Report, CACR 2014-17, University of Waterloo, 2014., 2014.
Zhu, S., and G. Gong, , Technical Report, CACR 2014-16, University of Waterloo, 2014.
El-Razouk, H., A. Reyhani-Masoleh, and G. Gong, , Technical Report, CACR 2014-02, University of Waterloo, 2014.
Gong, G., K. Mandal, Y. Tan, and T. Wu, , Technical Report, CACR 2014-14, University of Waterloo., 2014.
Gong, G., K. Mandal, Y. Tan, and T. Wu, Security Assessment of TUAK Algorithm Set, pp. 119 pages, 2014.
Feng, J., and G. Gong, , IEEE International Symposium on Electromagnetic Compatibility, Raleigh, NC, USA, August/2014.

## 2013

Gong, G., and K.C. Gupta, , Handbook of Finite Fields, 2013.
Huo, F., C. Yang, G. Gong, and R. Poovendran, , TCryptology and Information Security Series - The 2013 Workshop on RFID and IoT Security (RFIDSec'13 Asia), Ma and J. Weng (Eds.), vol. 11, Amsterdam, Netherlands, IOS Press, pp. 57-68, November/2013.
Fan, X., T. Wu, and G. Gong, , The 3rd International Conference on Communication and Network Security (ICCNS'13), London, UK, pp. 16-17, November/2013.
Gong, G., , Character Sums and Polynomials, A. Winterhof et al. (Eds.), De Gruyter, Germany, pp. 1-43, 2013.
Yang, G., X. Fan, M. Aagaard, and G. Gong, , The 8th Workshop on Embedded Systems Security (WESS'13), vol. Article No. 8, Montreal, Canada, ACM Press, September/2013.
Fan, X., N. Zidaric, M. Aagaard, and G. Gong, , The 3rd International Workshop on Trustworthy Embedded Devices (TrustED'13), Berlin, Germany, ACM Press, pp. 21-34, November/2014, 2013.
Mandal, K., and G. Gong, , Quality, Reliability, Security and Robustness in Heterogeneous Networking (Qshine 2013), ser. LNICST 115, K. Singh, A.K. Awasthi, and R. Mishra (Eds.), Berlin, Germany: Springer-Verlag, pp. 643-657, 2013.
Aagaard, M. D., G. Gong, and R. K. Mota, , IEEE International Symposium on Hardware-Oriented Security and Trust (HOST'13), Austin, TX, USA, pp. 29-34, June/2013.
Gong, G., F. Huo, and Y. Yang, , 2013 IEEE International Symposium on Information Theory Proceedings (ISIT'13), Istanbul, Turkey, pp. 3135-3139, July/2013.
Weng, G., Y. Tan, and G. Gong, , Proceedings of the International Workshop on Coding and Cryptography (WCC 2013), Bergen, Norway, pp. 48-57, April/2013.
Mandal, K., G. Gong, X. Fan, and M. Aagaard, , Proceedings of 13th Canadian Workshop on Information Theory (CWIT'13), Toronto, Canada, pp. 17-21, June/2013.
Zhang, B.Y., and G. Gong, , Proceedings of 2013 Sixth International Workshop on Signal Design and its Applications in Communications (IWSDA), Tokyo, Japan, pp. 107-108, October/2013.
Zhu, B., Y. Tan, and G. Gong, , Cryptology and Network Security - CANS'13, Lecture Notes in Computer Science, vol. 8257, Berlin, Germany: Springer-Verlag, M. Abdalla, C. Nita-Rotaru and R. Dahab (Eds.), pp. 20-38, November/2013.
Fan, X., and G. Gong, , TCryptology and Information Security Series - The 2013 Workshop on RFID and IoT Security (RFIDSec'13 Asia), C. Ma and J. Weng (Eds.), vol. 11, Amsterdam, Netherlands, IOS Press, pp. 97-106, November/2013.
Fan, X., and G. Gong, , The First ACM Workshop on Smart Energy Grid Security (SEGS'13), Berlin, Germany, ACM Press, pp. 17-22, November/2013.
Wu, T., and G. Gong, , Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec'13, CACR 2013-04, 2013, University of Waterloo, Canada, Budapest, Hungary, Technical Report, pp. 79-88, April/2013.
Fan, X., K. Mandal, and G. Gong, , Quality, Reliability, Security and Robustness in Heterogeneous Networking (Qshine 2013), , ser. LNICST 115, K. Singh, A.K. Awasthi, and R. Mishra (Eds.), Berlin, Germany: Springer-Verlag, pp. 617-632, 2013.
Wang, Z.L., and G. Gong, , Advances in Mathematics of Communications, vol. 7, issue No. 4, pp. 475-484, October/2013.
Gong, G., S. Goh, and Y. Tan, , Finite Fields and Their Applications, 2013.
Gong, G., Y. Tan, and B. Zhu, , IEEE Trans on Information Theory, 2013.
Yang, Y., X.H. Tang, and G. Gong, , Advances in Mathematics of Communications, vol. 7, issue No. 2, pp. 113-125, May/2013.
Gong, G., F. Huo, and Y. Yang, , IEEE Transactions on Communications, vol. 61, issue No. 9, pp. 3967-3979, August/2013.
El-Razouk, H., A. Reyhani-Masoleh, and G. Gong, , IEEE Transactions on Very Large Scale Integration (VLSI) Systems, September/2013.
Wang, Z.L., G. Gong, and N.Y. Yu, , IEEE Transactions on Information Theory, vol. 59, issue No. 6, pp. 3990-3998, June/2013.
Weng, G., Y. Tan, and G. Gong, , Designs, Codes and Cryptography, 2013.
Li, Z.J., and G. Gong, , IEEE/ACM Transactions on Networking, vol. 21, issue No. 6, pp. 1799-1811, December/2013.
Gong, G., M. Aagaard, and X. Fan, , Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences, vol. 5, issue No. 4, pp. 277-289, December/2013.
Li, Z.J., G. Gong, and Z.G. Qin, , IEEE Transactions on Information Theory, June/2013.
Fan, X., and G. Gong, , Technology Innovation Management (TIM) Review, pp. 42-49, July/2013.
Hu., H., S. Shao, G. Gong, and T. Helleseth, The Proof of Lin's Conjecture via the Decimation-Hadamard Transform, 2013.
Mandal, K., X. Fan, and G. Gong, , Journal of RFID Security and Cryptography, vol. 2, issue 1-4, pp. 82-91, 2013.
Hou, F., and G. Gong, , Technical Report, CACR 2013-02, 2013, University of Waterloo, Canada, 2013.
Mandal, K., and G. Gong, , Technical Report, CACR 2012-27, 2012, University of Waterloo, 2013.
Mandal, K., G. Gong, X. Fan, and M. Aagaard, , Technical Report CACR 2013-15 University of Waterloo, 2013.

## 2012

Gong, G., , Character Sums and Polynomials, De Gruyter, Germany, pp. 1-43, 2012.
Chai, Q., and G. Gong, , RFID Security and Privacy, Lecture Notes in Computer Science, Ari Juels and Christof Paar (Eds.), vol. 7055, Springer, Heidelberg, pp. 127-146, 2012.
Mandal, K., and G. Gong, , Selected Areas in Cryptography, Lecture Notes in Computer Science, L.R. Knudsen and H. Wu (Eds.), vol. 7707, Springer, Heidelberg, pp. 104-118, 2012.
Chai, Q., G. Gong, and D. Engels, , The Proceedings of 2012 IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM), San Francisco, CA, USA, pp. 1-6, June/2012.
Gong, G., F. Huo, and Y. Yang, , The Proceedings of 2012 IEEE International Symposium on Information Theory (ISIT), Cambridge, MA, USA, pp. 1019-1023, 2012.
Yang, Y., F. Huo, and G. Gong, , The Proceedings of 2012 IEEE International Symposium on Information Theory (ISIT), Cambridge, MA, USA, pp. 1024-1028, 2012.
Fan, X., and G. Gong, , the Proceedings of The 4th International Conference on Ad Hoc Networks, October/2012.
Yang, Y., G. Gong, and X.H. Tang, , Sequences and Their Applications (SETA), Lecture Notes in Computer Science, J. Jedwab and T. Helleseth (Eds.), vol. 7280, pp. 1-12, 2012.
Fan, X., and G. Gong, , The 4th Western European Workshop on Research in Cryptology (WEWoRC 2011), Lecture Notes in Computer Science, F. Armknecht and S. Lucks (Eds.), Springer Verlag, pp. 18-29, 2012.
Chai, Q., and G. Gong, , The Proceedings of IEEE ICC 2012 - Communication and Information Systems Security Symposium, Communication and Information Systems Security Symposium, Ottawa, Canada, pp. 917-922, June/2012.
Mandal, K., X. Fan, and G. Gong, , Cryptology and Information Security Series - The 2012 Workshop on RFID and IoT Security (RFIDsec'12 Asia), N.W. Lo and Y. Li (Eds.), vol. 8, Amsterdam, Netherlands, IOS Press, pp. 73-84, 2012.
Chai, Q., and G. Gong, , International Journal of Applied Cryptography, 2012.
Gong, G., T. Helleseth, and H.G. Hu, , IEEE Transactions on Information Theory, vol. 58, issue No. 2, pp. 1158-1162, February/2012.
Fan, X., and G. Gong, , Journal of Ad Hoc Networks, vol. 10, issue No. 4, pp. 723-736, June/2012.
Harn, L., and G. Gong, , IEEE Transactions on Computers, 2012.
Li, Z.J., and G. Gong, , IET Information Security, 2012.
Gong, G., F. Huo, and Y. Yang, , IEEE Transactions on Communication, November/2012.
Wang, Z., G. Gong, and N.Y. Yu, , IEEE Transactions on Information Theory, November/2012.
Gong, G., T. Helleseth, H.G. Hu, and A. Kholosha, , IEEE Transactions on Information Theory, vol. 58, issue No. 2, pp. 2237-2243, April/2012.
Yang, Y., G. Gong, and X.H. Tang, , IEEE Transactions on Information Theory, 2012.
Gong, G., M. Aagaard, and X. Fan, , Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences, 2012.

## 2011

Fan, X., G. Gong, D. Engels, and E. Smith, , Joint Workshop of SCPA 2011 and SaCoNAS 2011, Houston, TX, USA, December/2011.
Mandal, K., X. Fan, and G. Gong, , Western European Workshop on Research in Cryptology (WEWoRC 2011), Bauhaus-University Weimar, Germany, July/2011.
Chai, Q., and G. Gong, , 7th Annual Workshop on RFID Security and Privacy (RFIDsec'11), Amherst, MA, USA, June/2011.
Chai, Q., and G. Gong, , IEEE Global Communications Conference (GLOBECOM'11), Houston, TX, USA, December/2011.
Yang, Y., X.H. Tang, G. Gong, and Z.C. Zhou, , IWSDA, Guilin, Guangxi, pp. 36-39, 2011.
Fan, X., and G. Gong, , Western European Workshop on Research in Cryptology (WEWoRC 2011), Bauhaus-University Weimar, Germany, July/2011.
Fan, X., G. Gong, and H. Hu, , The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (SPIoT 2011), Changsha, Hunan, China, November/2011.
Fan, X., G. Gong, and H. Hu, , The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (SPIoT 2011), Changsha, Hunan, China, November/2011.
Safkhani, M., N. Bagheri, M. Naderi, Y. Luo, and Q. Chai, , First International Workshop on Lightweight Cryptography (LWCrypt 2011), Vienna, Austria, August/2011.
Li, Z.J., and G. Gong, , Journal of Ad Hoc Networks, vol. 9, issue No. 2, pp. 202-215, 2011.
Gong, G., S. Ronjom, T. Helleseth, and H. Hu, , IEEE Transactions on Information Theory, vol. 57, pp. 5555-5565, August/2011.
Yu, N.Y., and G. Gong, , IEEE Transactions on Information Theory, vol. 57, issue No. 1, pp. 505-513, January/2011.
Wang, Z.L., and G. Gong, , IEEE Transactions on Information Theory, vol. 57, issue No. 7, pp. 4600 - 4611, July/2011.
Hu, H., and G. Gong, , International Journal of Foundations of Computer Science, vol. 22, issue No. 6, pp. 1317-1329, 2011.
Dai, Z. D., G. Gong, H.Y. Song, and D.F. Ye, , IEEE Trans. on Inform Theory, accepted., 2011.
Gupta, K.C., Y. Nawaz, and G. Gong, , Information Processing Letters, vol. 111, pp. 247-249, 2011.
Gong, G., , Technical Report, CACR 2011-35., University of Waterloo, 2011.
Chai, Q., X. Fan, and G. Gong, , Cryptology ePrint Archive, Report 2011/247, 2011.
Zhu, and G. Gong, , Technical Report, CACR 2011-34, University of Waterloo, Canada, 2011.
Lam, C., M. Aagaard, and G. Gong, , Technical Report, CACR 2011-01, University of Waterloo, 2011.
Chai, Q., and G. Gong, , , Technical Report CACR 2011-22, 2011.

## 2010

Guo, K., and G. Gong, , Proceedings of Sequences and Their Applications, Lecture Notes in Computer Sciences, vol. 6338, Springer, pp. 259-269, 2010.
Tassanaviboon, A., and G. Gong, , Proceedings of the 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2010), pp. 614-621, 2010.
Chai, Q., and G. Gong, , Poster Presentation at IEEE RFID 2010, Orlando, Florida, USA, pp. April 14-15, 2010.
Chai, Q., and G. Gong, , Technical Report CACR 2010-09, 2010.
Hu, H.G., and G. Gong, , Proceedings of 2010 IEEE International Symposium on Information Theory (ISIT 2010), pp. 1292-1296, 2010.
Fan, X.X., and G. Gong, , Proceedings of the Second International Conference on Ad Hoc Networks (AdHocNets 2010), . Zheng, D. Simplot-Ryl, and V.C.M. Leung (Eds.), Berlin, Germany: Springer-Verlag, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 328-343, 2010.
Li, Z.J., and G. Gong, , Proceedings of 9th International Conference on Ad Hoc Networks and Wireless (ADHOC-NOW 2010), Lecture Notes in Computer Science, I. Nikolaidis and K. Wu (Eds.), vol. 6288, Berlin, Germany: Springer-Verlag, pp. 149-162, 2010.
Fan, X.X., G. Gong, K. Lauffenburger, and T. Hicks, , Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), California, USA, June/2010.  (165.56 KB) (351.25 KB)
Yu, N.Y., and G. Gong, , Proceedings of 2010 IEEE International Symposium on Information Theory (ISIT 2010), pp. 1258-1262, 2010.
Engels, D., X.X. Fan, G. Gong, H.G. Hu, and E. M. Smith, , The 14th International Conference on Financial Cryptography and Data Security - FC 2010, LNCS 6054, R. Curtmola et al. (Eds.), Tenerife, Canary Islands, Spain, pp. 3-18, 2010.
Wen, H., G. Gong, and P.H. Ho, , Proceedings of IEEE Global Communications Conference (GLOBECOM'10), Miami, Florida, USA, December/2010.
Yu, N.Y., and G. Gong, , Proceedings of 2010 IEEE International Symposium on Information Theory (ISIT 2010), pp. 1233-1237, 2010.
Luo, Y.Y., Q. Chai, G. Gong, and X.J. Lai, , Proceedings of IEEE Global Communications Conference (GLOBECOM'10), Miami, Florida, USA, December/2010.
Wang, Z.L., and G. Gong, , Applied and Computational Harmonic Analysis, vol. 28, issue No. 1, pp. 114-120, 2010.
Yu, N.Y., and G. Gong, , IEEE Transactions on Information Theory, vol. 56, pp. 1702-1713, April/2010.
Tang, X.H., and G. Gong, , IEEE Transactions on Information Theory, vol. 56, issue No. 3, pp. 1278-1286, March/2010.
Hu, H.G., and G. Gong, , IEEE Transactions on Information Theory, vol. 56, pp. 1702-1713, April/2010.
Gong, G., , Tutorial talk at Indocrypt'10, December/2010.  (1.07 MB) (1.71 MB) (2.01 MB)

## 2009

Wen, H., and G. Gong, , 43rd Annual Conference on Information Sciences and Systems (CISS 2009), pp. 935 - 939, 2009.
Wen, H., P. Han Ho, and G. Gong, , Globe communication conference, IEEE GLOBECOMb , 2009.
Li, Z., and G. Gong, , Proceedings of First International Conference on Ad Hoc Networks (ADHOCNETS 2009), LNICST 28, Niagara Falls, Ontario, Canada, pp. 192-207, 2009.
Li, Z., and G. Gong, , Proceedings of First International Conference on Ad Hoc Networks (ADHOCNETS 2009), LNICST 28, Niagara Falls, Ontario, Canada, pp. 240-255, 2009.
Fan, X.X., H.G. Hu, G. Gong, E. Smith, and D. Engels, , Lightweight Implementation of Hummingbird Cryptographic Algorithm on 4-Bit Microcontroller, to appear in the Proceedings of The 1st International Workshop on RFID Security and Cryptography 2009 (RISC'09), London, UK, October/2009.
Yu, N.Y., and G. Gong, , Coding and Cryptology, Lecture Notes in Computer Science, Y.M. Chee, et al. (Eds.), vol. 5557, Springer, pp. 248-258, 2009.
Hu, H., and G. Gong, , IEEE International Symposium on Information Theory (ISIT 2009), Seoul, Korea, 2009.
Dai, Z. D., G. Gong, and H.Y. Song, A trace representation of binary Jacobi sequences, Discrete Mathematics, vol. 309, pp. 1517-1527, 2009.
Nawaz, Y., K. C. Gupta, and G. Gong, , IEEE Transactions on Information Theory, 2009.
Wen, H., G. Gong, and P.H. H, , JOURNAL OF COMMUNICATIONS AND NETWORKS, vol. 11, issue No. 6, pp. 538-543, 2009.
Hu, H., G. Gong, and D. Feng, , IEEE Transactions on Information Theory, 2009.
Wang, Z., and G. Gong, A Note on the Diagonalization of the Discrete Fourier Transform, University of Waterloo, Canada, Technical Report, CACR 2009-12, 2009.
Gong, G., S. Ronjom, T. Helleseth, and H.G. Hu, Fast Discrete Fourier Spectra Attacks on Stream Ciphers, University of Waterloo, Canada, Technical Report, CACR 2009-04, 2009.  (264.65 KB) (612.64 KB)
Hoeper, K., and G. Gong, Monitoring-Based Key Revocation Schemes for Mobile Ad Hoc Networks: Design and Security Analysis, University of Waterloo, Canada, 2009.
Yu, N., and G. Gong, Multiplicative Characters, The Weil Bound, and Polyphase Sequence Families With Low Correlation, University of Waterloo, Canada, Technical Report, CACR 2009-25, 2009.
Yu, N., and G. Gong, Near-complementary Sequences With Low PMEPR for Peak Power Control in Multicarrier Communications, University of Waterloo, Canada, Technical Report, CACR 2009-24, 2009.
Hu, H.G., and G. Gong, , Technical Report, CACR 2009-03, January 2009, University of Waterloo, Canada, IEEE Transactions on Information Theory, 2009.
Wang, Z., and G. Gong, , Technical Report, CACR 2009-01, January 2009, University of Waterloo, Canada, Seoul, Korea, IEEE Transactions on Information Theory, 2009.
Hu, H.G., and G. Gong, New Ternary and Quaternary Sequences with Two-Level Autocorrelation, University of Waterloo, Canada, Technical Report, CACR 2009-16, 2009.
Engels, D., X.X. Fan, G. Gong, H.G. Hu, and E. Smith, Ultra-lightweight cryptography for low-cost RFID tags: Hummingbird algorithm and protocol,, University of Waterloo, Canada, Technical Report, CACR 2009-29, 2009.

## 2008

Hu, H.G., and G. Gong, , Lecture Notes in Computer Sciences, S.W. Golomb, et al. (Eds.), vol. 5203, Springer, pp. 51-60, 2008.
Fan, X.X., G. Gong, and D. Jao, , Pre-proceedings of the 15th Annual Workshop on Selected Areas in Cryptography (SAC 2008), vol. Technical Report, University of Waterloo, CACR 2008-03, Mount Allison University, Sackville, New Brunswick, Canada, Technical Report, University of Waterloo, CACR 2008-03, pp. 17-33, 01-2008.
Fan, X.X., and G. Gong, , Proceedings of the Fourth IEEE LCN Workshop on Network Security (WNS 2008), Montreal, Technical Report, University of Waterloo, CACR 2008-05, October 2008.
Hu, H.G., G. Gong, and F.D. Guo, , New results on periodic sequences with large $k$-error linear Error!, Toronto, Canada, the Proceedings of International Symposium on Information Theory (ISIT 2008), pp. 2409-2413, 07-2008.
Gong, G., , Sequences and Their Applications (SETA), Lecture Notes in Computer Sciences, S.W. Golomb, et al. (Eds.), vol. 5203, Springer, pp. 197-218, 2008.
Fan, X.X., G. Gong, and D. Jao, , Pairing-based Cryptography, Lecture Notes of Computer Sciences, S.D. Galbraith, and K.G. Paterson (Eds.), vol. 5209, Berlin, Germany, Springer-Verlag, pp. 243-264, 2008.
Zhou, Z., X.H. Tang, and G. Gong, , IEEE Trans. on Inform., vol. 54, issue No. 9, pp. 4267-4273, September/2008.
Khoo, K.M., C. W. Lim, and G. Gong, , Applicable Algebra in Engineering, Communication and Computing, vol. 19, issue No. 4, pp. 323 - 338, August/2008.
Charpin, P., and G. Gong, , IEEE Trans. on Inform, vol. 54, issue No. 9, pp. 4230-4238, September/2008.
Yu, N. Yul, and G. Gong, , IEEE Trans. on Inform. , vol. 54, issue No. 10, pp. 4771 - 4779, October/2008.
Li, Z., and G. Gong, Survey on Security in Wireless Sensor, Special English Edition of Journal of KIISC, vol. 18, issue No. 6 (B), pp. 233-248, December/2008.
Nawaz, Y., and G. Gong, WG: A family of stream ciphers with designed randomness properties, Information Sciences, vol. 178, issue No. 7, pp. 1903-1916, April/2008.
Wen, H., and G. Gong, A MIMO based cross-layer approach to augment the security of wireless networks: Technical Report, University of Waterloo, CACR 2008-21, 10-2008.
Li, Z.J., and G. Gong, A survey on security in wireless sensor networks: Technical Report, University of Waterloo, CACR 2008-20, 10-2008.

## 2007

Hoeper, K., and G. Gong, , in the book series on Computer and Network Security: Y. Xiao and Y. Pan (Eds.), World Scientific Publishing Co., 2007.
Hoeper, K., and G. Gong, Pre-Authentication and Authentication Models in Ad Hoc Networks: edited by Y. Xiao, X. (Sherman) Shen, and D.-Z. Du, Springer Verlag, 2007.
Golomb, S.W., and G. Gong, , the Proceedings of 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, Bergen, Norway, 07-2007.
Gong, G., , Proceedings of International Symposium on Information Theory (ISIT 2007), Nice, France, pp. 2306-2310, 06-2007.
Gong, G., , the Proceedings of 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, Bergen, Norway, 07-2007.
Nawaz, Y., and G. Gong, , The Proceedings of the Fifth International Symposium on Parallel and Distributed Processing and Applications (ISPA07), Lecture Notes in Computer Sciences, Stojmenovic et al. (Eds.), , vol. 4742: Springer-Verlag, pp. 612-621, 09-2007.
Fan, X., and G. Gong, , the Proceedings of Selected Areas in Cryptography, Lecture Notes in Computer Science, Adams et al. (Eds), vol. 4876, Ottawa, Canada, Springer-Verlag, pp. 155-172, 09-2007.
Nawaz, Y., K. C. Gupta, and G. Gong, , Proceedings of International Workshop on Coding and Cryptography, Versailles, France, pp. 237-246, 04-2007.
Rønjom, S., G. Gong, and T. Helleseth, , Lecture Notes in Computer Science, S.W. Golomb et al. (Eds.), vol. 4893: Springer-Verlag, pp. 204-217, 2007.
Gong, G., , Sequences, Subsequences, and Consequences, Lecture Notes in Computer Science, S.W. Golomb et al (Eds.), vol. 4893: Springer-Verlag, pp. 192-203, 2007.
Yu, N.Y., and G. Gong, , Lecture Notes in Computer Science, S.W. Golomb et al. (Eds.), vol. 4893: Springer-Verlag, pp. 37-49, 2007.
Gong, G., S. W. Golomb, and H.Y. Song, , IEEE Trans. on Information Theory, vol. 53, issue No. 7, pp. 2575 - 2581, 07-2007.
Fan, X.X., T. Wollinger, and G. Gong, , IET Information Security, vol. 1, issue 2, pp. 65-81, 06-2007.
Khoo, K.M., and G. Gong, , IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, vol. E90-A, issue No. 1, pp. 29-35, 01-2007.
Hoeper, K., and G. Gong, , International Journal of Security and Networks (IJSN), Special Issue on Cryptography in Networks, vol. 2, issue 3/4, pp. 239-250, 2007.
Golomb, S.W., and G. Gong, , IEEE Trans. on Information Theory, vol. 53, issue No. 11, pp. 4260 - 4265, 11-2007.

## 2006

Giuliani, K., and G. Gong, , Sequences and Their Applications, LNCS, vol. G. Gong et al.(Eds.), issue 4047, pp. 242-252, 2006.
Khoo, K., G. Gong, and D. R. Stinson, , Designs,Codes, and Cryptography, vol. 38-2, pp. 279-295, 02-2006.
Gong, G., S. W. Golomb, and H-Y. Song, , 40th Annual Conference of Information Sciences and Systems (CISS 2006), vol. Princeton University, Technical Co-Sponsorship With IEEE Information Theory Society, 2006.
Yu, N. Yul, and G. Gong, , Sequences and Their Applications (SETA06), LNCS, vol. 4086, issue G. Gong et al. (Eds.), pp. 104-118, 2006.
Hoeper, K., and G. Gong, , Proceedings of International Symposium on Information Theory(ISIT 2006), 2006.
Yu, N.Y., and G. Gong, , Proc. of IEEE Information Theory Workshop (ITW), pp. 530-534, 10-2006.
Hoeper, K., and G. Gong, , Proceedings of 5th International Conference on AD-HOC Networks and Wireless -AD HOCNOW, Lecture Notes in Computer Science, vol. 4104, issue T. Kunz and S.S. Ravi (Eds.), pp. 224-237, 2006.
K, M.K., and G. Gong, , IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Cryptography and Information Security, vol. E90-A, issue No. 1, pp. 29-35, 01-2007, 2006.
Yu, N.Y., and G. Gong, , IEEE Trans. on Inform. Theory, vol. 52, issue No. 4, pp. 1624-1636, 04-2006.
Youssef, A., S. E. Tavares, and G. Gong, , Discrete Mathematics, vol. 306, pp. 2016-2020, 2006.
Youssef, A.M., and G. Gong, , Theoretical ComputerScience, vol. 352, issue 1-3, pp. 288-292, 03-2006.
Yu, N.Y., and G. Gong, , Proc. of 23rd Biennial Symposium on Communication, pp. 128-131, 2006.
Yu, N. Yul, and G. Gong, , Coding and Cryptography, Lecture Notes in Computer Science, vol. 3969, issue T. Helleseth et al. (Eds.), pp. 371-385, 2006.
Gong, G., and H.Y. Song, , Discrete Applied Mathematics, vol. 153, issue 18, pp. 2590-2598, 12-2006.
Nassir, Y., G. Gong, and K.C. Gupta, , Fast Software Encryption, Lecture Notes in Computer Science (LNCS), vol. M. Robshaw (Ed.), issue 4047, pp. 375-389, 01-2006.
Nawaz, Y., K. Gupta, and G. Gong, , CACR 2006-34, University of Waterloo, Canada, 10-2006.
Gong, G., , CACR 2006-05, University of Waterloo, Canada, 01-2006.
Fan, X., T. Wollinger, and G. Gong, , CACR 2006-38, University of Waterloo, Canada, 12-2006.
Yul, N.Y., and G. Gong, , CACR2006-28, University of Waterloo, Canada, 05-2006.

## 2005

Jiang, S., and G. Gong, , RSA Conference 2006, Cryptographers' Track, D. Pointvheval (Ed.), vol. 3860: Lecture Notes in Computer Science, Springer-verlag, pp. 350-364, 02-2005.
Nawaz, Y., and G. Gong, , Proceedings of Canadian Workshop on Information Theory (CWIT'05), Montreal, Canada, pp. 371-374, 06-2005.
Khoo, K., G. Gong, G-E. Tan, and H. -KiatLee, , Proceedings of International Symposium on Information Theory (ISIT 2005): Adelaide, Australia, 09-2005.
Yu, N. Y., and G. Gong, , Proceedings of Canadian Workshop on Information Theory (CWIT'05), Montreal, Canada, June 5-8, 2005, pp. 391-394, 2005.
Hoeper, K., and G. Gong, , Proceedings of Canadian Workshop on Information Theory (CWIT '05), Montreal, Canada, 06-2005.
Xiao, L., S. Tavares, A. Youssef, and G. Gong, , Proceedings of 18th Annual Canadian Conference onElectrical and Computer Engineering (CCECE'05), Saskatoon, Canada, 05-2005.
Hoeper, K., and G. Gong, , Proceedings of first International Conference on Security and Privacy for Emerging Areas in Communication Networks, Athens, Greece, 10-2005.
Gong, G., and K. Chand Gupta, , SKLOIS Conference on Information Security and Cryptology (CICS05), Beijing, China, Springer-verlag, 2005.
Chiu, F., N. Y. Yu, and G. Gong, , Proceedings of International Symposium on Information Theory (ISIT 2005), Adelaide, Australia, 09-2005.
Giuliani, K., and G. Gong, , Sequences and Their Applications, Tor Helleseth et al. (Eds.), Springer-verlag, vol. 3486: Lecture Notes in Computer Science, pp. 298-312, 2005.
Yu, N. Y., and G. Gong, , Proceedings of Workshop on Coding and Cryptography (WCC2005), Bergen, Norway, Technical Report, CORR 2005-08, Springer-verlag, 2005.
Nawaz, Y., and G. Gong, , Proceedings of the Symmetric Key Encryption Workshop, Denmark, 05-2005.
Dai, ZD., S. Jiang, K. Imamura, and G. Gong, , IEEE Trans. on Inform. Theory, vol. 50, issue No. 11, pp. 2911-2915, 11-2005.
Hoeper, K., and G. Gong, , Wireless and Mobile Network Security, vol. Y.Xiao et al. (Eds.), 2005.
Gong, G., , Technical Report, CACR 2006-5, University of Waterloo, 2005.
Hoeper, K., and G. Gong, , Technical Report: CARR 2005, 2005.
Yu, N., and G. Gong, Realizations of Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation, University of Waterloo, Technical Report, CACR2005-14, 2005.

## 2004

Lam, C.Y., and G. Gong, , Proceedings of conference on State of the Art of Stream Ciphers, Brugge, Belgium, pp. 220-233, 10-2004.
, Sixth International Joint Meeting of the American Mathematics Society (AMS) and the Sociedad Matemtica Mexicana (SMM), Houston, Texas, Coding and Cryptography Session, 2004.  (1.45 MB)
Giuliani, K., and G. Gong, , IEEE International Symposium on Information Theory, Chicago, IL, 07-2004.
Jiang, S., and G. Gong, , Australian Conference on Information Security and Privacy, LNCS 3108, vol. H.Wang. et al (Eds.): Springer-verlag, pp. 1-12, 2004.
Giulianiand, K., and G. Gong, , the third international conference on sequences and their applications (SETA'04), Full paper at Lectures Notes in Computer Science, Springer, Seoul, South Korea, 10-2004.
Gong, G., and S.Q. Jiang, , International Journal of Wireless and Mobile Computing, Inderscience Publishers, 2004.
Jiang, S., and G. Gong, , Selected Area in Cryptography, vol. 3357, issue H.Handschuh et al. (Eds.), pp. pre-proceeding, pp. 291-306, 10-2004.
Jiang, S., and G. Gong, , Selected Area in Cryptography, Waterloo, Canada, issue H.Handschuh et al. (Eds.), pp. pre-proceeding, pp. 291-306, 09-2004.
Gong, G., , Kluwer Academic Publishing, issue K.F. Chen (Ed.), pp. 1-8, 2004.
Kim, Y., H. Song, and G. Gong, Cross correlation of q-ary Power Residue Sequences of Period p is Upper Bounded by $sqrt(p)+2$: Technical Report, University of Waterloo, CACR 2004-07, 2004.
Hoeper, K., and G. Gong, Models of Authentication in Ad Hoc Networks and Their RelatedNetwork Properties: Technical Report, University of Waterloo, CACR 2004-03, 2004.
Gong, G., On Existence and Invariant of Algebraic Attacks: Technical Report, University of Waterloo, CACR 2004-17, 2004.

## 2003

Gong, G., , Mathematical Properties of Sequences and Other Combinatorial Structures, J.-S. No, H.-Y. Song, T. Helleseth, and V.Kumar (Ed), NewYork, Kluwer Academic Publishers, pp. 33-43, 2003.
Khoo, K. M., and G. Gong, , Information Security and Privacy, Lectures Notes in Computer Science, R. Safavi-Naini and J.Seberry (Ed), vol. 2727: Springer-Verlag, pp. 498-509, 2003.
Jiang, S., and G. Gong, , Mathematical Properties of Sequences and Other Combinatorial Structures, J.-S. No, H.-Y. Song, T. Helleseth, and V.Kumar (Ed), New York, Kluwer Academic Publishers, pp. 85-92, 2003.
Kim, J. H., H. Y. Song, and G. Gong, , Mathematical Properties of Sequences andOther Related Structures, J. S. No,H. Y. Song, T. Helleseth, and V. Kumar (Ed), NewYork, Kluwer Academic Publishers, pp. 23-32, 2003.
Gong, G., and K.M. Khoo, , the Proceedings of TenthAnnual Workshop on Selected Areas in Cryptography, M. Matrui and R. Zuccherato (Ed.), vol. Berlin, Springer-Verlag, vol. 3006., Ottawa, Canada, Lectures Notes in Computer Science (LNCS), 2003.
Khooand, K. M., and G. Gong, , Proceedings of 2003 IEEE International Symposium on Information Theory (ISIT2003), Yokohama, Japan, pp. 254, 07-2003.
Gong, G., and S.Q. Jiang, , the Annual International Workshop on Cryptology and Network Security, the proceedings integrated in the Proceedings of the Ninth International Conference on Distributed Multimedia Systems, Miami, Florida, USA, pp. 673-678, 09-2003.
Dai, Z. D., G. Gong, and H.Y. Song, , Proceedings of International Workshop on Coding and Cryptography (WCC2003), Versailles, France, pp. 121-133, 03-2003.
Dai, Z. D., G. Gong, and H.Y. Song, , Proceedings of 2003 IEEE International Symposium on Information Theory (ISIT2003), Yokohama, Japan, pp. 378, 2003.
Dai, Z. D., G. Gong, and H. Y. Song, , Proceedings of 2003 IEEE International Symposium on Information Theory (ISIT2003), Yokohama, Japan, pp. 379, 07-2003.
Gong, G., and H.Y. Song, , Proceedings of 2003 IEEE International Symposium onInformation Theory (ISIT2003), Yokohama, Japan, pp. 404, 07-2003.
Gong, G., and A. Youssef, , IEEE Trans.on Inform., vol. 48, issue No. 11, pp. 2847-2867, 11-2002, 2003.
Giuliani, K., and G. Gong, , CACR 2003-34, 2003.
Jiang, S., and G. Gong, , CACR 2003-35 , 2003.
Jiang, S., and G. Gong, , CACR 2002-28, New York, Kluwer Academic Publishers, pp. 85-92, 2003.

## 2002

Khoo, K., G. Gong, and D. R. Stinson, , IEEE International Symposium on Information Theory, Lausanne, Switzerland, 07-2002.
Gong, G., , Golomb Symposium, University of Southern California, Los Angeles, 07-2002.
Gong, G., ZD. Dai, and S. W. Golomb, , 2002 IEEE International Symposium on Information Theory, Lausanne, Switzerland, 07-2002.
Gong, G., , IEEE Trans. on Inform. Theory, vol. 48, issue No. 11, pp. 2847-2867, 11-2002.
Helleseth, T., and G. Gong, , IEEE Trans.on Inform. , vol. 48, issue No. 11, pp. 2868-2872, 11-2002.
Gong, G., and S.W. Golomb, , IEEE Trans. on Inform. Theory, vol. 48, issue No. 4, pp. 853-865, 04-2002.
Gong, G., A. Hasan, H. Wu, and A. Youssef, , CACR 2002-27, 2002.
Jiang, S., and G. Gong, , CACR 2002-29, 2002.
Lam, C.Y., and G. Gong, , CACR 2002-18, 2002.
Jiang, S., and G. Gong, , CACR 2002-30, 2002.
Kim, J-H., H-Y. Song, and G. Gong, , CACR 2002-23, 2002.
Gong, G., and H-Y. Song, , CACR 2002-20, 2002.

## 2001

Youssef, A.M., and G. Gong, , the Proceedings of the Eighth Annual Workshop on Selected Areas in Cryptography, Toronto, CACR 2001-57 , 10-2001.
Youssef, A.M., and G. Gong, , Information Security and Privacy, Lectures Notes in Computer Science, Vijay Varadharajan and Yi Mu (Ed.), vol. 2119, Berlin, Germany, Springer-Verlag, pp. 15-20, 2001.
Giuliani, K. J., and G. Gong, , Conference on Cryptography and Coding, Cirencester, UK, 12-2001.
Youssef, A.M., and G. Gong, , Advances in Cryptology- Eurocrypto'2001, CACR 2001-58, vol. Lecture Notes in Computer Science 2045: Springer, pp. 406-419, 2001.
Golomb, S.W., and G. Gong, , Sequences and their Applications, Proceedings of SETA'01, CACR 2001-33, vol. Discrete Mathematics and Theoretical Computer Science: Springer, pp. 154-165, 2001.
Dai, Z.D., J.H. Yang, G. Gong, and P. Wang, , Sequences and their Applications, Proceedings of SETA'01, Discrete Mathematics and Theoretical Computer Science, CACR 2001-34: Springer, 2001.
Ludkovski, M., and G. Gong, , Proceedings of the second International Workshop in Coding and Cryptography, Paris, France, pp. 345-354, 01-2001.
Gong, G., and C. C. Y. Lam, , Sequences and their Applications, Proceedings of SETA'01, CACR 2001-35, vol. Discrete Mathematics and Theoretical Computer Science: Springer, pp. 182-196, 2001.
Gong, G., L. Harn, and H.P. Wu, , the Proceedings of the Eighth Annual Workshop on Selected Areas in Cryptography, CACR 2001-35, Toronto, 09-2001.
Cusick, T.W., and G. Gong, , IEEE Trans. on Inform. Theory, vol. 47, issue No. 1, pp. 426-427, 01-2001.
Dai, Z.D., G. Gong, and D.F. Ye, , Sciences in China (Series A), vol. 44, issue No. 6, pp. 709-71, 06-2001.
Dai, Z.D., J.H. Yang, D.F. Ye, and G..Gong, , Electronics Letters, vol. 37, issue No. 4, pp. 220, 03-2001.

## 2000

Gong, G., and S.W. Golomb, , Proceedings of 2000 IEEE International Sumposium on Information Theory, Sorrento, Italy, pp. 300, 06-2000.
Gong, G., and A. Youssef, , the Proceedings of the Sevenh Annual Workshop on Selected Areas in Cryptography, Waterloo, Canada, 10-2000.
Harn, L., H.-Y. Lin, and G. Gong, , Electronics Letters, vol. 36, issue No. 3, pp. 214-215, 2000.
Gong, G., Z.T. Dai, and S.W. Golomb, , IEEE Trans. on Inform. Theory, vol. 46, issue No. 2, pp. 474-484, 03-2000.
Golomb, S. W., G. Gong, and Z.D. Dai, , Discrete Mathathematics, vol. 219, issue Technical Report, University of Waterloo, CACR 98-37, pp. 279-285, 2000.
Jiang, S., Z. T. Dai, and G. Gong, , Chinese Sci. Bull, vol. 45, issue No. 6, pp. 502-507, 2000.
Chang, A., P. Gaal, S. W. Golomb, G. Gong, T. Helleseth, and V. P. Kumar, , IEEE Trans. on Inform. Theory, vol. 46, issue No. 2, pp. 680-686, 03-2000.
Gong, G., and L. Harn, , IEEE Trans. on Inform. Theory, vol. 45, issue No. 7, pp. 2601-2605, 11-1999, 2000.
Youssef, A. M., and G. Gong, On the quadratic span of binary sequences: Technical Report, University of Waterloo, CACR 2000-20, 03-2000.
Gong, G., and A. M. Youssef, , submitted to IEEE Trans. on Inform. Theory: Technical Report, University of Waterloo, CACR 2000-30, 05-2000.

## 1999

Harn, L., H.Y. Lin, and G. Gong, , the Proceeding of the International Workshop on Cryptographic Techniques & E-Commerce, Hong Kong, pp. 81-86, 07-1999.
Golomb, S. W., G. Gong, and L. Mittenthal, , Proceedings of the Fifth International Conference on Finite Fields and Applications, Augsburg, Germany, 09-1999.
Harn, L., and G. Gong, , the Proceedings of the International Workshop on Cryptographic Techniques & E-Commerce, pp. 126-131, 07-1999.
Gong, G., T. Berson, and D. Stinson, , the Proceedings of the Sixth Annual Workshop on Selected Areas in Cryptography, Kingston, Canada, 09-1999.
Gong, G., and S.W. Golomb, , IEEE Trans. on Inform. Theory, vol. 45, issue No. 2, pp. 692-693, 03-1999.
Dai, Z.T., S.W. Golomb, and G. Gong, , Discrete Mathematics, vol. 205, pp. 47-55, 1999.
Gong, G., and S.W. Golomb, , Hadamard Transforms of Three Term Sequences, vol. 45, issue No. 6, pp. 2059-2060, 09-1999.
Golomb, S.W., and G. Gong, , IEEE Trans. on Inform. Theory, vol. 45, issue No. 4, pp. 1276-1279, 05-1999.
Gong, G., and S.W. Golomb, , IEEE Trans. on Inform. Theory, vol. 45, issue No. 6, pp. 2065-2073, 09-1999.  (188.72 KB)
Gong, G., Discrepancy transforms and their applications: , University ofWaterloo, CACR 99-60, 09-1999.

## 1998

Gong, G., and L. Harn, , the Proceedings of China-Crypto'98, Chengdu, China, 05-1998.
Golomb, S.W., and G. Gong, , the Proceedings of 1998 IEEE International Symposium on Information Theory, MIT, Cambridge, MA, 09-1998.
Jiang, S., ZD. Dai, and G. Gong, , International Conference on Sequences and their Applications,, Singapore, 12-1998.
Gaal, P., S.W. Golomb, G. Gong, and P.V. Kumar, , the Proceedings of 1998 IEEE International Symposium on Information Theory, MIT, Cambridge, MA, 09-1998.
Chang, A., S. W. Golomb, G. Gong, and V. P. Kumar, , the Proceedings of International Conference on Sequences and their Applications, Singapore, 12-1998.
No, J.S., S.W. Golomb, G. Gong, H.K. Lee, and P..Gaal, , IEEE Trans. on Inform. Theory, vol. 44, issue No. 2, pp. 814-817, 03-1998.
Harn, L., G. Gong, and H.Y. Lin, A public-key cryptosystem based on LFSR state-space, 09-1999, 1998.

## 1997

Gong, G., P. Gaal, and S.W. Golomb, , the Proceedings of 1997 IEEE Information Workshop, Longyearbyen, Svalbard, Norway, 07-1997.
Gong, G., , IEEE Trans.on Inform., vol. 43, issue No. 3, pp. 1007-1012, 05-1997.
Harn, L., and G. Gong, , IEE, Proc. Comput. Digital Tech. , vol. 144, issue No. 5, 09-1997.
Gong, G., and Z.D. Dai, On constructions of SAC permutation polynomials, Systems Science and Mathematical Sciences, vol. 10, issue No. 2, pp. 120-128, 1997.
Gong, G., and S.W. Golomb, , Technical Report, Teledyne Electronic Technologies, 05-1997.

## 1996

Gong, G., and L. Harn, , the Proceedings of 1996 International Conference on Cryptology and InformationSecurity, pp. 19-21, 12-1996.
Gong, G., , IEEE Trans. on Inform. Theory, vol. 42, issue No. 1, pp. 263-267, 01-1996.

## 1995

Gong, G., , IEEE Trans. on Inform. Theory, vol. 41, issue No. 2, pp. 400-411, 03-1995.

## 1994

Gong, G., , the Proceedings of ChinaCrypt'94, 11-1994.
Chang, X.G., Z.D. Dai, and G. Gong, , Advanced in Cryptology - ASIACYPTO'94: Springer's Lecture Notes in Computer Science, 11-1994.
Chang, X.G., Z.D. Dai, and G. Gong, , Proceedings of ChinaCrypt'94, 11-1994.
Gong, G., and G.Z. Xiao, , IEEE Trans. on Communications, vol. 42, issue No. 8, 09-1994.

## 1993

Gong, G., , the Proceedings of the 10th International Symposium of Applied Algebra, Algebraic Algorithms and Error Correcting Codes: Lecture Notesin Computer Science, 05-1993.
, A. Di Porto, and W. Wolfowicz, , the Proceedings of the 3rd Symposium of State and Progress of Research in Cryptography, Rome, Italy, pp. 90-105, 1993.
Gong, G., A. Di Porto, and W. Wolfowicz, , LA COMUNICAZIONE, Note Recensioni Notizie, vol. XLII, pp. 83-89, 12-1993.

## 1992

Gong, G., A. Di Porto, and W. Wolfowicz, , FUB report: 3T04492, 10-1992.

## 1991

Gong, G., , Science Bulletin of China, vol. China, issue N0. 7, pp. 551-554, 04-1991.
Gong, G., , J. of China Institute of Communications, vol. 12, issue No. 6, pp. 61-64, 11-1991.

## 1990

Gong, G., , Advanced in Cryptology - AUSCRYPT'90, Springer's Lecture Notes in Computer Science453, pp. 32-35, 01-1990.
Gong, G., , the Proceedings of the 2nd Symposium of State and Progress of Research in Secure Communications, 09-1990.

## 1987

, Printed by the Administration Office for Graduate Students, Chengdu, China, University of Electronic Science and Technology of China (UESTC), 1987.

## 1986

Gong, G., , ACTA ELECTRONICS SILICA, vol. 14, issue No. 4, pp. 94-100, 07-1986.

## 1984

Gong, G., , the First National Conference of Cryptography, vol. Xian (in Chinese), 10-1984.