Sort by: Author Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
, A. Di Porto, and W. Wolfowicz, "Performance testing of Galois linear group sequences", the Proceedings of the 3rd Symposium of State and Progress of Research in Cryptography, Rome, Italy, pp. 90-105, 1993.

A

Aagaard, M. D., G. Gong, and R. K. Mota, "Hardware Implementations of the WG-5 Cipher for Passive RFID Tags", IEEE International Symposium on Hardware-Oriented Security and Trust (HOST'13), Austin, TX, USA, pp. 29-34, June/2013.
Altawy, R., R. Rohit, M. He, K. Mandal, G. Yang, and G. Gong, "sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives", in Selected Areas in Cryptography, 2017.
AlTawy, R., and G. Gong, "Mesh: A Supply Chain Solution with Locally Private Blockchain Transactions", Proceedings on Privacy Enhancing Technologies, vol. 3, pp. 149–169, 2019.
Altawy, R., R. Rohit, M. He, K. Mandal, G. Yang, and G. Gong, "sLiSCP-light: Towards Lighter Sponge-specific Cryptographic Permutations", Poster presentation at Cryptographic Hardware and Embedded Systems (CHES 2018), Amsterdam, Netherlands, September 2018.
Altawy, R., M. ElSheikh, A. Youssef, and G. Gong, "Lelantos: A Blockchain-based Anonymous Physical Delivery System", the 15th International Conference on Privacy, Security and Trust (PST'17), Calgary, Canada, August/2017. PDF icon Lelantos: A Blockchain-based Anonymous PhysicalDelivery System (PDF) (1.27 MB)
Altawy, R., R. Rohit, M. He, K. Mandal, G. Yang, and G. Gong, "sLiSCP-light: Towards Lighter Sponge-specific Cryptographic Permutations", ACM Transactions on Embedded Computing Systems, vol. 17, issue 4, pp. 1-26, 2018.
Altawy, R., R. Rohit, M. He, K. Mandal, G. Yang, and G. Gong, "Towards a Cryptographic Minimal Design: The sLiSCP Family of Permutations", IEEE Transactions on Computers, vol. 67, issue 9, pp. 1341-1358, 2018.
Altawy, R., R. Rohit, M. He, K. Mandal, G. Yang, and G. Gong, "Towards a Cryptographic Minimal Design: The sLiSCP Family of Permutations", To appear at IEEE Transactions on Computers. CACR Technical Report cacr2017-04, University of Waterloo , 2017. PDF icon sLiSCP: Simeck-based Permutations for Lightweight SpongeCryptographic Primitives (PDF) (1.41 MB)

C

Carlet, C., G. Gong, and Y. Tan, "Quadratic zero-difference balanced functions, APN functions and strongly regular graphs", Designs, Codes and Cryptography}, vol. 78, issue 3, pp. 629-654, March/2016.
Carlet, C., G. Gong, and Y. Tan, "Quadratic zero-difference balanced functions, APN functions and strongly regular graphs", Designs, Codes and Cryptography, pp. 1-26, 2014.
Chai, Q., and G. Gong, "BUPLE: securing passive RFID communication through physical layer enhancements", RFID Security and Privacy, Lecture Notes in Computer Science, Ari Juels and Christof Paar (Eds.), vol. 7055, Springer, Heidelberg, pp. 127-146, 2012.
Chai, Q., G. Gong, and D. Engels, "How to develop clairaudience -- active eavesdropping in passive RFID systems (invited)", The Proceedings of 2012 IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM), San Francisco, CA, USA, pp. 1-6, June/2012.
Chai, Q., and G. Gong, "Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers", The Proceedings of IEEE ICC 2012 - Communication and Information Systems Security Symposium, Communication and Information Systems Security Symposium, Ottawa, Canada, pp. 917-922, June/2012.
Chai, Q., and G. Gong, "BUPLE: Securing Passive RFID Communication through Physical Layer Enhancements", 7th Annual Workshop on RFID Security and Privacy (RFIDsec'11), Amherst, MA, USA, June/2011.
Chai, Q., and G. Gong, "Differential Cryptanalysis of Two Joint Encryption and Error Correction Schemes", IEEE Global Communications Conference (GLOBECOM'11), Houston, TX, USA, December/2011.
Chai, Q., and G. Gong, "A lightweight protocol to robust TID-based anti-counterfeiting", Poster Presentation at IEEE RFID 2010, Orlando, Florida, USA, pp. April 14-15, 2010.
Chai, Q., and G. Gong, "A Lightweight Protocol to Robust TID-Based Anti-Counterfeiting (Full Paper)", Technical Report CACR 2010-09, 2010.
Chai, Q., and G. Gong, "A cryptanalysis of hummingbird-2: the differential sequence analysis", International Journal of Applied Cryptography, 2012.
Chai, Q., X. Fan, and G. Gong, "An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2", Cryptology ePrint Archive, Report 2011/247, 2011.
Chai, Q., and G. Gong, "Verifiable Symmetric Searchable Encryption For Semi-honest-but-curious Cloud Servers", , Technical Report CACR 2011-22, 2011.
Chang, A., S. W. Golomb, G. Gong, and V. P. Kumar, "On the linear span of ideal autocorrelation sequences arising from the Segre hyperoval", the Proceedings of International Conference on Sequences and their Applications, Singapore, 12-1998.
Chang, X.G., Z.D. Dai, and G. Gong, "Some cryptographic properties of exponential functions", Advanced in Cryptology - ASIACYPTO'94: Springer's Lecture Notes in Computer Science, 11-1994.
Chang, X.G., Z.D. Dai, and G. Gong, "Some cryptographic properties of exponential functions", Proceedings of ChinaCrypt'94, 11-1994.
Chang, Z., G. Gong, and Q. Wang, Cycle Structures of a Class of Cascaded FSRs, 2020.
Chang, A., P. Gaal, S. W. Golomb, G. Gong, T. Helleseth, and V. P. Kumar, "On a conjectured ideal auto correaltion sequences and a realted triple error correcting cyclic code", IEEE Trans. on Inform. Theory, vol. 46, issue No. 2, pp. 680-686, 03-2000.
Charpin, P., and G. Gong, "Hyperbent functions, Kloosterman sums and Dickson polynomials", IEEE Trans. on Inform, vol. 54, issue No. 9, pp. 4230-4238, September/2008.
Chen, Y., Y. Tan, and G. Gong, "New Bounds and Constructions of Weak Systematic Algebraic Modification Detection Codes", Sequences and Their Applications (SETA) 2016, Chengdu, China, October/2016.
Chen, Y., and G. Gong, "Integer Arithmetic over Ciphertext and Homomorphic Data Aggregation", Proceedings of 2015 IEEE CNS Workshop on Security and Privacy in the Cloud (SPC), Florence, Italy, pp. 592-596, September/2015.
Chen, Y., B. Case, S.H. Gao, and G. Gong, "Error Analysis of Weak Poly-LWE Instances", Journal of Cryptography and Communication Special Issue on Mathematical Methods for Cryptography, pp. 1-16, May/2018.
Chen, Y., B. Case, S. Gao, and G. Gong, "Error Analysis of Weak Poly-LWE Instances", In submission Journal of Cryptography and Communications Special Issue on Mathematical Methods for Cryptography, vol. CACR Technical Report cacr2-17-8, University of Waterloo, November/2017. PDF icon cacr2017-08.pdf (288.05 KB)
Chiu, F., N. Y. Yu, and G. Gong, "Maximum correlationof binary signals over fading channels", Proceedings of International Symposium on Information Theory (ISIT 2005), Adelaide, Australia, 09-2005. PDF icon Maximum correlationof binary signals over fading channels (PDF) (143.08 KB)
Chung, J.-H., G. Gong, and K. Yang, "New Families of Optimal Frequency-Hopping Sequences of Composite Lengths", IEEE Transactions on Information Theory, vol. 60, issue No. 6, pp. 3688-3697, June/2014.
Cusick, T.W., and G. Gong, "A conjecture onbinary sequences with the "trinomial property"", IEEE Trans. on Inform. Theory, vol. 47, issue No. 1, pp. 426-427, 01-2001.

D

Dai, Z. D., G. Gong, and H.Y. Song, "Trace representation and linear complexity of binary e-th residue sequences", Proceedings of International Workshop on Coding and Cryptography (WCC2003), Versailles, France, pp. 121-133, 03-2003. PDF icon Trace representation and linear complexity of binary e-th residue sequences (PDF) (290 KB)
Dai, Z. D., G. Gong, and H.Y. Song, "Trace Representation of Binary e-th ResidueSequence of Period p", Proceedings of 2003 IEEE International Symposium on Information Theory (ISIT2003), Yokohama, Japan, pp. 378, 2003.
Dai, Z. D., G. Gong, and H. Y. Song, "Trace Representation of Binary Jacobi Sequences", Proceedings of 2003 IEEE International Symposium on Information Theory (ISIT2003), Yokohama, Japan, pp. 379, 07-2003.
Dai, Z.D., J.H. Yang, G. Gong, and P. Wang, "Linear complexities of generalized Legendre sequences", Sequences and their Applications, Proceedings of SETA'01, Discrete Mathematics and Theoretical Computer Science, CACR 2001-34: Springer, 2001.
Dai, Z. D., G. Gong, H.Y. Song, and D.F. Ye, "Trace representation and linear complexity of binary e-th power residue sequences of period p", IEEE Trans. on Inform Theory, accepted., 2011.
Dai, Z. D., G. Gong, and H.Y. Song, A trace representation of binary Jacobi sequences, Discrete Mathematics, vol. 309, pp. 1517-1527, 2009.
Dai, ZD., S. Jiang, K. Imamura, and G. Gong, "Asymptotic Behavior of Normalized Linear Complexity of Ultimately Non-periodic sequences", IEEE Trans. on Inform. Theory, vol. 50, issue No. 11, pp. 2911-2915, 11-2005.
Dai, Z.D., G. Gong, and D.F. Ye, "Cascaded GMW functions and its classification", Sciences in China (Series A), vol. 44, issue No. 6, pp. 709-71, 06-2001.
Dai, Z.D., J.H. Yang, D.F. Ye, and G.Gong, "Cryptanalysis of the original and the revised Xinmei digital signature scheme", Electronics Letters, vol. 37, issue No. 4, pp. 220, 03-2001.
Dai, Z.T., S.W. Golomb, and G. Gong, "Generating all linear or thomorphism without repetitions", Discrete Mathematics, vol. 205, pp. 47-55, 1999.

E

El-Razouk, H., A. Reyhani-Masoleh, and G. Gong, "New Hardware Implementations of WG(29,11) and WG-16 Stream Ciphers Using Polynomial Basis", IEEE Trans. Comput., vol. 64, issue no. 7, pp. 2020-2035, August/2015.
El-Razouk, H., A. Reyhani-Masoleh, and G. Gong, "New implementations of the WG stream cipher", IEEE Transactions on VLSI, vol. 22, issue No. 9, September/2014.
El-Razouk, H., A. Reyhani-Masoleh, and G. Gong, "New Implementations of the WG Stream Cipher", IEEE Transactions on Very Large Scale Integration (VLSI) Systems, September/2013.
El-Razouk, H., A. Reyhani-Masoleh, and G. Gong, "New Hardware Implementations of WG(29.11) and WG-13 Stream Ciphers Using Polynomial Basis", Technical Report, CACR 2014-02, University of Waterloo, 2014.
Engels, D., X.X. Fan, G. Gong, H.G. Hu, and E. M. Smith, "Hummingbird: ultra-lightweight cryptography for resource-constrained devices", The 14th International Conference on Financial Cryptography and Data Security - FC 2010, LNCS 6054, R. Curtmola et al. (Eds.), Tenerife, Canary Islands, Spain, pp. 3-18, 2010. PDF icon Hummingbird: ultra-lightweight cryptography for resource-constrained devices (170.96 KB)
Engels, D., X.X. Fan, G. Gong, H.G. Hu, and E. Smith, Ultra-lightweight cryptography for low-cost RFID tags: Hummingbird algorithm and protocol,, University of Waterloo, Canada, Technical Report, CACR 2009-29, 2009. PDF icon Ultra-lightweight cryptography for low-cost RFID tags: Hummingbird algorithm and protocol (PDF) (285.65 KB)

F

Fan, X., T. Wu, and G. Gong, "An Efficient Stream Cipher WG-16 and Its Application for Securing 4G-LTE Networks", The 3rd International Conference on Communication and Network Security (ICCNS'13), London, UK, pp. 16-17, November/2013.
Fan, X., N. Zidaric, M. Aagaard, and G. Gong, "Efficient Hardware Implementation of the Stream Cipher WG-16 with Composite Field Arithmetic", The 3rd International Workshop on Trustworthy Embedded Devices (TrustED'13), Berlin, Germany, ACM Press, pp. 21-34, November/2014, 2013.
Fan, X., and G. Gong, "Securing NFC with Elliptic Curve Cryptography -- Challenges and Solutions (Short Paper)", TCryptology and Information Security Series - The 2013 Workshop on RFID and IoT Security (RFIDSec'13 Asia), C. Ma and J. Weng (Eds.), vol. 11, Amsterdam, Netherlands, IOS Press, pp. 97-106, November/2013.
Fan, X., and G. Gong, "Securing ZigBee Smart Energy Profile 1.x with OpenECC Library", The First ACM Workshop on Smart Energy Grid Security (SEGS'13), Berlin, Germany, ACM Press, pp. 17-22, November/2013.
Fan, X., K. Mandal, and G. Gong, "WG-8: a lightweight stream cipher for resource-constrained smart devices", Quality, Reliability, Security and Robustness in Heterogeneous Networking (Qshine 2013), , ser. LNICST 115, K. Singh, A.K. Awasthi, and R. Mishra (Eds.), Berlin, Germany: Springer-Verlag, pp. 617-632, 2013.
Fan, X., and G. Gong, "LPKM: A lightweight polynomial-based key management protocol for distributed wireless sensor networks", the Proceedings of The 4th International Conference on Ad Hoc Networks, October/2012.
Fan, X., and G. Gong, "On the security of Hummingbird-2 against side channel cube attacks", The 4th Western European Workshop on Research in Cryptology (WEWoRC 2011), Lecture Notes in Computer Science, F. Armknecht and S. Lucks (Eds.), Springer Verlag, pp. 18-29, 2012.
Fan, X., G. Gong, D. Engels, and E. Smith, "A Lightweight Privacy-Preserving Mutual Authentication Protocol for RFID Systems", Joint Workshop of SCPA 2011 and SaCoNAS 2011, Houston, TX, USA, December/2011.
Fan, X., and G. Gong, "On the Security of Hummingbird-2 against Side Channel Cube Attacks", Western European Workshop on Research in Cryptology (WEWoRC 2011), Bauhaus-University Weimar, Germany, July/2011.
Fan, X., G. Gong, and H. Hu, "Remedying the Hummingbird Cryptographic Algorithm", The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (SPIoT 2011), Changsha, Hunan, China, November/2011.
Fan, X., G. Gong, and H. Hu, "Remedying the Hummingbird Cryptographic Algorithm", The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (SPIoT 2011), Changsha, Hunan, China, November/2011.
Fan, X.X., and G. Gong, "Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks", Proceedings of the Second International Conference on Ad Hoc Networks (AdHocNets 2010), . Zheng, D. Simplot-Ryl, and V.C.M. Leung (Eds.), Berlin, Germany: Springer-Verlag, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 328-343, 2010.
Fan, X.X., G. Gong, K. Lauffenburger, and T. Hicks, "FPGA Implementations of the Hummingbird Cryptographic Algorithm", Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), California, USA, June/2010. PDF icon FPGA Implementations of the Hummingbird Cryptographic Algorithm (PDF) (165.56 KB)PDF icon Poster (PDF) (351.25 KB)
Fan, X.X., H.G. Hu, G. Gong, E. Smith, and D. Engels, "Lightweight Implementation of Hummingbird Cryptographic Algorithm on 4-Bit Microcontroller, to appear in the Proceedings of The 1st International Workshop on RFID Security and Cryptography 2009 (RISC'09)", Lightweight Implementation of Hummingbird Cryptographic Algorithm on 4-Bit Microcontroller, to appear in the Proceedings of The 1st International Workshop on RFID Security and Cryptography 2009 (RISC'09), London, UK, October/2009.
Fan, X.X., G. Gong, and D. Jao, "Efficient pairing computation on genus 2 curves in projective coordinates", Pre-proceedings of the 15th Annual Workshop on Selected Areas in Cryptography (SAC 2008), vol. Technical Report, University of Waterloo, CACR 2008-03, Mount Allison University, Sackville, New Brunswick, Canada, Technical Report, University of Waterloo, CACR 2008-03, pp. 17-33, 01-2008. PDF icon Efficient pairing computation on genus 2 curves in projective coordinates (PDF) (297.28 KB)
Fan, X.X., and G. Gong, "Key revocation based on Dirichlet multinomial model for mobile ad hoc networks", Proceedings of the Fourth IEEE LCN Workshop on Network Security (WNS 2008), Montreal, Technical Report, University of Waterloo, CACR 2008-05, October 2008. PDF icon Key revocation based on Dirichlet multinomial model for mobile ad hoc networks (PDF) (349.83 KB)
Fan, X.X., G. Gong, and D. Jao, "Speeding up pairing computations on genus 2 hyperelliptic curves with efficiently computable automorphisms", Pairing-based Cryptography, Lecture Notes of Computer Sciences, S.D. Galbraith, and K.G. Paterson (Eds.), vol. 5209, Berlin, Germany, Springer-Verlag, pp. 243-264, 2008. PDF icon Speeding up pairing computations on genus 2 hyperelliptic curves with efficiently computable automorphisms (PDF) (298.53 KB)
Fan, X., and G. Gong, "Efficient explicit formulae for genus 2 hyperelliptic curves over prime fields and their implementations", the Proceedings of Selected Areas in Cryptography, Lecture Notes in Computer Science, Adams et al. (Eds), vol. 4876, Ottawa, Canada, Springer-Verlag, pp. 155-172, 09-2007.
Fan, X., G. Gong, B. Schoenmakers, and F. Sica, "Secure Simultaneous Bit Extraction from Koblitz Curves", Journal Designs, Codes and Cryptography, vol. 87, issue 1, pp. 1-13, April/2018, 2019.
Fan, X., and G. Gong, "Security Challenges in Smart-Grid Metering and Control Systems", Technology Innovation Management (TIM) Review, pp. 42-49, July/2013.
Fan, X., and G. Gong, "Accelerating signature-based broadcast authentication for wireless sensor networks", Journal of Ad Hoc Networks, vol. 10, issue No. 4, pp. 723-736, June/2012.
Fan, X.X., T. Wollinger, and G. Gong, "Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems over binary fields", IET Information Security, vol. 1, issue 2, pp. 65-81, 06-2007.
Fan, X., T. Wollinger, and G. Gong, "Efficient explicit formulae for genus 3 hyper elliptic curve cryptosystems", CACR 2006-38, University of Waterloo, Canada, 12-2006.
Feng, J.L., and G. Gong, "WiFi-based Location Services Attack on Dual-band Hardware", IEEE International Symposium on EMC 2014, Raleigh, USA, pp. 155-158, August/2014.
Feng, J., and G. Gong, "WiFi-based Location Services Attack on Dual-band Hardware", IEEE International Symposium on Electromagnetic Compatibility, Raleigh, NC, USA, August/2014.
Fuhr, T., G. Leurent, and V. Suder, "Collision Attacks against CAESAR Candidates, Forgery and Key-Recovery against AEZ and Marble", inASIACRYPT’15, Part II, LNCS 9453, 2015.

G

Gaal, P., S.W. Golomb, G. Gong, and P.V. Kumar, "On a sequence conjectured to have ideal 2-level autocorrelation function", the Proceedings of 1998 IEEE International Symposium on Information Theory, MIT, Cambridge, MA, 09-1998.
Giuliani, K., and G. Gong, "New LFSR-based cryptosystems and the trace discrete logarithm problem (Trace-DLP)", Sequences and Their Applications, Tor Helleseth et al. (Eds.), Springer-verlag, vol. 3486: Lecture Notes in Computer Science, pp. 298-312, 2005. PDF icon New LFSR-based cryptosystems and the trace discrete logarithm problem (Trace-DLP) (PDF) (268.96 KB)
Giuliani, K. J., and G. Gong, "Generating large instances of the Gong-Harn cryptosystems", Conference on Cryptography and Coding, Cirencester, UK, 12-2001. PDF icon Generating large instances of the Gong-Harn cryptosystems (PDF) (193.16 KB)
Giuliani, K., and G. Gong, "A new algorithm to compute remote terms in special types of characteristic sequences", Sequences and Their Applications, LNCS, vol. G. Gong et al.(Eds.), issue 4047, pp. 242-252, 2006. PDF icon A new algorithm to compute remote terms in special types of characteristic sequences (PDF) (180.9 KB)
Giulianiand, K., and G. Gong, "New LFSR-based cryptosystems and the trace discrete logarithm problem", the third international conference on sequences and their applications (SETA'04), Full paper at Lectures Notes in Computer Science, Springer, Seoul, South Korea, 10-2004.
Golomb, S.W., and G. Gong, "Actions of the unitary group on irreducible/primitive polynomials and their applications to randomness of sequences", the Proceedings of 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, Bergen, Norway, 07-2007.
Golomb, S.W., and G. Gong, "Hyper-Cyclotomic Algebra", Sequences and their Applications, Proceedings of SETA'01, CACR 2001-33, vol. Discrete Mathematics and Theoretical Computer Science: Springer, pp. 154-165, 2001.
Golomb, S. W., G. Gong, and L. Mittenthal, "Constructions of or thomorphisms of $Z_2^n$ numbers", Proceedings of the Fifth International Conference on Finite Fields and Applications, Augsburg, Germany, 09-1999.
Golomb, S.W., and G. Gong, "Investigation of periodic sequences with the "TrinomialProperty"", the Proceedings of 1998 IEEE International Symposium on Information Theory, MIT, Cambridge, MA, 09-1998.
Golomb, S.W., and G. Gong, "The Status of Costas Arrays", IEEE Trans. on Information Theory, vol. 53, issue No. 11, pp. 4260 - 4265, 11-2007.
Golomb, S. W., G. Gong, and Z.D. Dai, "Cyclic inequivalence of cascaded GMW sequences", Discrete Mathathematics, vol. 219, issue Technical Report, University of Waterloo, CACR 98-37, pp. 279-285, 2000.
Golomb, S.W., and G. Gong, "Periodic sequences with the "Trinomial Property"", IEEE Trans. on Inform. Theory, vol. 45, issue No. 4, pp. 1276-1279, 05-1999.
Gong, G., "Array correlation and sequences with equal magnitude correlation", Mathematical Properties of Sequences and Other Combinatorial Structures, J.-S. No, H.-Y. Song, T. Helleseth, and V.Kumar (Ed), NewYork, Kluwer Academic Publishers, pp. 33-43, 2003. PDF icon Array correlation and sequences with equal magnitude correlation (PDF) (194.41 KB)
Gong, G., and S.W. Golomb, "A Simple Construction of Almost Perfect Quinary ASK and QAM Sequences", Sequences and Their Applications - SETA 2014, Lecture Notes in Computer Science, vol. 2014, pp. 109-120, 2014.
Gong, G., and K.C. Gupta, "Stream and Block Ciphers", Handbook of Finite Fields, 2013.
Gong, G., "Character sums and polyphase sequence families with low correlation, DFT and ambiguity", Character Sums and Polynomials, De Gruyter, Germany, pp. 1-43, 2012.
Gong, G., M. He, R. Rohit, and Y. Yi, "U-EPS: An ultra-small and efficient post-quantum signature scheme", The 12th International Symposium on Foundations & Practice of Security, Toulouse, France, Springer, 2019.
Gong, G., "Securing Internet-of-Things", 11th International Symposium on Foundations & Practice of Security, LNSC, vol. 11358 , Montreal, Nov., 2018, Springer, 2019.
Gong, G., "Strong Cryptographic Properties of WG Transformation Filtering on de Bruijn Sequences", invited talk at Coding Theory, Cryptography, and Number Theory, at the AMS Meeting at College of Charleston in Charleston, March/2017.
Gong, G., "Character sums and polyphase sequence families with low correlation, DFT and ambiguity", Character Sums and Polynomials, A. Winterhof et al. (Eds.), De Gruyter, Germany, pp. 1-43, 2013.
Gong, G., F. Huo, and Y. Yang, "Large Zero Correlation Zone of Golay Pairs and QAM Golay Pairs", 2013 IEEE International Symposium on Information Theory Proceedings (ISIT'13), Istanbul, Turkey, pp. 3135-3139, July/2013.
Gong, G., F. Huo, and Y. Yang, "Large zero autocorrelation zone of Golay sequences", The Proceedings of 2012 IEEE International Symposium on Information Theory (ISIT), Cambridge, MA, USA, pp. 1019-1023, 2012.
Gong, G., "Sequences, DFT and Resistance against Fast Algebraic Attacks", Sequences and Their Applications (SETA), Lecture Notes in Computer Sciences, S.W. Golomb, et al. (Eds.), vol. 5203, Springer, pp. 197-218, 2008. PDF icon Sequences, DFT and Resistance against Fast Algebraic Attacks (PDF) (621.36 KB)
Gong, G., "Constructions of multiple shift-distinct signal sets with low correlation", Proceedings of International Symposium on Information Theory (ISIT 2007), Nice, France, pp. 2306-2310, 06-2007.
Gong, G., "Correlation of multiple bent function signal sets, invited talk", the Proceedings of 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, Bergen, Norway, 07-2007.
Gong, G., "Randomness and representation of span n sequences", Sequences, Subsequences, and Consequences, Lecture Notes in Computer Science, S.W. Golomb et al (Eds.), vol. 4893: Springer-Verlag, pp. 192-203, 2007. PDF icon Randomness and representation of span n sequences (PDF) (195.44 KB)
Gong, G., and K. Chand Gupta, "Martin Hell, and Yassir Nawaz, Towards a General RC4-like Keystream Generator", SKLOIS Conference on Information Security and Cryptology (CICS05), Beijing, China, Springer-verlag, 2005. PDF icon Martin Hell, and Yassir Nawaz, Towards a General RC4-like Keystream Generator (PDF) (183.95 KB)
Gong, G., and K.M. Khoo, "Additive autocorrelation of resilient boolean functions", the Proceedings of TenthAnnual Workshop on Selected Areas in Cryptography, M. Matrui and R. Zuccherato (Ed.), vol. Berlin, Springer-Verlag, vol. 3006., Ottawa, Canada, Lectures Notes in Computer Science (LNCS), 2003. PDF icon Additive autocorrelation of resilient boolean functions (PDF) (249.56 KB)
Gong, G., and S.Q. Jiang, "The editing generators and its cryptanalysis", the Annual International Workshop on Cryptology and Network Security, the proceedings integrated in the Proceedings of the Ninth International Conference on Distributed Multimedia Systems, Miami, Florida, USA, pp. 673-678, 09-2003. PDF icon The editing generators and its cryptanalysis (PDF) (105.87 KB)
Gong, G., and H.Y. Song, "Two-Tuple-Balance of Non-Binary Sequences with Ideal Two-Level Autocorrelation", Proceedings of 2003 IEEE International Symposium onInformation Theory (ISIT2003), Yokohama, Japan, pp. 404, 07-2003.
Gong, G., "Array correlation and sequences with equal magnitude correlation", Golomb Symposium, University of Southern California, Los Angeles, 07-2002.
Gong, G., ZD. Dai, and S. W. Golomb, "On existence of 2-level autocorrelation sequences realized from the decimation-Hadamard transformation", 2002 IEEE International Symposium on Information Theory, Lausanne, Switzerland, 07-2002.
Gong, G., and C. C. Y. Lam, "Recursive sequences over elliptic curves", Sequences and their Applications, Proceedings of SETA'01, CACR 2001-35, vol. Discrete Mathematics and Theoretical Computer Science: Springer, pp. 182-196, 2001.
Gong, G., L. Harn, and H.P. Wu, "The GH public-key cryptosystems", the Proceedings of the Eighth Annual Workshop on Selected Areas in Cryptography, CACR 2001-35, Toronto, 09-2001.
Gong, G., and S.W. Golomb, "Inverse Hadamard transforms of two-level autocorrelation sequences", Proceedings of 2000 IEEE International Sumposium on Information Theory, Sorrento, Italy, pp. 300, 06-2000.
Gong, G., and A. Youssef, "On Welch-Gong Transformation Sequence Generators", the Proceedings of the Sevenh Annual Workshop on Selected Areas in Cryptography, Waterloo, Canada, 10-2000.
Gong, G., T. Berson, and D. Stinson, "Elliptic curve pseudo-random sequence generator", the Proceedings of the Sixth Annual Workshop on Selected Areas in Cryptography, Kingston, Canada, 09-1999.
Gong, G., and L. Harn, "A new approach for public key distribution", the Proceedings of China-Crypto'98, Chengdu, China, 05-1998.
Gong, G., P. Gaal, and S.W. Golomb, "A suspected infinity class of cyclic Hadamard difference sets", the Proceedings of 1997 IEEE Information Workshop, Longyearbyen, Svalbard, Norway, 07-1997.
Gong, G., and L. Harn, "Efficiency Lucas-type public key cryptosystems", the Proceedings of 1996 International Conference on Cryptology and InformationSecurity, pp. 19-21, 12-1996.
Gong, G., "GMW-type permutation polynomial sequences", the Proceedings of ChinaCrypt'94, 11-1994.
Gong, G., "A new class of sequences: mapping sequences", the Proceedings of the 10th International Symposium of Applied Algebra, Algebraic Algorithms and Error Correcting Codes: Lecture Notesin Computer Science, 05-1993.
Gong, G., "Non linear generators of binary sequences with controllable complexity and double key", Advanced in Cryptology - AUSCRYPT'90, Springer's Lecture Notes in Computer Science453, pp. 32-35, 01-1990.
Gong, G., "Quadratic span of feedback shift register sequences", the Proceedings of the 2nd Symposium of State and Progress of Research in Secure Communications, 09-1990.
Gong, G., "An new public-key cryptosystem based on matrix rings", the First National Conference of Cryptography, vol. Xian (in Chinese), 10-1984.
Gong, G., T. Helleseth, V. Kumar, and S. W. Golomb, "Mathematician, Engineer, and Pioneer", IEEE Transactions on Information Theory Special Issue on Shift - Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb, vol. 64, issue 4, pp. 2844-2857, April/2018.
Gong, G., T. Helleseth, and V. Kumar, "Solomon W. Golomb - A Great Mind in our Era", IEEE Transactions on Information Theory Special Issue on Shift-Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb, April/2018, 2017.
Gong, G., S. Goh, and Y. Tan, "Determining All Permutation Polynomials of the Form G(x) + Tr(H(x))", Finite Fields and Their Applications, 2013.
Gong, G., Y. Tan, and B. Zhu, "Enhanced Criteria on Differential Uniformity and Nonlinearity of Cryptographically Signicant Functions", IEEE Trans on Information Theory, 2013.
Gong, G., F. Huo, and Y. Yang, "Large Zero Autocorrelation Zone of Golay Sequences and Their Applications", IEEE Transactions on Communications, vol. 61, issue No. 9, pp. 3967-3979, August/2013.
Gong, G., M. Aagaard, and X. Fan, "Resilience to distinguishing attacks on WG-7 cipher and their generalizations", Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences, vol. 5, issue No. 4, pp. 277-289, December/2013.
Gong, G., T. Helleseth, and H.G. Hu, "A three-valued Walsh transform from decimations of Helleseth-Gong sequences", IEEE Transactions on Information Theory, vol. 58, issue No. 2, pp. 1158-1162, February/2012.
Gong, G., F. Huo, and Y. Yang, "Large zero autocorrelation zones of Golay sequences and their applications", IEEE Transactions on Communication, November/2012.
Gong, G., T. Helleseth, H.G. Hu, and A. Kholosha, "On the dual of certain ternary weakly regular bent functions", IEEE Transactions on Information Theory, vol. 58, issue No. 2, pp. 2237-2243, April/2012.
Gong, G., M. Aagaard, and X. Fan, "Resilience to distinguishing attacks on WG-7 cipher and their generalizations", Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences, 2012.
Gong, G., S. Ronjom, T. Helleseth, and H. Hu, "Fast Discrete Fourier Spectra Attacks on Stream Ciphers", IEEE Transactions on Information Theory, vol. 57, pp. 5555-5565, August/2011.
Gong, G., S. W. Golomb, and H.Y. Song, "A note on low correlation zone signal sets", IEEE Trans. on Information Theory, vol. 53, issue No. 7, pp. 2575 - 2581, 07-2007.
Gong, G., S. W. Golomb, and H-Y. Song, "A Note on Low Correlation Zone SignalSets", 40th Annual Conference of Information Sciences and Systems (CISS 2006), vol. Princeton University, Technical Co-Sponsorship With IEEE Information Theory Society, 2006. PDF icon A Note on Low Correlation Zone SignalSets (PDF) (240.96 KB)
Gong, G., and H.Y. Song, "Two-tuple balance of non-binary sequences with ideal 2-level autocorrelation", Discrete Applied Mathematics, vol. 153, issue 18, pp. 2590-2598, 12-2006.
Gong, G., and S.Q. Jiang, "Editing Generator and its Cryptanalysis, Special issue on Multimedia Networking and Wireless Communications", International Journal of Wireless and Mobile Computing, Inderscience Publishers, 2004.
Gong, G., "Randomness and Discrepancy Transforms, Progress on Cryptography", Kluwer Academic Publishing, issue K.F. Chen (Ed.), pp. 1-8, 2004.
Gong, G., and A. Youssef, "Cryptographic Properties of the Welch-Gong Transformation Sequence Generators", IEEE Trans.on Inform., vol. 48, issue No. 11, pp. 2847-2867, 11-2002, 2003. PDF icon Cryptographic Properties of the Welch-Gong Transformation Sequence Generators (PDF) (397.37 KB)
Gong, G., and S.W. Golomb, "The Decimation-Hadamard transform of two-level autocorrelation sequences", IEEE Trans. on Inform. Theory, vol. 48, issue No. 4, pp. 853-865, 04-2002. PDF icon The Decimation-Hadamard transform of two-level autocorrelation sequences (PDF) (550.35 KB)
Gong, G., Z.T. Dai, and S.W. Golomb, "Criterion and Counting for Cyclically shift distinct q-ary GMW sequences of period qn-1", IEEE Trans. on Inform. Theory, vol. 46, issue No. 2, pp. 474-484, 03-2000.
Gong, G., and L. Harn, "Public-key cryptosystems based on cubic finite field extensions", IEEE Trans. on Inform. Theory, vol. 45, issue No. 7, pp. 2601-2605, 11-1999, 2000.
Gong, G., and S.W. Golomb, "Binary Sequences with Two-Level Autocorrelation", IEEE Trans. on Inform. Theory, vol. 45, issue No. 2, pp. 692-693, 03-1999.
Gong, G., and S.W. Golomb, "Hadamard Transforms of Three Term Sequences", Hadamard Transforms of Three Term Sequences, vol. 45, issue No. 6, pp. 2059-2060, 09-1999.
Gong, G., and S.W. Golomb, "Transform Domain Analysis of DES", IEEE Trans. on Inform. Theory, vol. 45, issue No. 6, pp. 2065-2073, 09-1999. PDF icon Transform Domain Analysis of DES (PDF) (188.72 KB)
Gong, G., "A new class of q-ary PN sequences", IEEE Trans.on Inform., vol. 43, issue No. 3, pp. 1007-1012, 05-1997.
Gong, G., and Z.D. Dai, On constructions of SAC permutation polynomials, Systems Science and Mathematical Sciences, vol. 10, issue No. 2, pp. 120-128, 1997.
Gong, G., "On q-ary cascaded GMW sequences", IEEE Trans. on Inform. Theory, vol. 42, issue No. 1, pp. 263-267, 01-1996.
Gong, G., "Theory and applications of q-ary interleaved sequences", IEEE Trans. on Inform. Theory, vol. 41, issue No. 2, pp. 400-411, 03-1995.
Gong, G., and G.Z. Xiao, "Synthesis and uniqueness of m-sequences over GF(q^n) as n-phase sequences over GF(q)", IEEE Trans. on Communications, vol. 42, issue No. 8, 09-1994.
Gong, G., A. Di Porto, and W. Wolfowicz, "Galois linear group sequences", LA COMUNICAZIONE, Note Recensioni Notizie, vol. XLII, pp. 83-89, 12-1993.
Gong, G., "Solving phase sets of nonlinear feed forward sequences with maximal linear complexity", Science Bulletin of China, vol. China, issue N0. 7, pp. 551-554, 04-1991.
Gong, G., "Spectral analysis and algorithm of nonlinear feed forward generators", J. of China Institute of Communications, vol. 12, issue No. 6, pp. 61-64, 11-1991.
Gong, G., "Runs, component sequences and vector sequences of m-sequences over Galois fields", ACTA ELECTRONICS SILICA, vol. 14, issue No. 4, pp. 94-100, 07-1986.
Gong, G., "Private Computing and Applications to Supply Chain Managements with Locally Private Blockchain Transactions", Blockchain Technology Symposium 2020, Toronto, Canada, 02/2020.
Gong, G., K. Mandal, Y. Tan, and T. Wu, "On the multi-ouput filtering model and its applications", Technical Report, CACR 2014-14, University of Waterloo., 2014.
Gong, G., K. Mandal, Y. Tan, and T. Wu, Security Assessment of TUAK Algorithm Set, pp. 119 pages, 2014.
Gong, G., "A Closer Look at Selective DFT Attacks", Technical Report, CACR 2011-35., University of Waterloo, 2011.
Gong, G., "Lightweight Cryptography for RFID Systems", Tutorial talk at Indocrypt'10, December/2010. PDF icon Part I (1.07 MB)PDF icon Part II (1.71 MB)PDF icon Part III (2.01 MB)
Gong, G., S. Ronjom, T. Helleseth, and H.G. Hu, Fast Discrete Fourier Spectra Attacks on Stream Ciphers, University of Waterloo, Canada, Technical Report, CACR 2009-04, 2009. PDF icon Fast Discrete Fourier Spectra Attacks on Stream Ciphers (PDF) (264.65 KB)PDF icon Slides (PDF) (612.64 KB)
Gong, G., "Design of SignalSets with Low Interference for CDMA Applications in Networking Environment", CACR 2006-05, University of Waterloo, Canada, 01-2006.
Gong, G., "Design of Signal Sets with Low Interference for CDMA Applications in Networking Environment", Technical Report, CACR 2006-5, University of Waterloo, 2005.
Gong, G., On Existence and Invariant of Algebraic Attacks: Technical Report, University of Waterloo, CACR 2004-17, 2004.
Gong, G., A. Hasan, H. Wu, and A. Youssef, "An Efficient Algorithm for Exponentiation in DH Key Exchange and DSA inCubicExtension Fields", CACR 2002-27, 2002.
Gong, G., and A. M. Youssef, "On the Welch-Gong transformation sequence generators", submitted to IEEE Trans. on Inform. Theory: Technical Report, University of Waterloo, CACR 2000-30, 05-2000.
Gong, G., Discrepancy transforms and their applications: , University ofWaterloo, CACR 99-60, 09-1999.
Gong, G., and S.W. Golomb, "A Construction of Latin Squares of Orders 16, 32 and 64", Technical Report, Teledyne Electronic Technologies, 05-1997.
Gong, G., A. Di Porto, and W. Wolfowicz, "A public key cryptosystem based on Dickson permutation polynomials in finite fields", FUB report: 3T04492, 10-1992.
Guo, K., and G. Gong, "New Constructions of Complete Non-cyclic Hadamard Matrices, Related Function Families and LCZ Sequences", Proceedings of Sequences and Their Applications, Lecture Notes in Computer Sciences, vol. 6338, Springer, pp. 259-269, 2010.
Gupta, K.C., Y. Nawaz, and G. Gong, "Upper Bound for Algebraic Immunity on a Subclass of Maiorana McFarland Class of Bent Functions", Information Processing Letters, vol. 111, pp. 247-249, 2011.

H

Harn, L., H.Y. Lin, and G. Gong, "A global key recovery system", the Proceeding of the International Workshop on Cryptographic Techniques & E-Commerce, Hong Kong, pp. 81-86, 07-1999.
Harn, L., and G. Gong, "Elliptic curve digital signatures and accessories", the Proceedings of the International Workshop on Cryptographic Techniques & E-Commerce, pp. 126-131, 07-1999.
Harn, L., and G. Gong, "Conference key establishment protocol using a multivariate polynomial and its applications", Journal of Security and Communication Networks, vol. 8, issue 9, pp. 1794-1800, June/2015.
Harn, L., and G. Gong, "Conference key establishment using polynomials", IEEE Transactions on Computers, 2012.
Harn, L., H.-Y. Lin, and G. Gong, "Bounded-to-unbounded poker game", Electronics Letters, vol. 36, issue No. 3, pp. 214-215, 2000.
Harn, L., and G. Gong, "Digital signature with subliminal channel", IEE, Proc. Comput. Digital Tech. , vol. 144, issue No. 5, 09-1997.
Harn, L., G. Gong, and H.Y. Lin, A public-key cryptosystem based on LFSR state-space, 09-1999, 1998.
Helleseth, T., and G. Gong, "New nonbinary sequences with ideal two-level autocorrelation functions", IEEE Trans.on Inform. , vol. 48, issue No. 11, pp. 2868-2872, 11-2002. PDF icon New nonbinary sequences with ideal two-level autocorrelation functions (PDF) (280.47 KB)
Hoeper, K., and G. Gong, "Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes", in the book series on Computer and Network Security: Y. Xiao and Y. Pan (Eds.), World Scientific Publishing Co., 2007.
Hoeper, K., and G. Gong, Pre-Authentication and Authentication Models in Ad Hoc Networks: edited by Y. Xiao, X. (Sherman) Shen, and D.-Z. Du, Springer Verlag, 2007.
Hoeper, K., and G. Gong, "Identity-Based Key Exchange Protocols for Ad Hoc Networks", Proceedings of Canadian Workshop on Information Theory (CWIT '05), Montreal, Canada, 06-2005.
Hoeper, K., and G. Gong, "Limitations of Key Escrow in Ad Hoc Networks", Proceedings of first International Conference on Security and Privacy for Emerging Areas in Communication Networks, Athens, Greece, 10-2005.
Hoeper, K., and G. Gong, "Preventing or utilizing key escrow in identity-based schemes employed in mobile ad hoc networks", International Journal of Security and Networks (IJSN), Special Issue on Cryptography in Networks, vol. 2, issue 3/4, pp. 239-250, 2007.
Hoeper, K., and G. Gong, "Integrated DH-like key exchange protocols from LUC, GH and XTR", Proceedings of International Symposium on Information Theory(ISIT 2006), 2006.
Hoeper, K., and G. Gong, "Key revocation for identity-based schemes in mobile ad hoc networks", Proceedings of 5th International Conference on AD-HOC Networks and Wireless -AD HOCNOW, Lecture Notes in Computer Science, vol. 4104, issue T. Kunz and S.S. Ravi (Eds.), pp. 224-237, 2006. PDF icon Key revocation for identity-based schemes in mobile ad hoc networks (PDF) (188.18 KB)
Hoeper, K., and G. Gong, "Pre-Authentication and Authentication Models in AdHocNetworks", Wireless and Mobile Network Security, vol. Y.Xiao et al. (Eds.), 2005. PDF icon Pre-Authentication and Authentication Models in AdHocNetworks (PDF) (198.5 KB)
Hoeper, K., and G. Gong, Models of Authentication in Ad Hoc Networks and Their RelatedNetwork Properties: Technical Report, University of Waterloo, CACR 2004-03, 2004.
Hou, F., and G. Gong, "A new efficient physical layer OFDM encryption scheme", Technical Report, CACR 2013-02, 2013, University of Waterloo, Canada, 2013.
Hu, H.G., S. Shao, G. Gong, and T. Helleseth, "On the proof of Lin's conjecture", IEEE International Symposium on Information Theory (ISIT), Honolulu, HI, pp. 1822-1826, July/2014.
Hu, H.G., and G. Gong, "A new class of ternary and quaternary sequences with two-level autocorrelation", Proceedings of 2010 IEEE International Symposium on Information Theory (ISIT 2010), pp. 1292-1296, 2010.
Hu, H., and G. Gong, "New sequence families with zero or low correlation zone via interleaving techniques", IEEE International Symposium on Information Theory (ISIT 2009), Seoul, Korea, 2009.
Hu, H.G., and G. Gong, "A study on the pseudorandom properties of sequences generated via the additive order, Sequences and Their Applications (SETA)", Lecture Notes in Computer Sciences, S.W. Golomb, et al. (Eds.), vol. 5203, Springer, pp. 51-60, 2008.
Hu, H.G., G. Gong, and F.D. Guo, "New results on periodic sequences with large $k$-error linear Error!", New results on periodic sequences with large $k$-error linear Error!, Toronto, Canada, the Proceedings of International Symposium on Information Theory (ISIT 2008), pp. 2409-2413, 07-2008.
Hu, H., S. Shao, G. Gong, and T. Helleseth, "The Proof of Lin's Conjecture via the Decimation-Hadamard Transform", IEEE Transactions on Information Theory, vol. 60, issue No. 8, pp. 5054-5064, August/2014.
Hu, H., and G. Gong, "Periods on two kinds of nonlinear feedback shift registers with time varying feedback functions", International Journal of Foundations of Computer Science, vol. 22, issue No. 6, pp. 1317-1329, 2011.
Hu, H.G., and G. Gong, "New sets of zero or low correlation zone sequences via interleaving techniques", IEEE Transactions on Information Theory, vol. 56, pp. 1702-1713, April/2010.
Hu, H., G. Gong, and D. Feng, "New results on periodic sequences with large k-error linear complexity", IEEE Transactions on Information Theory, 2009.
Hu, H.G., and G. Gong, "New sequence families with zero or low correlation zone via interleaving techniques", Technical Report, CACR 2009-03, January 2009, University of Waterloo, Canada, IEEE Transactions on Information Theory, 2009. PDF icon New sequence families with zero or low correlation zone via interleaving techniques (PDF) (205.75 KB)PDF icon Slides (PDF) (779.4 KB)
Hu, H.G., and G. Gong, New Ternary and Quaternary Sequences with Two-Level Autocorrelation, University of Waterloo, Canada, Technical Report, CACR 2009-16, 2009. PDF icon New Ternary and Quaternary Sequences with Two-Level Autocorrelation (PDF) (205.75 KB)
Hu., H., S. Shao, G. Gong, and T. Helleseth, The Proof of Lin's Conjecture via the Decimation-Hadamard Transform, 2013.
Huo, F., and G. Gong, "A new efficient physical layer OFDM encryption scheme", Proceedings of The 33rd Annual IEEE International Conference on Computer Communications (INFOCOM'14), Technical Report, CACR 2013-01, University of Waterloo, 2013, Toronto, Canada, pp. 1024--1032, 2014.
Huo, F., and G. Gong, "Physical Layer Phase Encryption for Combating the Traffic Analysis Attack", IEEE International Symposium on EMC, Raleigh, USA, pp. 604-608, August/2014.
Huo, F., and G. Gong, "Physical Layer Phase Encryption for Combating the Traffic Analysis Attack", IEEE International Symposium on EMC, Raleigh, USA, pp. 604-608, August/2014.
Huo, F., C. Yang, G. Gong, and R. Poovendran, "A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power", TCryptology and Information Security Series - The 2013 Workshop on RFID and IoT Security (RFIDSec'13 Asia), Ma and J. Weng (Eds.), vol. 11, Amsterdam, Netherlands, IOS Press, pp. 57-68, November/2013.
Huo, F., P. Mitran, and G. Gong, "Analysis and validation of active eavesdropping attacks in passive FHSS RFID systems", IEEE Transactions on Information Forensics and Security, vol. 11, issue 7, pp. 1528-1541, July/2016.
Huo, F., and G. Gong, "XOR encryption vs phase encryption: an in-depth analysis", IEEE Transactions on Electromagnetic Compatibility, issue No. 99, pp. 1-9, January/2015.
Huo, F., and G. Gong, "XOR Encryption vs Phase Encryption: An In-depth Analysis", IEEE Transactions on Electromagnetic Compatibility, 2014.

J

Jiang, S., and G. Gong, "On Edit Distance Attack to Alternating Step Generator", Mathematical Properties of Sequences and Other Combinatorial Structures, J.-S. No, H.-Y. Song, T. Helleseth, and V.Kumar (Ed), New York, Kluwer Academic Publishers, pp. 85-92, 2003.
Jiang, S., G. Gong, J. He, K. Nguyen, and H. Wang, "PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model", The International Conference on Practice and Theory of Public-Key Cryptography (PKC), Edinburgh, Scotland, May 4-7 2020, 2020.
Jiang, S., and G. Gong, "A Round and Communication Efficient Secure Ranking Protocol", RSA Conference 2006, Cryptographers' Track, D. Pointvheval (Ed.), vol. 3860: Lecture Notes in Computer Science, Springer-verlag, pp. 350-364, 02-2005. PDF icon A Round and Communication Efficient Secure Ranking Protocol (PDF) (259.77 KB)
Jiang, S., and G. Gong, "Multi-service Oriented Broadcast Encryption", Australian Conference on Information Security and Privacy, LNCS 3108, vol. H.Wang. et al (Eds.): Springer-verlag, pp. 1-12, 2004.
Jiang, S., ZD. Dai, and G. Gong, "Notes on q-ary interleaved sequences", International Conference on Sequences and their Applications,, Singapore, 12-1998.
Jiang, S., and G. Gong, "Password Based Key Exchange with Mutual Authentication", Selected Area in Cryptography, vol. 3357, issue H.Handschuh et al. (Eds.), pp. pre-proceeding, pp. 291-306, 10-2004. PDF icon Password Based Key Exchange with Mutual Authentication (PDF) (235.62 KB)
Jiang, S., and G. Gong, "Password Based Key Exchange with Mutual Authentication", Selected Area in Cryptography, Waterloo, Canada, issue H.Handschuh et al. (Eds.), pp. pre-proceeding, pp. 291-306, 09-2004. PDF icon Password Based Key Exchange with Mutual Authentication (PDF) (235.62 KB)
Jiang, S., Z. T. Dai, and G. Gong, "Notes on q-ary interleaved sequences", Chinese Sci. Bull, vol. 45, issue No. 6, pp. 502-507, 2000.
Jiang, S., and G. Gong, "On Edit Distance Attack to Alternating Step Generator", CACR 2002-28, New York, Kluwer Academic Publishers, pp. 85-92, 2003. PDF icon On Edit Distance Attack to Alternating Step Generator (PDF) (267.14 KB)
Jiang, S., and G. Gong, "Cryptanalysis of Stream Cipher -- A Survey", CACR 2002-29, 2002. PDF icon Cryptanalysis of Stream Cipher -- A Survey (PDF) (371.07 KB)
Jiang, S., and G. Gong, "The Editing Generator and Its Cryptanalysis", CACR 2002-30, 2002.

K

K, M.K., and G. Gong, "New construction for balanced boolean functions with very high nonlinearity", IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Cryptography and Information Security, vol. E90-A, issue No. 1, pp. 29-35, 01-2007, 2006.
Kaleem, M., and G. Gong, "A Physical Layer DSB Enc Scheme for RFID Systems", Technical Report, CACR 2014-17, University of Waterloo, 2014., 2014.
Khoo, K. M., and G. Gong, "New constructions for resilient and highly nonlinear boolean functions", Information Security and Privacy, Lectures Notes in Computer Science, R. Safavi-Naini and J.Seberry (Ed), vol. 2727: Springer-Verlag, pp. 498-509, 2003. PDF icon New constructions for resilient and highly nonlinear boolean functions (PDF) (214.38 KB)
Khoo, K., G. Gong, G-E. Tan, and H. -KiatLee, "Comparison of boolean function design", Proceedings of International Symposium on Information Theory (ISIT 2005): Adelaide, Australia, 09-2005.
Khoo, K., G. Gong, and D. R. Stinson, "A new family of Gold-like sequences", IEEE International Symposium on Information Theory, Lausanne, Switzerland, 07-2002.
Khoo, K.M., C. W. Lim, and G. Gong, "Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity", Applicable Algebra in Engineering, Communication and Computing, vol. 19, issue No. 4, pp. 323 - 338, August/2008.
Khoo, K.M., and G. Gong, "New construction for balanced boolean functions with very high nonlinearity", IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, vol. E90-A, issue No. 1, pp. 29-35, 01-2007.
Khoo, K., G. Gong, and D. R. Stinson, "A new characterization of semi-bent and bent functions on finite fields", Designs,Codes, and Cryptography, vol. 38-2, pp. 279-295, 02-2006.
Khooand, K. M., and G. Gong, "Highly nonlinear s-boxes with reduced bound on maximum correlation", Proceedings of 2003 IEEE International Symposium on Information Theory (ISIT2003), Yokohama, Japan, pp. 254, 07-2003.
Kim, J. H., H. Y. Song, and G. Gong, "Trace Function Representation of Hall's Sextic Residue Sequences of Period $p \equiv 7 ~\mbox(mod $8$)$", Mathematical Properties of Sequences andOther Related Structures, J. S. No,H. Y. Song, T. Helleseth, and V. Kumar (Ed), NewYork, Kluwer Academic Publishers, pp. 23-32, 2003.
Kim, Y., H. Song, and G. Gong, Cross correlation of q-ary Power Residue Sequences of Period p is Upper Bounded by $sqrt(p)+2$: Technical Report, University of Waterloo, CACR 2004-07, 2004.

L

Lam, C.Y., and G. Gong, "A Lower Bound for the Linear Span of Filtering Sequences", Proceedings of conference on State of the Art of Stream Ciphers, Brugge, Belgium, pp. 220-233, 10-2004. PDF icon A Lower Bound for the Linear Span of Filtering Sequences (PDF) (203.03 KB)
Lam, C., M. Aagaard, and G. Gong, "Hardware Implementations of Multi-output Welch-Gong Ciphers", Technical Report, CACR 2011-01, University of Waterloo, 2011.
Lam, C.Y., and G. Gong, "Randomness of Elliptic Curve Sequences", CACR 2002-18, 2002.
Leung, B., G. Gong, D. Mcleish, and S. Robson, "Novel last passage time based jitter model with application to low slew rate/high noise ring oscillator", Journal of Analog Integrated Circuits and Signal Processing, vol. 78, issue No. 3, pp. 853-863, March/2014.
Li, Z.J., and G. Gong, "Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks", Proceedings of 9th International Conference on Ad Hoc Networks and Wireless (ADHOC-NOW 2010), Lecture Notes in Computer Science, I. Nikolaidis and K. Wu (Eds.), vol. 6288, Berlin, Germany: Springer-Verlag, pp. 149-162, 2010.
Li, Z., and G. Gong, "Computationally Efficient Mutual Entity Authentication in Wireless Sensor Networks", Proceedings of First International Conference on Ad Hoc Networks (ADHOCNETS 2009), LNICST 28, Niagara Falls, Ontario, Canada, pp. 192-207, 2009.
Li, Z., and G. Gong, "DHT-Based Detection of Node Clone in Wireless Sensor Networks", Proceedings of First International Conference on Ad Hoc Networks (ADHOCNETS 2009), LNICST 28, Niagara Falls, Ontario, Canada, pp. 240-255, 2009.
Li, Z.J., and G. Gong, "On the node clone detection in wireless sensor networks", IEEE/ACM Transactions on Networking, vol. 21, issue No. 6, pp. 1799-1811, December/2013.
Li, Z.J., G. Gong, and Z.G. Qin, "Secure and efficient LCMQ entity authentication protocol", IEEE Transactions on Information Theory, June/2013.
Li, Z.J., and G. Gong, "HB^C entity authentication for low-cost pervasive devices", IET Information Security, 2012.
Li, Z.J., and G. Gong, "Computationally Efficient Mutual Entity Authentication in Wireless Sensor Networks", Journal of Ad Hoc Networks, vol. 9, issue No. 2, pp. 202-215, 2011.
Li, Z., and G. Gong, Survey on Security in Wireless Sensor, Special English Edition of Journal of KIISC, vol. 18, issue No. 6 (B), pp. 233-248, December/2008.
Li, Z.J., and G. Gong, A survey on security in wireless sensor networks: Technical Report, University of Waterloo, CACR 2008-20, 10-2008. PDF icon A survey on security in wireless sensor networks (PDF) (229.59 KB)
Liu, Q., and G. Gong, "Physical Layer Secure Information Exchange Protocol for MIMO Ad hoc Networks Against Passive Attacks", the Proceedings of IEEE Globecom 2016 - CISS}, Washington DC, USA, December/2016.
Liu, Q., G. Gong, Y. Wang, and H. Li, "A novel physical layer security scheme for MIMO Two-Way relay channels", IEEE Globecom 2015 Workshop on Trusted Communications with Physical Layer Security (GC'15-TCPLS), San Diego, USA, December/2015.
Liu, Q., G. Gong, Y. Wang, and H. Li, "A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach", Mobile Information Systems, vol. 2017, issue Article ID 7843843, pp. 12, 2017.
Ludkovski, M., and G. Gong, "New families of ideal 2-level autocorrelation ternary sequences from second order DHT", Proceedings of the second International Workshop in Coding and Cryptography, Paris, France, pp. 345-354, 01-2001.
Luo, Y.Y., Q. Chai, G. Gong, and X.J. Lai, "WG-7, A Lightweight Stream Cipher With Good Cryptographic Properties", Proceedings of IEEE Global Communications Conference (GLOBECOM'10), Miami, Florida, USA, December/2010.

M

Ma, D., Z. Wang, and G. Gong, "A Direct Method to Construct Golay Complementary Sets Based on Boolean Functions", 29th Biennial Symposium on Communications, Toronto, Canada, pp. 5, June/2018.
Ma, D., Z. Wang, and G. Gong, "A New Method to Construct Golay Complementary set and Near-Complementary set by Paraunitary Matrices", the proceedings of IEEE 2017 Eighth International Workshop on Signal Design and Its Applications in Communications (IWSDA), Sapporo, Japan, September/2017.
Ma, D., S. Budisin, Z. Wang, and G. Gong, "A New Generalized Paraunitary Generator for Complementary Sets and Complete Complementary Codes of size 2m", IEEE Signal processing letters, October/2018.
Ma, D., Z. Wang, and H. Li, "A Generalized Construction of Non-Square M-QAM Sequences with Low PMEPR for OFDM Systems", IEICE Transactions, vol. 99-A, issue 6, pp. 1222-1227, 2016.
Mandal, K., and G. Gong, "Generating Good Span n Sequences Using Orthogonal Functions in Nonlinear Feedback Shift Registers", Open Problems in Mathematics and Computational Science, C.K. Koç (Ed.), pp. 127-162, 2015.
Mandal, K., and G. Gong, "PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks", The 2019 ACM Cloud Computing Security Workshop (AMC-CCSW), London, UK, London, UK, 11/2019.
Mandal, K., B. Yang, G. Guang, and M. Aagaard, "On ideal t-tuple distribution of filtering de. Bruijn sequence generators", Sequences and Their Applications (SETA) 2016, Chengdu, China, October/2016.
Mandal, K., and G. Gong, "Filtering nonlinear feedback shift registers using Welch-Gong transformations for securing RFID applications", Quality, Reliability, Security and Robustness in Heterogeneous Networking (Qshine 2013), ser. LNICST 115, K. Singh, A.K. Awasthi, and R. Mishra (Eds.), Berlin, Germany: Springer-Verlag, pp. 643-657, 2013.
Mandal, K., G. Gong, X. Fan, and M. Aagaard, "On Selection of Optimal Parameters for the WG Stream Cipher Family", Proceedings of 13th Canadian Workshop on Information Theory (CWIT'13), Toronto, Canada, pp. 17-21, June/2013.
Mandal, K., and G. Gong, "Cryptographically strong de Bruijn sequences with large periods", Selected Areas in Cryptography, Lecture Notes in Computer Science, L.R. Knudsen and H. Wu (Eds.), vol. 7707, Springer, Heidelberg, pp. 104-118, 2012.
Mandal, K., X. Fan, and G. Gong, "Warbler: a lightweight pseudorandom number generator gor EPC C1 Gen2 RFID tags", Cryptology and Information Security Series - The 2012 Workshop on RFID and IoT Security (RFIDsec'12 Asia), N.W. Lo and Y. Li (Eds.), vol. 8, Amsterdam, Netherlands, IOS Press, pp. 73-84, 2012.
Mandal, K., X. Fan, and G. Gong, "A Lightweight Pseudorandom Number Generator For EPC Class 1 Gen2 RFID Tags", Western European Workshop on Research in Cryptology (WEWoRC 2011), Bauhaus-University Weimar, Germany, July/2011.
Mandal, K., B. Yang, and G. Gong, "Analysis and Efficient Implementation of a Class of Composited de Bruijn Sequences", IEEE Transactions on Computers, 2019.
Mandal, K., G. Gong, and C. Liu, "NIKE-based Fast Privacy-preserving High-dimensional Data Aggregation for Mobile Devices", Submitted to IEEE Transaction on dependable and secure computing, vol. Technical Report, University of Waterloo, issue CACR 2018-10, December/2018. PDF icon NIKE-based Fast Privacy-preserving High-dimensional DataAggregation for Mobile Devices (PDF) (1.04 MB)
Mandal, K., and G. Gong, "On Ideal t-Tuple Distribution of Orthogonal Functions in Filtering De Bruijn Generators", Journal of Advances in Mathematics of Communications, 09/2018.
Mandal, K., B. Yang, G. Gong, and M. Aagaard, On Ideal t-Tuple Distribution of Filtering de Bruijn Sequence Generators, vol. 10, issue 4, pp. 629-641, 2017.
Mandal, K., X. Fan, and G. Gong, "Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices", ACM Transactions on Embedded Computing Systems, vol. 15, issue 1, pp. 1-28, 2016.
Mandal, K., and G. Gong, "Feedback Reconstruction and Implementations of Pseudorandom Number Generators from Composited De Bruijn Sequences", IEEE Transactions on Computers, vol. 65, issue No. 9, pp. 2725-2738, 2016.
Mandal, K., and G. Gong, "Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications", ICST Transactions on Security Safety, vol. 16, issue No. 7, 2016.
Mandal, K., Y. Tan, T. Wu, and G. Gong, "A comprehensive security analysis of the TUAK algorithm set", IEEE Transactions on Information Forensics and Security, September/2015.
Mandal, K., G. Gong, X. Fan, and M. Aagaard, "Optimal Parameters for the WG Stream Cipher Family", Cryptography and Communications, vol. 6, issue 2, pp. 117-135, June/2014.
Mandal, K., X. Fan, and G. Gong, "Warbler: a lightweight pseudorandom number generator for EPC C1 Gen2 passive RFID tags", Journal of RFID Security and Cryptography, vol. 2, issue 1-4, pp. 82-91, 2013.
Mandal, K., and G. Gong, "Cryptographic D-morphic analysis and fast implementations of composited de Bruijn sequences", Technical Report, CACR 2012-27, 2012, University of Waterloo, 2013.
Mandal, K., G. Gong, X. Fan, and M. Aagaard, "Optimal Parameters for the WG Stream Cipher Family", Technical Report CACR 2013-15 University of Waterloo, 2013.

N

Nassir, Y., G. Gong, and K.C. Gupta, "Upper bounds on algebraic immunity of boolean power functions", Fast Software Encryption, Lecture Notes in Computer Science (LNCS), vol. M. Robshaw (Ed.), issue 4047, pp. 375-389, 01-2006. PDF icon Upper bounds on algebraic immunity of boolean power functions (PDF) (216.21 KB)
Nawaz, Y., and G. Gong, "Distributing fixed time slices in heterogeneous networks of workstations (NOWs)", The Proceedings of the Fifth International Symposium on Parallel and Distributed Processing and Applications (ISPA07), Lecture Notes in Computer Sciences, Stojmenovic et al. (Eds.), , vol. 4742: Springer-Verlag, pp. 612-621, 09-2007.
Nawaz, Y., K. C. Gupta, and G. Gong, "Efficient techniques to find algebraic immunity of s-boxes based on power mappings", Proceedings of International Workshop on Coding and Cryptography, Versailles, France, pp. 237-246, 04-2007.
Nawaz, Y., and G. Gong, "Algebraic immunity of some cryptographic Boolean functions", Proceedings of Canadian Workshop on Information Theory (CWIT'05), Montreal, Canada, pp. 371-374, 06-2005. PDF icon Algebraic immunity of some cryptographic Boolean functions (PDF) (73.72 KB)
Nawaz, Y., and G. Gong, "The WG Steam Cipher", Proceedings of the Symmetric Key Encryption Workshop, Denmark, 05-2005.
Nawaz, Y., and G. Gong, WG: A family of stream ciphers with designed randomness properties, Information Sciences, vol. 178, issue No. 7, pp. 1903-1916, April/2008.
Nawaz, Y., K. Gupta, and G. Gong, "Algebraic immunity of S-boxes based on power mappings: Analysis andconstruction", CACR 2006-34, University of Waterloo, Canada, 10-2006.
No, J.S., S.W. Golomb, G. Gong, H.K. Lee, and P.Gaal, "New binary pseudo-random sequences of period $2^n - 1$ with ideal autocorrelation", IEEE Trans. on Inform. Theory, vol. 44, issue No. 2, pp. 814-817, 03-1998.

Q

Qu, L., Y. Tan, C. Li, and G. Gong, "More results on differentially 4-uniform permutations on $F_2^2k}$", Designs, Codes and Cryptography}, vol. 78, issue 2, pp. 391-408, February/2016.
Qu, L., Y. Tan, C. Li, and G. Gong, "More Constructions of differentially 4-uniform permutations on GF", Designs, Codes and Cryptography, pp. 1-18, September/2014.

R

Robson, B., B. Leung, and G. Gong, "Truly Random Number Generator Based on Ring Oscillator Utilizing Last Passage Time", IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 61, issue No. 2, pp. 937-941, December/2014.
Rohit, R., R. Altawy, and G. Gong, "MILP-based Cube Attack on the Reduced-round WG-5 Lightweight Stream Cipher", Cryptography and Coding, Lecture Notes in Computer Science (LNCS), vol. 10655, pp. 333-351, 2018.
Rohit, R., and G. Gong, "Practical forgery attacks on Limdolen and HERN", NIST LWC Workshop, NIST Gaithersburg Campus, NIST, 2019.
Rohit, R., and G. Gong, "Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64", Ramp Session Presentation, Crypto 2018, vol. Available in IACR Cryptology, ePrint Archive 2018, Santa Barbara, pp. 699, August/2018.
Rohit, R., R. Altawy, and G. Gong, "MILP-based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher", in the 16th IMA International Conference on Cryptography and Coding (IMACC 2017), LNCS, CACR Technical Report, cacr2017-06, University of Waterloo, vol. 10655, St Catherine's College, University of Oxford, Oxford, UK, pp. 12-14, December/2017. PDF icon MILP-based Cube Attack on the Reduced-Round WG-5Lightweight Stream Cipher (PDF) (365.7 KB)
Rønjom, S., G. Gong, and T. Helleseth, "On attacks on filtering generators using linear subspace structures, Sequences, Subsequences, and Consequences", Lecture Notes in Computer Science, S.W. Golomb et al. (Eds.), vol. 4893: Springer-Verlag, pp. 204-217, 2007.

S

Safkhani, M., N. Bagheri, M. Naderi, Y. Luo, and Q. Chai, "Tag Impersonation Attack on Two RFID Mutual Authentication Protocols", First International Workshop on Lightweight Cryptography (LWCrypt 2011), Vienna, Austria, August/2011.
Suder, V., "International Workshop on Coding and Cryptography", WCC2015, April/2015.

T

Tan, Y., and G. Gong, "On the existence of aperiodic complementary hexagonal lattice arrays", Contemporary Developments in Finite Fields and Applications, A. Canteaut et al. (Eds.), World Scientific Press, pp. 341-362, 2016.
Tan, Y., K. Mandal, T. Wu, and G. Gong, "Security Analysis of TUAK Algorithms for 4G-LTE Authentication and Key Agreement", the 25th International Conference on Computer Communication and Networks (ICCCN)}, Waikoloa, Hawaii, USA, August/2016.
Tan, Y., and G. Gong, "Codes, schemes and quadratic zero-difference balanced functions", Functions and Geometries over Finite Fields, Ottawa, July/2015.
Tan, Y., and G. Gong, "On the existence of aperiodic complementary hexagonal lattice arrays", the 12th International Conference on Finite fields and their applications, Saratoga Spring, NY, July/2015.
Tan, Y., G. Gong, and B. Zhu, "Enhanced criteria on differential uniformity and nonlinearity of cryptographic significant functions", Journal of Cryptography and Communications, vol. 8, issue 2, pp. 291-311, April/2016, 2017.
Tan, Y., and G. Gong, "Codes, schemes and quadratic zero-difference balanced functions", Design, Codes and Cryptography, September/2015.
Tan, Y., G. Gong, and B. Zhu, "Enhanced Criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions", Journal of Cryptography and Communications, Springer, June/2015.
Tan, Y., K. Mandal, and G. Gong, "Characterization of Theta Effect Kernel and Differential Cryptanalysis of Keccak", Design, Codes and Cryptography, 2014.
Tan, Y., G. Gong, and B. Zhu, "Enhanced criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions", Journal of Cryptography and Communications, 2014.
Tan, Y., G. Gong, and B. Zhu, "Enhanced criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions", Journal of Cryptography and Communications, 2014.
Tang, X.H., and G. Gong, "New constructions of binary sequences with optimal autocorrelation value/magnitude", IEEE Transactions on Information Theory, vol. 56, issue No. 3, pp. 1278-1286, March/2010.
Tassanaviboon, A., and G. Gong, "A Framework Toward a Self-Organizing and Self-Healing Certificate Authority Group in a Content Addressable Network", Proceedings of the 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2010), pp. 614-621, 2010. PDF icon A Framework Toward a Self-Organizing and Self-Healing Certificate Authority Group in a Content Addressable Network (PDF) (188.56 KB)

W

Wang, Z., J. Chai, and G. Gong, "The Fourier Spectral Characterization for the Correlation - Immune Functions over $F_p$", Sequences and Their Applications (SETA), Hong Kong, pp. 14, 2018.
Wang, Z.L., and G. Gong, "Discrete Fourier Transform of Boolean functions over the Complex Field and its Applications", IEEE Transactions on Information Theory Special Issue on Shift-Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb, vol. 64, April/2018.
Wang, Z., and G. Gong, "Discrete Fourier Transform of Boolean Functions over the Complex Field and Its Applications", IEEE Transactions on Information Theory Special Issue on Shift-Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb, April/2018, 2017.
Wang, Z., M. Parker, G. Gong, and G.F. Wu, "On the PMEPR of binary Golay sequences of length 2^n", IEEE Transactions on Information Theory, vol. 60, issue 4, pp. 2391-2398, April/2014.
Wang, Z.L., and G. Gong, "Correlation of binary sequence families derived from multiplicative character of finite fields", Advances in Mathematics of Communications, vol. 7, issue No. 4, pp. 475-484, October/2013.
Wang, Z.L., G. Gong, and N.Y. Yu, "New polyphase sequence families with low correlation derived from the Weil bound of exponential sums", IEEE Transactions on Information Theory, vol. 59, issue No. 6, pp. 3990-3998, June/2013.
Wang, Z.L., and G. Gong, "New sequences design from Weil representation with low two-dimensional correlation in both time and phase shifts", IEEE Transactions on Information Theory, vol. 57, issue No. 7, pp. 4600 - 4611, July/2011.
Wang, Z.L., and G. Gong, "A note on the diagonalization of the discrete Fourier transform", Applied and Computational Harmonic Analysis, vol. 28, issue No. 1, pp. 114-120, 2010.
Wang, Z., and G. Gong, A Note on the Diagonalization of the Discrete Fourier Transform, University of Waterloo, Canada, Technical Report, CACR 2009-12, 2009. PDF icon A Note on the Diagonalization of the Discrete Fourier Transform (PDF) (198.11 KB)
Wang, Z., and G. Gong, "New sequences design from Weil representation with low two-dimensional correlation in both time and phase shifts", Technical Report, CACR 2009-01, January 2009, University of Waterloo, Canada, Seoul, Korea, IEEE Transactions on Information Theory, 2009. PDF icon New Sequences Design from Weil Representation with LowTwo-Dimensional Correlation in Both Time and Phase Shifts (PDF) (267.88 KB)
Wen, H., G. Gong, and P.H. Ho, "MIMO Cross-Layer Secure Communication Architecture Based on STBC", Proceedings of IEEE Global Communications Conference (GLOBECOM'10), Miami, Florida, USA, December/2010.
Wen, H., and G. Gong, "A cross-layer approach to enhance the security of wireless networks based on MIMO", 43rd Annual Conference on Information Sciences and Systems (CISS 2009), pp. 935 - 939, 2009.
Wen, H., P. Han Ho, and G. Gong, "A Novel Framework for Message Authentication in Vehicular Communication Networks", Globe communication conference, IEEE GLOBECOMb , 2009.
Wen, H., G. Gong, and P.H. H, "Build-in Wiretap Channel I with Feedback and LDPC Codes", JOURNAL OF COMMUNICATIONS AND NETWORKS, vol. 11, issue No. 6, pp. 538-543, 2009.
Weng, G., Y. Tan, and G. Gong, "On Quadratic APN Functions and Their Related Algebraic Objects", Proceedings of the International Workshop on Coding and Cryptography (WCC 2013), Bergen, Norway, pp. 48-57, April/2013.
Weng, G., Y. Tan, and G. Gong, "On Quadratic APN Functions and Their Related Algebraic Objects", Designs, Codes and Cryptography, 2013.
Wu, T., Y. Tan, K. Mandal, and G. Gong, "On the Multi-Output Filtering Model and Its Applications", in the Proceedings of 2nd International Conference on Codes, Cryptology and Information Security (C2SI), Lecture Notes in Computer Sciences (LNCS), S.E. Hajji et al. Eds., Springer, vol. 10194, pp. 265-281, 2017.
Wu, T., and G. Gong, "The weakness of integrity protection for LTE", Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec'13, CACR 2013-04, 2013, University of Waterloo, Canada, Budapest, Hungary, Technical Report, pp. 79-88, April/2013.
Wu, T., Y. Tan, K. Mandal, and G. Gong, "On the multi-output filtering model and its applications", Submitted to Journal of Cryptography and Communications, September/2015.
Wu, T., and G. Gong, "Two new message authentication codes based on APN functions and stream ciphers", Security and Communication Networks, December/2015.

X

Xiao, L., S. Tavares, A. Youssef, and G. Gong, "Improved Cascaded Stream Ciphers Using Feedback", Proceedings of 18th Annual Canadian Conference onElectrical and Computer Engineering (CCECE'05), Saskatoon, Canada, 05-2005. PDF icon Improved Cascaded Stream Ciphers Using Feedback (PDF) (108.43 KB)

Y

Yang, M., and G. Gong, "Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS", 12th International Symposium on Foundations & Practice of Security, Toulouse, France, Springer, 11/2019.
Yang, M., and G. Gong, "Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS", The 12th International Symposium on Foundations & Practice of Security, 2019, Toulouse, France, 2019.
Yang, G., M. Aagaard, and G. Gong, "Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator", NIST Lightweight Cryptography workshop, July/2015.
Yang, G., B. Zhu, V. Suder, M. Aagaard, and G. Gong, "The Simeck Family of Lightweight Block Ciphers", Workshop on Cryptographic Hardware and Embedded Systems (CHES 2015), LNCS 9293, pp. 307-329, September/2015.
Yang, G., X. Fan, M. Aagaard, and G. Gong, "Design Space Exploration of the Lightweight Stream Cipher WG-8 for FPGAs and ASICs", The 8th Workshop on Embedded Systems Security (WESS'13), vol. Article No. 8, Montreal, Canada, ACM Press, September/2013.
Yang, Y., F. Huo, and G. Gong, "Large zero odd periodic autocorrelation zone of Golay sequences and QAM Golay sequences", The Proceedings of 2012 IEEE International Symposium on Information Theory (ISIT), Cambridge, MA, USA, pp. 1024-1028, 2012.
Yang, Y., G. Gong, and X.H. Tang, "Odd perfect sequences and sets of spreading sequences with zero or low odd periodic correlation zone", Sequences and Their Applications (SETA), Lecture Notes in Computer Science, J. Jedwab and T. Helleseth (Eds.), vol. 7280, pp. 1-12, 2012.
Yang, Y., X.H. Tang, G. Gong, and Z.C. Zhou, "On the optimality of ZCZ sequence sets", IWSDA, Guilin, Guangxi, pp. 36-39, 2011.
Yang, M., and G. Gong, "Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS", In submission Communication Network Security (CNS), May 30 - June 1, 2018.
Yang, B., K. Mandal, M. Aagaard, and G. Gong, "Efficient Composited de Bruijn Sequence Generators", IEEE Transactions on Computers, vol. 66, issue 8, pp. 1354-1368, 2017.
Yang, Y., X. Tang, and G. Gong, "New Almost Perfect, Odd Perfect, and Perfect Sequences from Difference Balanced Functions with d-form Property", Advances in Mathematics of Communications, vol. 11, issue 1, pp. 67-76, 2017.
Yang, Y., X.H. Tang, and G. Gong, "Even periodic and odd periodic complementary sequence pairs from generalized Boolean functions", Advances in Mathematics of Communications, vol. 7, issue No. 2, pp. 113-125, May/2013.
Yang, Y., G. Gong, and X.H. Tang, "On the perfect cyclically conjugated even and odd periodic autocorrelation properties of quaternary Golay sequences", IEEE Transactions on Information Theory, 2012.
Yi, Y., G. Gong, and K. Mandal, "Implementation of three LWC Schemes in the WiFi 4-Way Handshake with Software Defined Radio", NIST LWC Workshop, NIST Gaithersburg Campus, 2019.
Youssef, A.M., and G. Gong, "Boolean functions with large distance to all bijective monomials: N odd case", the Proceedings of the Eighth Annual Workshop on Selected Areas in Cryptography, Toronto, CACR 2001-57 , 10-2001.
Youssef, A.M., and G. Gong, "Cryptanalysis of a public-key cryptosystem proposed at ACISP2000", Information Security and Privacy, Lectures Notes in Computer Science, Vijay Varadharajan and Yi Mu (Ed.), vol. 2119, Berlin, Germany, Springer-Verlag, pp. 15-20, 2001.
Youssef, A.M., and G. Gong, "Hyper-Bent Functions", Advances in Cryptology- Eurocrypto'2001, CACR 2001-58, vol. Lecture Notes in Computer Science 2045: Springer, pp. 406-419, 2001.
Youssef, A., S. E. Tavares, and G. Gong, "On Some Probabilistic Approximations forAES-like S-boxes", Discrete Mathematics, vol. 306, pp. 2016-2020, 2006.
Youssef, A.M., and G. Gong, "On the linear complexity of sequences over $GF(2^n)$", Theoretical ComputerScience, vol. 352, issue 1-3, pp. 288-292, 03-2006.
Youssef, A. M., and G. Gong, On the quadratic span of binary sequences: Technical Report, University of Waterloo, CACR 2000-20, 03-2000.
Yu, N.Y., and G. Gong, "Generalized constructions of polyphase sequence families using shift and addition of multiplicative character sequences", Proceedings of 2010 IEEE International Symposium on Information Theory (ISIT 2010), pp. 1258-1262, 2010.
Yu, N.Y., and G. Gong, "On the structure of M-ary Sidelnikov sequences of period p2m-1", Proceedings of 2010 IEEE International Symposium on Information Theory (ISIT 2010), pp. 1233-1237, 2010.
Yu, N.Y., and G. Gong, "Multiplexing realizations of the decimation-Hadamard transform of two-level autocorrelation sequences", Coding and Cryptology, Lecture Notes in Computer Science, Y.M. Chee, et al. (Eds.), vol. 5557, Springer, pp. 248-258, 2009.
Yu, N.Y., and G. Gong, "The Perfect Binary Sequence of Period 4 for Low Periodic and Aperiodic Autocorrelations, Sequences, Subsequences, and Consequences", Lecture Notes in Computer Science, S.W. Golomb et al. (Eds.), vol. 4893: Springer-Verlag, pp. 37-49, 2007.
Yu, N. Y., and G. Gong, "Higher order autocorrelation of binary sequences with ideal two-level autocorrelation", Proceedings of Canadian Workshop on Information Theory (CWIT'05), Montreal, Canada, June 5-8, 2005, pp. 391-394, 2005.
Yu, N. Y., and G. Gong, "Realization of decimation-Hadamard transform for binary generalized GMW sequences", Proceedings of Workshop on Coding and Cryptography (WCC2005), Bergen, Norway, Technical Report, CORR 2005-08, Springer-verlag, 2005.
Yu, N.Y., and G. Gong, "Near-complementary sequences with low PMEPR for peak power control in multicarrier communications", IEEE Transactions on Information Theory, vol. 57, issue No. 1, pp. 505-513, January/2011.
Yu, N.Y., and G. Gong, "Multiplicative characters, the Weil bound, and polyphase sequence families with low correlation", IEEE Transactions on Information Theory, vol. 56, pp. 1702-1713, April/2010.
Yu, N. Yul, and G. Gong, "New binary sequences with optimal autocorrelation magnitude", IEEE Trans. on Inform. , vol. 54, issue No. 10, pp. 4771 - 4779, October/2008.
Yu, N. Yul, and G. Gong, "Cross correlation properties of binary sequences with ideal two-level autocorrelation", Sequences and Their Applications (SETA06), LNCS, vol. 4086, issue G. Gong et al. (Eds.), pp. 104-118, 2006. PDF icon Cross correlation properties of binary sequences with ideal two-level autocorrelation (PDF) (242.05 KB)
Yu, N.Y., and G. Gong, "Interleaved construction of binary sequences with optimal autocorrelation magnitude", Proc. of IEEE Information Theory Workshop (ITW), pp. 530-534, 10-2006.
Yu, N.Y., and G. Gong, "New family of binary sequences with low correlation and large size", IEEE Trans. on Inform. Theory, vol. 52, issue No. 4, pp. 1624-1636, 04-2006. PDF icon New family of binary sequences with low correlation and large size (PDF) (232.49 KB)
Yu, N.Y., and G. Gong, "Quadratic bent functions of polynomial forms and their applications to bent sequences", Proc. of 23rd Biennial Symposium on Communication, pp. 128-131, 2006.
Yu, N. Yul, and G. Gong, "Realizations from decimation Hadamard transform for special classes of binary sequences with two-level autocorrelation", Coding and Cryptography, Lecture Notes in Computer Science, vol. 3969, issue T. Helleseth et al. (Eds.), pp. 371-385, 2006. PDF icon Realizations from decimation Hadamard transform for special classes of binary sequences with two-level autocorrelation (PDF) (299.86 KB)
Yu, N., and G. Gong, Realizations of Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation, University of Waterloo, Technical Report, CACR2005-14, 2005.
Yul, N.Y., and G. Gong, "On asymptotic optimality of binary sequence families", CACR2006-28, University of Waterloo, Canada, 05-2006.

Z

Zhang, B.Y., and G. Gong, "Randomness Properties of Stream Ciphers for Wireless Communications", Proceedings of 2013 Sixth International Workshop on Signal Design and its Applications in Communications (IWSDA), Tokyo, Japan, pp. 107-108, October/2013.
Zhou, Z., X.H. Tang, and G. Gong, "A new class of sequences with zero or low correlation zone based on interleaving technique", IEEE Trans. on Inform., vol. 54, issue No. 9, pp. 4267-4273, September/2008.
Zhu, B., X. Fan, and G. Gong, "Pleco and Plectron - Two Provably Secure Password Hashing Algorithms", The 5th ACM Conference on Data and Application Security and Privacy (CODASPY 2015), pp. 127-129, 2015.
Zhu, B., X. Fan, and G. Gong, "Loxin -- A Solution to Password-less Universal Login", Proceedings of 2014 IEEE INFOCOM Workshop on Security and Privacy in Big Data (BigSecurity), Technical Report, CACR 2013-24, University of Waterloo, 2013., Toronto, Canada, pp. 494-499, 2014.
Zhu, B., Y. Tan, and G. Gong, "Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation", Cryptology and Network Security - CANS'13, Lecture Notes in Computer Science, vol. 8257, Berlin, Germany: Springer-Verlag, M. Abdalla, C. Nita-Rotaru and R. Dahab (Eds.), pp. 20-38, November/2013.
Zhu, S., and G. Gong, "Fuzzy authorization for cloud storage", IEEE Transactions on Cloud Computing, Special Issue on Cloud Security, vol. 2, issue No. 4, pp. 422-435, October/2014, 2015.
Zhu, B., and G. Gong, "Multidimensional Meet-in-the-Middle Attack and Its Applications to KATAN32/48/64", Journal of Cryptography and Communications, Discrete Structures, Boolean Functions and Sequences (CCDS), vol. 6, issue 4, pp. 313-333, December/2014.
Zhu, B., X. Fan, and G. Gong, "Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms", IEEE Trans on Dependable and Secure Computing, 2014.
Zhu, S., and G. Gong, "Fuzzy Authorization for Cloud Storage", Technical Report, CACR 2014-16, University of Waterloo, 2014.
Zhu, and G. Gong, "Guess-then-meet-in-the-middle attacks on the KTANTAN family of block ciphers", Technical Report, CACR 2011-34, University of Waterloo, Canada, 2011.
Zidaric, N., M. D. Aagaard, and G. Gong, "Rapid Hardware Design for Cryptographic Modules with Filtering Structure over Small Finite Fields", International Workshop on the Arithmetic of Finite Fields (WAIFI 2018), Bergen, Norway, June/2018.
Zidaric, N., M. Aagaard, and G. Gong, "Hardware Optimizations and Analysis for the WG-16 Cipher with Tower Field Arithmetic", IEEE Transactions on Computers, January/2019, 2018.

Publications search