Cryptographers' World
 

Guang Gong


Author's Web Page Link

16 papers in database with 239 citations 

H-number: 9

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Khoongming Khoo,  Guang Gong,  Douglas R. Stinson,  A New Characterization of Semi-bent and Bent Functions on Finite Fields*, Designs, Codes and Cryptography, Volume 38(2), pp. 279 - 295, Springer, 2006.

[Electronic Edition][Cited 14 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Xinxin Fan,  Guang Gong,  Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations, pp. 155 - 172, SAC 2007.

[Electronic Edition][Cited 3 times ]

2. Khoongming Khoo,  Guang Gong,  Hian-Kiat Lee,  The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions, pp. 194 - 209, ACNS 2006.

[Electronic Edition][Cited 4 times ]

3. Yassir Nawaz,  Guang Gong,  Kishan Chand Gupta,  Upper Bounds on Algebraic Immunity of Boolean Power Functions, pp. 375 - 389, FSE 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 20 times ]

4. Shaoquan Jiang,  Guang Gong,  A Round and Communication Efficient Secure Ranking Protocol, pp. 350 - 364, CT-RSA 2006.

[Electronic Edition][No citation]

5. Shaoquan Jiang,  Guang Gong,  Password Based Key Exchange with Mutual Authentication, pp. 267 - 279, SAC 2004.

[Electronic Edition][Cited 30 times ]

6. Guang Gong,  Khoongming Khoo,  Additive Autocorrelation of Resilient Boolean Functions, pp. 275 - 290, SAC 2003.

[Electronic Edition][Cited 15 times ]

7. Amr M. Youssef,  Guang Gong,  Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem, pp. 214 - 222, INDOCRYPT 2001.

[Electronic Edition][Cited 3 times ]

8. Amr M. Youssef,  Guang Gong,  Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case, pp. 49 - 59, SAC 2001.

[Electronic Edition][Cited 6 times ]

9. Guang Gong,  Lein Harn,  Huapeng Wu,  The GH Public-Key Cryptosystem, pp. 284 - 300, SAC 2001.

[Electronic Edition][Cited 28 times ]

10. Amr M. Youssef,  Guang Gong,  Hyper-bent Functions, pp. 406 - 419, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 49 times ]

11. Guang Gong,  Amr M. Youssef,  On Welch-Gong Transformation Sequence Generators, pp. 217 - 232, SAC 2000.

[Electronic Edition][No citation]

12. Amr M. Youssef,  Guang Gong,  On the Interpolation Attacks on Block Ciphers, pp. 109 - 120, FSE 2000.

[Electronic Edition][Cited 22 times ]

13. Guang Gong,  Thomas A. Berson,  Douglas R. Stinson,  Elliptic Curve Pseudorandom Sequence Generators, pp. 34 - 48, SAC 1999.

[Electronic Edition][Cited 35 times ]

14. Xingong Chang,  Zong-Duo Dai,  Guang Gong,  Some Cryptographic Properties of Exponential Functions, pp. 415 - 418, ASIACRYPT 1994.

[Electronic Edition][Cited 10 times ]

15. Guang Gong,  Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key, pp. 32 - 36, ASIACRYPT 1990.

[Electronic Edition][No citation]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...