## Selected Publications (2017)

### Journal Articles

#### Published

• B. Yang, K. Mandal, M. Aagaard, and G. Gong, Efficient Composited de Bruijn Sequence Generators, IEEE Transactions on Computers, Vol. 66, Iss. 8, pp. 1354-1368, 2017.
• K. Mandal, B. Yang, G. Gong, and M. Aagaard, On Ideal t-Tuple Distribution of Filtering de Bruijn Sequence Generators, Vol. 10, Iss. 4, pp. 629-641, Aug. 2017.
• Y. Yang, X. Tang, G. Gong, New Almost Perfect, Odd Perfect, and Perfect Sequences from Difference Balanced Functions with d-form Property, Advances in Mathematics of Communications, Vol. 11, Iss. 1, pp. 67-76, 2017.
• Q. Liu, G. Gong, Y. Wang and H. Li, A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach, Mobile Information Systems, Vol. 2017, Article ID 7843843, (12 pages) (open access articles), 2017.

#### Accepted

• G. Gong, T. Helleseth and V. Kumar, Solomon W. Golomb - A Great Mind in our Era, IEEE Transactions on Information Theory Special Issue on Shift-Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb, To appear at the issue of April 2018.
• Z. Wang and G. Gong, Discrete Fourier Transform of Boolean Functions over the Complex Field and Its Applications, IEEE Transactions on Information Theory Special Issue on Shift-Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb, To appear at the issue of April 2018.
• R. AlTawy, R. Rohit, M. He, K. Mandal, G. Yang, and G. Gong, Towards a Cryptographic Minimal Design: The sLiSCP Family of Permutations, To appear at IEEE Transactions on Computers. CACR Technical Report cacr2017-04, University of Waterloo http://cacr.uwaterloo.ca/techreports/2017/cacr2017-04.pdf.

#### Submitted

• Y. Chen, B. Case, S. Gao, G. Gong,  Error Analysis of Weak Poly-LWE Instances, In submission Journal of Cryptography and Communications Special Issue on  Mathematical Methods for Cryptography, Nov. 2017. CACR Technical Report cacr2-17-8, University of Waterloo http://cacr.uwaterloo.ca/techreports/2017/cacr2017-08.pdf.
• M. Yang and G. Gong, Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS, In submission Communication Network Security (CNS) 2018, Beijing, China, May 30 - June 1, 2018.

### Book Chapters and Referred Conference Proceedings

• R. AlTawy, R. Rohit, M. He, K. Mandal, G. Yang, and G. Gong, sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives, in Selected Areas in Cryptography, 2017.
• R. Rohit, R. AlTawy, and G. Gong, MILP-based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher, in the 16th IMA International Conference on Cryptography and Coding (IMACC 2017), 12-14 December 2017, St Catherine's College, University of Oxford, Oxford, UK. The proceedings is scheduled to be published in LNCS, vol. 10655, Chapter 17 by Springer in the beginning of 2018. CACR Technical Report, cacr2017-06, University of Waterloo, http://cacr.uwaterloo.ca/techreports/2017/cacr2017-06.pdf.
• R. AlTawy, M. ElSheikh, A. Youssef, and G. Gong, Lelantos: A Blockchain-based Anonymous Physical Delivery System, the 15th International Conference on Privacy, Security and Trust (PST'17), Calgary, Canada, Aug. 28 - 30, 2017. IACR eprint: https://eprint.iacr.org/2017/465.pdf.
• T. Wu, Y. Tan, K. Mandal and G. Gong, On the Multi-Output Filtering Model and Its Applications, in the Proceedings of 2nd International Conference on Codes, Cryptology and Information Security (C2SI), Lecture Notes in Computer Sciences (LNCS), vol. 10194, S.E. Hajji et al. Eds., Springer, pp. 265-281, 2017.
• D. Ma, Z. Wang, and G. Gong, A New Method to Construct Golay Complementary set and Near-Complementary set by Paraunitary Matrices, the proceedings of IEEE 2017 Eighth International Workshop on Signal Design and Its Applications in Communications (IWSDA), 24 Sep - 28 Sep 2017, Sapporo, Japan.

### Conference Presentations with Refereed Abstracts

• G. Gong, Strong Cryptographic Properties of WG Transformation Filtering on de Bruijn Sequences, invited talk at Coding Theory, Cryptography, and Number Theory, at the AMS Meeting at College of Charleston in Charleston, SC, March 10-12, 2017.

## Selected Publications (2016)

### Journal Articles

• D. Ma, Z. Wang, H. Li, A Generalized Construction of Non-Square M-QAM Sequences with Low PMEPR for OFDM Systems, IEICE Transactions, Vol. 99-A, Iss. 6, pp. 1222-1227, 2016
• F. Huo, P. Mitran, and G. Gong, Analysis and validation of active eavesdropping attacks in passive FHSS RFID systems, IEEE Transactions on Information Forensics and Security, Vol. 11, Iss. 7, pp. 1528--1541, July 2016.
• K. Mandal and G. Gong, Feedback Reconstruction and Implementations of Pseudorandom Number Generators from Composited De Bruijn Sequences, IEEE Transactions on Computers, Vol. 65, No. 9, pp. 2725--2738, 2016.
• K. Mandal and G. Gong, Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications, ICST Transactions on Security Safety, Vol. 16, No. 7, 2016.
• Y. Tan, G. Gong, and B. Zhu, Enhanced criteria on differential uniformity and nonlinearity of cryptographic significant functions, Journal of Cryptography and Communications, vol. 8, Iss. 2, pp 291--311, Springer, April 2016.
• C. Carlet, G. Gong, and Y. Tan, Quadratic zero-difference balanced functions, APN functions and strongly regular graphs, Designs, Codes and Cryptography}, Vol. 78, Iss. 3, pp. 629--654, March 2016.
• L. Qu, Y. Tan, C. Li, and G. Gong, More results on differentially 4-uniform permutations on $F_{2^{2k}}$, Designs, Codes and Cryptography}, vol. 78, Iss.2, pp. 391--408, February 2016.
• K. Mandal}, X. Fan, and G. Gong, Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices, ACM Transactions on Embedded Computing Systems, Volume 15, Iss. 1, Article No. 1, pp. 1--28, 2016.

### Book Chapters and Referred Conference Proceedings

• Y. Tan and G. Gong, On the existence of aperiodic complementary hexagonal lattice arrays, Contemporary Developments in Finite Fields and Applications, A. Canteaut et al. (Eds.), World Scientific Press, pp.341--362, 2016.
• Q. Liu and G. Gong, Physical Layer Secure Information Exchange Protocol for MIMO Ad hoc Networks Against Passive Attacks, the Proceedings of IEEE Globecom 2016 - CISS}, Washington DC, USA, Dec. 2016.
• K. Mandal, B. Yang, G. Guang, and M. Aagaard, On ideal t-tuple distribution of filtering de Bruijn sequence generators, Sequences and Their Applications (SETA) 2016, Chengdu, China, 09-14 October 2016.
• Y. Chen, Y. Tan, and G. Gong, New Bounds and Constructions of Weak Systematic Algebraic Modification Detection Codes, Sequences and Their Applications (SETA) 2016, Chengdu, China, 09-14 October 2016.
• Y. Tan, K. Mandal, T. Wu, and G. Gong, Security Analysis of TUAK Algorithms for 4G-LTE Authentication and Key Agreement, the 25th International Conference on Computer Communication and Networks (ICCCN)}, Waikoloa, Hawaii, USA, 1--4 August, 2016.

### Slides

• G. Gong, Sequences and Cryptography, invited talk at the Workshop on Shift Register Sequences for Honoring Dr. Solomon Golomb, the recipient of the 2016 Benjamin Franklin Medal in Electrical Engineering, April 20, 2016, Philadelphia, U.S.

## Selected Publications (2015)

### Journal Articles

#### Published

• L. Harn and G. Gong, Conference key establishment protocol using a multivariate polynomial and its applications, Journal of Security and Communication Networks, vol. 8, Iss. 9, pp. 1794-–1800, June 2015.
• H. El-Razouk, A. Reyhani-Masoleh, and G. Gong, New Hardware Implementations of WG(29,11) and WG-16 Stream Ciphers Using Polynomial Basis, IEEE Trans. Comput., vol. 64, no. 7, pp. 2020–-2035, August 2015.
• F. Huo and G. Gong, XOR encryption vs phase encryption: an in-depth analysis, IEEE Transactions on Electromagnetic Compatibility, vol., No. 99, pp. 1-9, January 2015.
• S. Zhu and G. Gong, Fuzzy authorization for cloud storage, IEEE Transactions on Cloud Computing, Special Issue on Cloud Security, vol. 2, No. 4, pp.422-435, October-December 2014.
• Y. Tan, G. Gong, and B. Zhu, Enhanced Criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions, Journal of Cryptography and Communications, Springer, accepted in May 2015, published on-line in Springer in June 2015.
• K. Mandal and G. Gong, Feedback reconstruction and implementations of pseudorandom number generators from composited de Bruijn sequences, accepted by IEEE Transactions on Computers, early access on IEEE Xplore, published in 2015.

#### Accepted

• T. Wu and G. Gong, Two new message authentication codes based on APN functions and stream ciphers, accepted by Security and Communication Networks, Special Issue on Provable Security in December 2015.

#### Submitted

• Y. Tan and G. Gong, Codes, schemes and quadratic zero-difference balanced functions, submitted to Design, Codes and Cryptography, September 2015. Technical Report CACR 2016-02, University of Waterloo.
• T. Wu, Y. Tan, K. Mandal, and G. Gong, On the multi-output filtering model and its applications, Submitted to Journal of Cryptography and Communications, September 2015
• K. Mandal, Y. Tan, T. Wu, and G. Gong, A comprehensive security analysis of the TUAK algorithm set, Submitted to IEEE Transactions on Information Forensics and Security, September 2015. Technical Report CACR 2016-01, University of Waterloo.
• G. Gong, Physical Layer Secure Information Exchange Protocol for MIMO Ad-hoc Networks Against Passive Attackers, Technical Report CACR 2015-04, University of Waterloo.

### Book Chapters and Refereed Conference Proceedings

• K. Mandal and G. Gong, Generating Good Span n Sequences Using Orthogonal Functions in Nonlinear Feedback Shift Registers, Open Problems in Mathematics and Computational Science}, C.K. Koç (Ed.), pp. 127-162, Springer, 2015.
• Q. Liu, G. Gong, Y. Wang, and H. Li, A novel physical layer security scheme for MIMO Two-Way relay channels, in IEEE Globecom 2015 Workshop on Trusted Communications with Physical Layer Security (GC'15-TCPLS), San Diego, USA, December 2015.
• Y. Chen and G. Gong, Integer Arithmetic over Ciphertext and Homomorphic Data Aggregation, Proceedings of 2015 IEEE CNS Workshop on Security and Privacy in the Cloud (SPC), pp. 592-596, Florence, Italy, September 30, 2015.
• G. Yang, B. Zhu, V. Suder, M. Aagaard, and G. Gong, The Simeck Family of Lightweight Block Ciphers, Workshop on Cryptographic Hardware and Embedded Systems (CHES 2015), LNCS 9293, pp. 307-329, September 13, 2015.
• G. Yang, M. Aagaard, and G. Gong, Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator, NIST Lightweight Cryptography workshop, July 21, 2015.
• B. Zhu, X. Fan, and G. Gong, Pleco and Plectron - Two Provably Secure Password Hashing Algorithms, The 5th ACM Conference on Data and Application Security and Privacy (CODASPY 2015). pp. 127-129.
• Y. Tan and G. Gong, Codes, schemes and quadratic zero-difference balanced functions, Workshop on Functions and Geometries over Finite Fields, Ottawa, July 8-11, 2015.
• Y. Tan and G. Gong, On the existence of aperiodic complementary hexagonal lattice arrays, the 12th International Conference on Finite fields and their applications, Saratoga Spring, NY, July 13-17, 2015.
• V. Suder, , International Workshop on Coding and Cryptography, WCC2015, April 13-17, 2015.
• T. Fuhr, G. Leurent and V. Suder, Collision Attacks against CAESAR Candidates, Forgery and Key-Recovery against AEZ and Marble, inASIACRYPT’15, Part II, LNCS 9453, Chapter 21, 2015.

## Selected Publications (2014)

### Journal Articles

#### Published

• C. Carlet, G. Gong, and Y. Tan, Quadratic zero-difference balanced functions, APN functions and strongly regular graphs, accepted by Designs, Codes and Cryptography, pp. 1-26, November 2014. Technical Report, CACR 2014-13, University of Waterloo, 2014
• L. Qu, Y. Tan, C. Li, and G. Gong, More Constructions of differentially 4-uniform permutations on GF(2^{2k}), Designs, Codes and Cryptography, pp. 1-18, September 2014. Technical Report, CACR 2014-14, University of Waterloo, 2014.
• B. Robson, B. Leung, and G. Gong, Truly Random Number Generator Based on Ring Oscillator Utilizing Last Passage Time, IEEE Transactions on Circuits and Systems II: Express Briefs, Vol. 61, No. 2, pp. 937-941, December 2014.
• B. Zhu and G. Gong, Multidimensional Meet-in-the-Middle Attack and Its Applications to KATAN32/48/64, Journal of Cryptography and Communications, Discrete Structures, Boolean Functions and Sequences (CCDS), Vol. 6, Iss. 4, pp. 313-333, December 2014.
• H. El-Razouk, A. Reyhani-Masoleh, and G. Gong, New implementations of the WG stream cipher, IEEE Transactions on VLSI, Vol. 22, No. 9, September 2014. Technical Report, CACR 2012-31, University of Waterloo, 2012.
• H. Hu. S. Shao, G. Gong, and T. Helleseth, The Proof of Lin's Conjecture via the Decimation-Hadamard Transform, IEEE Transactions on Information Theory, Vol. 60, No. 8, pp. 5054-5064, August 2014.
• J.-H. Chung, G. Gong, and K. Yang, New Families of Optimal Frequency-Hopping Sequences of Composite Lengths, IEEE Transactions on Information Theory, Vol. 60, No. 6, pp. 3688-3697, June 2014.
• K. Mandal, G. Gong, X. Fan, and M. Aagaard, Optimal Parameters for the WG Stream Cipher Family, Cryptography and Communications, Vol. 6, Iss. 2, pp. 117-135, June 2014.
• Z. Wang, M. Parker, G. Gong, and G.F. Wu, On the PMEPR of binary Golay sequences of length 2^n, IEEE Transactions on Information Theory, Vol. 60, Iss. 4, pp. 2391-2398, April 2014.
• B. Leung, G. Gong, D. Mcleish, and S. Robson, Novel last passage time based jitter model with application to low slew rate/high noise ring oscillator, Journal of Analog Integrated Circuits and Signal Processing, Vol. 78, No. 3, pp. 853-863, March 2014.

#### Submitted

• F. Huo and G. Gong, XOR Encryption vs Phase Encryption: An In-depth Analysis, submitted to IEEE Transactions on Electromagnetic Compatibility, 2014.
• B. Zhu, X. Fan, and G. Gong, Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms, submitted to IEEE Trans on Dependable and Secure Computing. IACR Cryptology ePrint Archive: Report 2014/655
• Y. Tan, K. Mandal, and G. Gong, Characterization of Theta Effect Kernel and Differential Cryptanalysis of Keccak, submitted to Design, Codes and Cryptography, 2014.
• Y. Tan, G. Gong, and B. Zhu. Enhanced criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions, submitted to Journal of Cryptography and Communications, 2014

### Book Chapters and Refereed Conference Proceedings

• G. Gong and S.W. Golomb, A Simple Construction of Almost Perfect Quinary ASK and QAM Sequences, Sequences and Their Applications - SETA 2014, Lecture Notes in Computer Science, Vol. 2014, K. Schmit and A. Winterhof, pp. 109-120, November 2014.
• F. Huo and G. Gong, Physical Layer Phase Encryption for Combating the Traffic Analysis Attack, IEEE International Symposium on EMC, Raleigh, USA, August 3-8, 2014, pp. 604 - 608.IEEE EMC Symposium Best Paper Finalist
• J.L (Roy) Feng and G. Gong, WiFi-based Location Services Attack on Dual-band Hardware, IEEE International Symposium on EMC 2014, Raleigh, USA, August 3-8, 2014. pp. 155 - 158.
• H.G. Hu, S. Shao, G. Gong, and T. Helleseth, On the proof of Lin's conjecture, IEEE International Symposium on Information Theory (ISIT) 2014, June 29-July 4, 2014, Honolulu, HI, pp. 1822-1826.
• F. Huo, and G. Gong, A new efficient physical layer OFDM encryption scheme, Proceedings of The 33rd Annual IEEE International Conference on Computer Communications (INFOCOM'14), pp. 1024--1032, April 27-May 2, 2014, Toronto, Canada. Technical Report, CACR 2013-01, University of Waterloo, 2013.
• B. Zhu, X. Fan, and G. Gong, Loxin -- A Solution to Password-less Universal Login. Proceedings of 2014 IEEE INFOCOM Workshop on Security and Privacy in Big Data (BigSecurity) 2014, April 27-May 2, 2014, Toronto, Canada, pp. 494-499. Technical Report, CACR 2013-24, University of Waterloo, 2013.

### Technical Reports

• H. El-Razouk, A. Reyhani-Masoleh, and G. Gong, New Hardware Implementations of WG(29.11) and WG-13 Stream Ciphers Using Polynomial Basis, Technical Report, CACR 2014-02, University of Waterloo, 2014.
• S. Zhu and G. Gong, Fuzzy Authorization for Cloud Storage, Technical Report, CACR 2014-16, University of Waterloo, 2014.
• G. Gong, K. Mandal, Y. Tan, and T. Wu, Security Assessment of TUAK Algorithm Set, Technical Report to 3GPP, can be download from http://www.3gpp.org/ftp/tsg_sa/WG3_Security/TSGS3_76_Sophia/TdocList_2014-08-29_16h55.htm with the document No. S3-142035 (116 pages).
• J. Feng and G. Gong, WiFi-based Location Services Attack on Dual-band Hardware, invited talk at 2014 IEEE International Symposium on Electromagnetic Compatibility, Aug 4 - 8, 2014, Raleigh, NC, USA. Full version titled Vulnerability Analysis and Countermeasures for WiFi-based Location Services and Applications, Technical Report, CACR 2014-25, University of Waterloo, 2014.
• M. Kaleem and G. Gong, A Physical Layer DSB Enc Scheme for RFID Systems, Technical Report, CACR 2014-17, University of Waterloo, 2014.
• G. Gong, K. Mandal, Y. Tan, and T. Wu, On the multi-ouput filtering model and its applications, Technical Report, CACR 2014-14, University of Waterloo, 2014.

## Selected Publications (2013)

### Journal Articles

#### Published

• K. Mandal, X. Fan, and G. Gong, Warbler: a lightweight pseudorandom number generator for EPC C1 Gen2 passive RFID tags, Journal of RFID Security and Cryptography, Vol. 2, Iss. 1-4, pp. 82-91, 2013.
• Y. Yang, X.H. Tang, and G. Gong, Even periodic and odd periodic complementary sequence pairs from generalized Boolean functions, Advances in Mathematics of Communications, Vol. 7, No. 2, pp. 113-125, May 2013. Technique Report, CACR 2012-19, University of Waterloo, 2012.
• Z.L. Wang, G. Gong, and N.Y. Yu, New polyphase sequence families with low correlation derived from the Weil bound of exponential sums, IEEE Transactions on Information Theory, vol. 59, No. 6, pp. 3990-3998, June 2013. Technical Report, CACR 2012-09, University of Waterloo, 2012.
• Z.J. Li, G. Gong, and Z.G. Qin, Secure and efficient LCMQ entity authentication protocol, IEEE Transactions on Information Theory, accepted by , June 2013. Technical Report, CACR 2010-21, University of Waterloo.
• Z.L. Wang and G. Gong, Correlation of binary sequence families derived from multiplicative character of finite fields, Advances in Mathematics of Communications, Vol. 7, No. 4, pp. 475-484, Oct 2013. Technical Report, CACR 2013-04, University of Waterloo, 2013.
• Z.J. Li and G. Gong, On the node clone detection in wireless sensor networks, IEEE/ACM Transactions on Networking, vol. 21, No. 6, pp. 1799 - 1811, Dec 2013.
• G. Gong, M. Aagaard and X. Fan, Resilience to distinguishing attacks on WG-7 cipher and their generalizations, Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences, vol. 5, No. 4, December 2013, pp. 277-289. Technical Report, CACR 2012-30, 2012, University of Waterloo.
• X. Fan and G. Gong, Security Challenges in Smart-Grid Metering and Control Systems, Technology Innovation Management (TIM) Review, pp. 42-49, July 2013.
• G. Gong, F. Huo, and Y. Yang, Large Zero Autocorrelation Zone of Golay Sequences and Their Applications, IEEE Transactions on Communications, vol. 61, No. 9, pp. 3967-3979, August 2013.

#### Accepted

• H. El-Razouk, A. Reyhani-Masoleh, and G. Gong, New Implementations of the WG Stream Cipher, accepted by IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Sep. 2013. Technical Report, CACR 2012-31, 2012, University of Waterloo.

#### Submitted

• H. Hu. S. Shao, G. Gong, and T. Helleseth, The Proof of Lin's Conjecture via the Decimation-Hadamard Transform, Technical Report, CACR 2013-21, 2013, University of Waterloo.
• G. Gong, S. Goh, and Y. Tan, Determining All Permutation Polynomials of the Form G(x) + Tr(H(x)), submitted to Finite Fields and Their Applications.
• G. Weng, Y. Tan, and G. Gong, On Quadratic APN Functions and Their Related Algebraic Objects, submitted to Designs, Codes and Cryptography. Technical Report, CACR 2013-18, University of Waterloo, 2013.
• G. Gong, Y. Tan, and B. Zhu, Enhanced Criteria on Differential Uniformity and Nonlinearity of Cryptographically Signicant Functions, submitted to IEEE Trans on Information Theory. Technical Report, CACR 2013-19, University of Waterloo, 2013.

### Book Chapters and Refereed Conference Proceedings

• B.Y. Zhang and G. Gong, Randomness Properties of Stream Ciphers for Wireless Communications, Proceedings of 2013 Sixth International Workshop on Signal Design and its Applications in Communications (IWSDA), Tokyo, Japan, pp. 107-109, Oct 27-Nov 01, 2013.
• G. Gong, Character sums and polyphase sequence families with low correlation, DFT and ambiguity, Character Sums and Polynomials, A. Winterhof et al. (Eds.), De Gruyter, Germany, pp. 1-43, 2013.
• G. Gong and K.C. Gupta, Stream and Block Ciphers, Handbook of Finite Fields, G. Mullen and D. Panario (Eds.), CRC, May 2013.
• M. D. Aagaard, G. Gong, and R. K. Mota, Hardware Implementations of the WG-5 Cipher for Passive RFID Tags, IEEE International Symposium on Hardware-Oriented Security and Trust (HOST'13), pp. 29-34, June 2-3, 2013, Austin, TX, USA.
• G. Yang, X. Fan, M. Aagaard, and G. Gong, Design Space Exploration of the Lightweight Stream Cipher WG-8 for FPGAs and ASICs, The 8th Workshop on Embedded Systems Security (WESS'13), ACM Press, Article No. 8, September 29, 2013, Montreal, Canada.
• X. Fan, N. Zidaric, M. Aagaard, and G. Gong, Efficient Hardware Implementation of the Stream Cipher WG-16 with Composite Field Arithmetic, The 3rd International Workshop on Trustworthy Embedded Devices (TrustED'13), ACM Press, pp. 21-34, November 4, 2013, Berlin, Germany.
• X. Fan and G. Gong, Securing ZigBee Smart Energy Profile 1.x with OpenECC Library, The First ACM Workshop on Smart Energy Grid Security (SEGS'13), ACM Press, pp. 17-22, November 4-8, 2013, Berlin, Germany.
• X. Fan, T. Wu, and G. Gong, An Efficient Stream Cipher WG-16 and Its Application for Securing 4G-LTE Networks, The 3rd International Conference on Communication and Network Security (ICCNS'13), November 16-17, 2013, London, UK.
• X. Fan and G. Gong, Securing NFC with Elliptic Curve Cryptography -- Challenges and Solutions (Short Paper), TCryptology and Information Security Series - The 2013 Workshop on RFID and IoT Security (RFIDSec'13 Asia), Vol. 11, C. Ma and J. Weng (Eds.), Amsterdam, Netherlands: IOS Press, pp. 97-106, November 2013.
• G. Gong, F. Huo, Y. Yang, Large Zero Correlation Zone of Golay Pairs and QAM Golay Pairs, 2013 IEEE International Symposium on Information Theory Proceedings (ISIT'13), pp. 3135-3139, July 7-12 2013, Istanbul, Turkey.
• F. Huo, C. Yang, G. Gong, and R. Poovendran, A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power, TCryptology and Information Security Series - The 2013 Workshop on RFID and IoT Security (RFIDSec'13 Asia), Vol. 11, C. Ma and J. Weng (Eds.), Amsterdam, Netherlands: IOS Press, pp. 57-68, November 2013
• B. Zhu, Y. Tan, and G. Gong, Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation, Cryptology and Network Security - CANS'13, Lecture Notes in Computer Science, M. Abdalla, C. Nita-Rotaru and R. Dahab (Eds.), vol. 8257, Berlin, Germany: Springer-Verlag, pp. 20-38, November 2013
• G. Weng, Y. Tan, and G. Gong, On Quadratic APN Functions and Their Related Algebraic Objects, Proceedings of the International Workshop on Coding and Cryptography (WCC 2013), pp. 48-57, April 15-19, 2013, Bergen, Norway.
• K. Mandal, G. Gong, X. Fan, and M. Aagaard. On Selection of Optimal Parameters for the WG Stream Cipher Family, Proceedings of 13th Canadian Workshop on Information Theory (CWIT'13), pp. 17-21, June 18-21, 2013, Toronto, Canada.
• T. Wu and G. Gong, The weakness of integrity protection for LTE, Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec'13, pp. 79-88, April 17-19, 2013, Budapest, Hungary (23 pages). Technical Report, CACR 2013-04, 2013, University of Waterloo, Canada.
• X. Fan, K. Mandal, and G. Gong, WG-8: a lightweight stream cipher for resource-constrained smart devices, Quality, Reliability, Security and Robustness in Heterogeneous Networking (Qshine 2013), ser. LNICST 115, K. Singh, A.K. Awasthi, and R. Mishra (Eds.), Berlin, Germany: Springer-Verlag, pp. 617-632, 2013.
• K. Mandal and G. Gong, Filtering nonlinear feedback shift registers using Welch-Gong transformations for securing RFID applications, Quality, Reliability, Security and Robustness in Heterogeneous Networking (Qshine 2013), ser. LNICST 115, K. Singh, A.K. Awasthi, and R. Mishra (Eds.), Berlin, Germany: Springer-Verlag, pp. 643-657, 2013.

### Technical Reports

• K. Mandal, G. Gong, X. Fan, and M. Aagaard, Optimal Parameters for the WG Stream Cipher Family, Technical Report CACR 2013-15, University of Waterloo, 2013.
• K. Mandal and G. Gong, Cryptographic D-morphic analysis and fast implementations of composited de Bruijn sequences. Technical Report, CACR 2012-27, 2012, University of Waterloo.
• F. Hou and G. Gong, A new efficient physical layer OFDM encryption scheme. Technical Report, CACR 2013-02, 2013, University of Waterloo, Canada.

## Selected Publications (2012)

### Journal Articles

#### Published

• G. Gong, T. Helleseth, H.G. Hu, and A. Kholosha, On the dual of certain ternary weakly regular bent functions, IEEE Transactions on Information Theory, vol. 58, No. 4, April 2012, pp. 2237-2243.
• G. Gong, T. Helleseth, and H.G. Hu, A three-valued Walsh transform from decimations of Helleseth-Gong sequences, IEEE Transactions on Information Theory, vol. 58, No. 2, February 2012, pp.1158-1162.
• X. Fan and G. Gong, Accelerating signature-based broadcast authentication for wireless sensor networks, Journal of Ad Hoc Networks, vol. 10, No. 4, June 2012, pp. 723-736.

#### Accepted

• Z.J. Li and G. Gong, HB^C entity authentication for low-cost pervasive devices, to appear in IET Information Security.

#### Submitted

• Q. Chai and G. Gong, A cryptanalysis of hummingbird-2: the differential sequence analysis, submitted to International Journal of Applied Cryptography, Technical Report, CACR 2012-09, University of Waterloo, 2012.
• L. Harn and G. Gong, Conference key establishment using polynomials, submitted to IEEE Transactions on Computers. Technical Report, CACR 2012-10, University of Waterloo, 2012.
• Z.L. Wang, G. Gong, and N.Y. Yu, New polyphase sequence families with low correlation derived from the Weil bound of exponential sums, submitted to IEEE Transactions on Information Theory, revised in Nov. 2012. Technical Report, CACR 2012-09, University of Waterloo, 2012.
• G. Gong, M. Aagaard, and X. Fan, Resilience to distinguishing attacks on WG-7 cipher and their generalizations, submitted to Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences. Technical Report, CACR 2012-30, University of Waterloo, 2012.
• G. Gong, F. Huo, and Y. Yang, Large zero autocorrelation zones of Golay sequences and their applications, submitted to IEEE Transactions on Communication, November 2012.
• Y. Yang, G. Gong, and X.H. Tang, On the perfect cyclically conjugated even and odd periodic autocorrelation properties of quaternary Golay sequences, submitted to IEEE Transactions on Information Theory. Technical Report, CACR 2012-18, University of Waterloo, 2012.

### Book Chapters and Refereed Conference Proceedings

• G. Gong, Character sums and polyphase sequence families with low correlation, DFT and ambiguity, to appear in Character Sums and Polynomials, A. Winterhof et al., Eds., De Gruyter, Germany, pp. 1-43, 2013.
• K. Mandal, X. Fan, and G. Gong, Warbler: a lightweight pseudorandom number generator gor EPC C1 Gen2 RFID tags, Cryptology and Information Security Series - The 2012 Workshop on RFID and IoT Security (RFIDsec'12 Asia), vol. 8, N.W. Lo and Y. Li (Eds.), Amsterdam, Netherlands: IOS Press, pp. 73-84, 2012.
• K. Mandal and G. Gong, Cryptographically strong de Bruijn sequences with large periods, Selected Areas in Cryptography, Lecture Notes in Computer Science, L.R. Knudsen and H. Wu (Eds.), vol. 7707, pp. 104-118. Springer, Heidelberg, 2012.
• X. Fan and G. Gong, On the security of Hummingbird-2 against side channel cube attacks, The 4th Western European Workshop on Research in Cryptology (WEWoRC 2011), Lecture Notes in Computer Science, F. Armknecht and S. Lucks (Eds.), vol. 7242, Springer Verlag, pp. 18-29, 2012.
• Y. Yang, G. Gong, and X.H. Tang, Odd perfect sequences and sets of spreading sequences with zero or low odd periodic correlation zone, Sequences and Their Applications (SETA), Lecture Notes in Computer Science, J. Jedwab and T. Helleseth (Eds.), vol. 7280, pp. 1-12, 2012.
• Q. Chai and G. Gong, BUPLE: securing passive RFID communication through physical layer enhancements, RFID Security and Privacy, Lecture Notes in Computer Science, Ari Juels and Christof Paar (Eds.), vol. 7055, pp. 127-146. Springer, Heidelberg, 2011.
• Q. Chai, G. Gong, and D. Engels, How to develop clairaudience -- active eavesdropping in passive RFID systems (invited), The Proceedings of 2012 IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM), June 25-28, 2012, San Francisco, CA, USA, 2012, pp.1-6.
• X. Fan, and G. Gong, LPKM: A lightweight polynomial-based key management protocol for distributed wireless sensor networks, the Proceedings of The 4th International Conference on Ad Hoc Networks, October 15-17, Paris, France, 2012.
• Q. Chai and G. Gong, Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers, The Proceedings of IEEE ICC 2012 - Communication and Information Systems Security Symposium, June 10-15, 2012, Ottawa, Canada, pp. 917-922. Best Paper Award of IEEE ICC 2012.
• Y. Yang, F. Huo, and G. Gong, Large zero odd periodic autocorrelation zone of Golay sequences and QAM Golay sequences, The Proceedings of 2012 IEEE International Symposium on Information Theory (ISIT), July 1-6, 2012, Cambridge, MA, USA, pp. 1024-1028. The full version of this paper has been submitted to Advances in Mathematics of Communications.
• G. Gong, F. Huo, and Y. Yang, Large zero autocorrelation zone of Golay sequences, The Proceedings of 2012 IEEE International Symposium on Information Theory (ISIT), July 1-6, 2012, Cambridge, MA, USA, pp. 1019-1023.

## Selected Publications (2011)

### Journal Articles

• Z.L. Wang and G. Gong, New sequences design from Weil representation with low two-dimensional correlation in both time and phase shifts, IEEE Transactions on Information Theory, Vol. 57, No. 7, pp.4600 - 4611, July 2011.
• N.Y. Yu and G. Gong, Near-complementary sequences with low PMEPR for peak power control in multicarrier communications, IEEE Transactions on Information Theory, vol. 57, No. 1, pp. 505-513, Jan. 2011.
• G. Gong, S. Ronjom, T. Helleseth, H. Hu, Fast Discrete Fourier Spectra Attacks on Stream Ciphers, IEEE Transactions on Information Theory, Vol. 57, pp. 5555-5565, Aug. 2011.
• H. Hu and G. Gong, Periods on two kinds of nonlinear feedback shift registers with time varying feedback functions, International Journal of Foundations of Computer Science, Vol. 22, No. 6, pp. 1317-1329, 2011.
• Z. D. Dai, G. Gong, H.Y. Song, and D.F. Ye. Trace representation and linear complexity of binary e-th power residue sequences of period p, IEEE Trans. on Inform. Theory, accepted.
• K.C. Gupta, Y. Nawaz, and G. Gong. Upper Bound for Algebraic Immunity on a Subclass of Maiorana McFarland Class of Bent Functions, Information Processing Letters, Vol. 111, 2011, pp. 247-249.
• Z.J. Li and G. Gong, Computationally Efficient Mutual Entity Authentication in Wireless Sensor Networks, Journal of Ad Hoc Networks, Vol. 9, No. 2, 2011, pp.204-215.

### Book Chapters and Refereed Conference Proceedings

• Y. Yang, X.H. Tang, G. Gong, and Z.C. Zhou, On the optimality of ZCZ sequence sets, IWSDA 2011, Oct. 10-14, Guilin, Guangxi, pp. 36-39, 2011.
• X. Fan, G. Gong, D. Engels, and E. Smith, A Lightweight Privacy-Preserving Mutual Authentication Protocol for RFID Systems, Joint Workshop of SCPA 2011 and SaCoNAS 2011, Houston, TX, USA, December 5, 2011.
• X. Fan, G. Gong, and H. Hu, Remedying the Hummingbird Cryptographic Algorithm, The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (SPIoT 2011), Changsha, Hunan, China, November 16, 2011.
• Q. Chai and G. Gong, Differential Cryptanalysis of Two Joint Encryption and Error Correction Schemes, IEEE Global Communications Conference (GLOBECOM'11), Houston, TX, USA, December, 2011.
• Q. Chai and G. Gong, BUPLE: Securing Passive RFID Communication through Physical Layer Enhancements, 7th Annual Workshop on RFID Security and Privacy (RFIDsec'11), Amherst, MA, USA, June, 2011.
• X. Fan and G. Gong, On the Security of Hummingbird-2 against Side Channel Cube Attacks, Western European Workshop on Research in Cryptology (WEWoRC 2011), July 20-22, 2011, Bauhaus-University Weimar, Germany.
• K. Mandal, X. Fan, and G. Gong, A Lightweight Pseudorandom Number Generator For EPC Class 1 Gen2 RFID Tags, Western European Workshop on Research in Cryptology (WEWoRC 2011), July 20-22, 2011, Bauhaus-University Weimar, Germany.
• M. Safkhani, N. Bagheri, M. Naderi, Y. Luo, and Q. Chai, Tag Impersonation Attack on Two RFID Mutual Authentication Protocols, First International Workshop on Lightweight Cryptography (LWCrypt 2011), Vienna, Austria, August, 2011.

### Technical Reports

• Zhu and G. Gong, Guess-then-meet-in-the-middle attacks on the KTANTAN family of block ciphers, Technical Report, CACR 2011-34, 2011, University of Waterloo, Canada.
• C. Lam, M. Aagaard and G. Gong, Hardware Implementations of Multi-output Welch-Gong Ciphers, Technical Report, University of Waterloo, CACR 2011-01.
• G. Gong, A Closer Look at Selective DFT Attacks, Technical Report, University of Waterloo, CACR 2011-35.
• Q. Chai and G. Gong, Verifiable Symmetric Searchable Encryption For Semi-honest-but-curious Cloud Servers, Technical Report CACR 2011-22, 2011.
• Q. Chai, X. Fan, and G. Gong, An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2, Cryptology ePrint Archive, Report 2011/247, also submitted to Elsevier Information Processing Letter on May, 2011.

## Selected Publications (2010)

### Slides

• Guang Gong. Lightweight Cryptography for RFID Systems. Part I, Part II, Part III. Tutorial talk at Indocrypt'10, Hyderabad, India, Dec 12th, 2010.

### Journal Articles

• N.Y. Yu and G. Gong. Multiplicative characters, the Weil bound, and polyphase sequence families with low correlation, IEEE Transactions on Information Theory, vol. 56, No. 12, Dec. 2010, pp. 6376 - 6387.
• H.G. Hu and G. Gong. New sets of zero or low correlation zone sequences via interleaving techniques, IEEE Transactions on Information Theory, vol. 56, pp. 1702-1713, Apr. 2010.
• X.H. Tang and G. Gong. New constructions of binary sequences with optimal autocorrelation value/magnitude, IEEE Transactions on Information Theory, vol. 56, No. 3, March 2010, pp. 1278-1286.
• Z.L. Wang and G. Gong. A note on the diagonalization of the discrete Fourier transform, Applied and Computational Harmonic Analysis, Vol. 28, No. 1, 2010, pp.114-120.

### Book Chapters and Refereed Conference Proceedings

• D. Engels, X.X. Fan, G. Gong, H.G. Hu, and E. M. Smith, Hummingbird: ultra-lightweight cryptography for resource-constrained devices, The 14th International Conference on Financial Cryptography and Data Security - FC 2010, LNCS 6054, R. Curtmola et al. (Eds.), pp. 3-18, January 25-28, 2010, Tenerife, Canary Islands, Spain
• K. Guo and G. Gong, New Constructions of Complete Non-cyclic Hadamard Matrices, Related Function Families and LCZ Sequences, Proceedings of Sequences and Their Applications, Lecture Notes in Computer Sciences, vol. 6338, Springer, pp. 259-269, 2010.
• Z.J. Li and G. Gong, Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks, Proceedings of 9th International Conference on Ad Hoc Networks and Wireless (ADHOC-NOW 2010), Lecture Notes in Computer Science, vol. 6288, I. Nikolaidis and K. Wu (Eds.), Berlin, Germany: Springer-Verlag, pp. 149-162, 2010.
• Q. Chai and G. Gong, A lightweight protocol to robust TID-based anti-counterfeiting, Poster Presentation at IEEE RFID 2010, Orlando, Florida, USA, April 14-15, 2010.
• H. Wen, G. Gong, and P.H. Ho, MIMO Cross-Layer Secure Communication Architecture Based on STBC, Proceedings of IEEE Global Communications Conference (GLOBECOM'10), Miami, Florida, USA, December, 2010
• Y.Y. Luo, Q. Chai, G. Gong, and X.J. Lai, WG-7, A Lightweight Stream Cipher With Good Cryptographic Properties, Proceedings of IEEE Global Communications Conference (GLOBECOM'10), Miami, Florida, USA, December, 2010.
• A. Tassanaviboon and G. Gong, A Framework Toward a Self-Organizing and Self-Healing Certificate Authority Group in a Content Addressable Network, Proceedings of the 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2010), pp. 614-621, 2010
• X.X. Fan, G. Gong, K. Lauffenburger, and T. Hicks, FPGA Implementations of the Hummingbird Cryptographic Algorithm, Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), June 13-14, 2010, California, USA. [Poster]
• X.X. Fan and G. Gong, Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks, Proceedings of the Second International Conference on Ad Hoc Networks (AdHocNets 2010), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 49, J. Zheng, D. Simplot-Ryl, and V.C.M. Leung (Eds.), Berlin, Germany: Springer-Verlag, pp. 328-343, 2010
• H.G. Hu and G. Gong, A new class of ternary and quaternary sequences with two-level autocorrelation, Proceedings of 2010 IEEE International Symposium on Information Theory (ISIT 2010), pp. 1292-1296, 2010
• N.Y. Yu and G. Gong, On the structure of M-ary Sidelnikov sequences of period p2m-1, Proceedings of 2010 IEEE International Symposium on Information Theory (ISIT 2010), pp. 1233-1237, 2010
• N.Y. Yu and G. Gong, Generalized constructions of polyphase sequence families using shift and addition of multiplicative character sequences, Proceedings of 2010 IEEE International Symposium on Information Theory (ISIT 2010), pp. 1258-1262, 2010.
• Q. Chai and G. Gong, A Lightweight Protocol to Robust TID-Based Anti-Counterfeiting (Full Paper), Technical Report CACR 2010-09, 2010.

## Selected Publications (2009)

### Journal Articles

• Z. D. Dai, G. Gong, H.Y. Song, A trace representation of binary Jacobi sequences, Discrete Mathematics, vol. 309, 2009, pp. 1517-1527.
• Y. Nawaz, K. C. Gupta, and G. Gong, Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and Construction, IEEE Transactions on Information Theory, accepted for publication in 2009.
• Honggang Hu, Guang Gong, and Denggguo Feng, New results on periodic sequences with large k-error linear complexity, IEEE Transactions on Information Theory, accepted for publication.
• H. Wen, G. Gong and P.H. H, Build-in Wiretap Channel I with Feedback and LDPC Codes, JOURNAL OF COMMUNICATIONS AND NETWORKS, Vol. 11, No. 6, pp. 538-543, 2009.

### Book Chapters and Refereed Conference Proceedings

• N.Y. Yu and G. Gong, Multiplexing realizations of the decimation-Hadamard transform of two-level autocorrelation sequences, Coding and Cryptology, Lecture Notes in Computer Science, Vol. 5557, Y.M. Chee, et al. (Eds.), Springer, 2009, pp. 248-258.
• Hong Wen and Guang Gong, A cross-layer approach to enhance the security of wireless networks based on MIMO, 43rd Annual Conference on Information Sciences and Systems (CISS 2009), March 18-20, 2009, pp. 935 - 939.
• Honggang Hu and Guang Gong, New sequence families with zero or low correlation zone via interleaving techniques, IEEE International Symposium on Information Theory (ISIT 2009), June 28-July 3, 2009, Seoul, Korea.
• Hong Wen, Pin Han Ho and Guang Gong, A Novel Framework for Message Authentication in Vehicular Communication Networks, accepted by IEEE GLOBECOMb (Globe communication conference) 2009.
• Zhijun Li and Guang Gong, DHT-Based Detection of Node Clone in Wireless Sensor Networks, Proceedings of First International Conference on Ad Hoc Networks (ADHOCNETS 2009), September 23-25, 2009, Niagara Falls, Ontario, Canada, LNICST 28, pp. 240-255.
• Zhijun Li and Guang Gong, Computationally Efficient Mutual Entity Authentication in Wireless Sensor Networks, Proceedings of First International Conference on Ad Hoc Networks (ADHOCNETS 2009), September 23-25, 2009, Niagara Falls, Ontario, Canada, LNICST 28, pp. 192-207.
• Zhijun Li and Guang Gong, Randomly Directed Exploration: An Efficient Node Clone Detection Protocol in Wireless Sensor Networks, Proceedings of IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS '09), October 12-15, 2009, Macau SAR, P.R.C, pp. 1030-1035.
• X.X. Fan, H.G. Hu, G. Gong, E. Smith and D. Engels, Lightweight Implementation of Hummingbird Cryptographic Algorithm on 4-Bit Microcontroller, to appear in the Proceedings of The 1st International Workshop on RFID Security and Cryptography 2009 (RISC'09), November 10, 2009, London, UK.

## Selected Publications (2008)

### Journal Articles

• Nam Yul Yu, and G. Gong, New binary sequences with optimal autocorrelation magnitude, IEEE Trans. on Inform. Theory. vol. 54, No. 10, pp. 4771 - 4779, Oct. 2008.
• P. Charpin and G. Gong, Hyperbent functions, Kloosterman sums and Dickson polynomials, IEEE Trans. on Inform. Theory., Vol. 54, No. 9, pp. 4230-4238, Sept. 2008.
• Z. Zhou, X.H. Tang, and G. Gong, A new class of sequences with zero or low correlation zone based on interleaving technique, IEEE Trans. on Inform. Theory. vol. 54, No. 9, pp. 4267-4273, Sept. 2008.
• K.M. Khoo, C. W. Lim, and G. Gong, Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity, Applicable Algebra in Engineering, Communication and Computing, Vol. 19, No. 4, Aug. 2008, pp. 323 - 338.
• Y. Nawaz and G. Gong, WG: A family of stream ciphers with designed randomness properties, Information Sciences, Vol. 178, No. 7, April 1, 2008, pp. 1903-1916.
• Zhijun Li and Guang Gong, Survey on Security in Wireless Sensor, Special English Edition of Journal of KIISC, Vol. 18 No.6 (B), December 2008, pp. 233-248.

### Book Chapters and Refereed Conference Proceedings

• G. Gong, Sequences, DFT and Resistance against Fast Algebraic Attacks, Sequences and Their Applications (SETA), Lecture Notes in Computer Sciences, vol. 5203, S.W. Golomb, et al. (Eds.), Springer, 2008, pp. 197-218. (Invited)
• H.G. Hu and G. Gong, A study on the pseudorandom properties of sequences generated via the additive order, Sequences and Their Applications (SETA), Lecture Notes in Computer Sciences, vol. 5203, S.W. Golomb, et al. (Eds.), Springer, 2008, pp. 51-60
• X.X. Fan, G. Gong, and D. Jao, Speeding up pairing computations on genus 2 hyperelliptic curves with efficiently computable automorphisms, Pairing-based Cryptography, Lecture Notes of Computer Sciences, vol. 5209, S.D. Galbraith, and K.G. Paterson (Eds.) Berlin, Germany, Springer-Verlag, 2008, pp. 243-264.
• X.X. Fan and G. Gong, Key revocation based on Dirichlet multinomial model for mobile ad hoc networks, the Proceedings of the Fourth IEEE LCN Workshop on Network Security (WNS 2008), Montreal, October 17, 2008. Technical Report, University of Waterloo, CACR 2008-05, Jan. 2008.
• X.X. Fan, G. Gong, and D. Jao, Efficient pairing computation on genus 2 curves in projective coordinates, Pre-proceedings of the 15th Annual Workshop on Selected Areas in Cryptography (SAC 2008), Mount Allison University, Sackville, New Brunswick, Canada on August 14-15, 2008. pp. 17-33. Technical Report, University of Waterloo, CACR 2008-03, Jan. 2008.
• H.G. Hu, G. Gong, and F.D. Guo, New results on periodic sequences with large $k$-error linear complexity, the Proceedings of International Symposium on Information Theory (ISIT 2008), July 6-11, 2008, Toronto, Canada, pp. 2409-2413.

## Selected Publications (2007)

### Journal Articles

• S.W. Golomb and G. Gong, The Status of Costas Arrays, IEEE Trans. on Information Theory, Vol. 53, No. 11, Nov. 2007, pp. 4260 - 4265.
• G. Gong, S. W. Golomb, and H.Y. Song, A note on low correlation zone signal sets, IEEE Trans. on Information Theory, Vol. 53, No. 7, July 2007, pp. 2575 - 2581.
• K.M. Khoo and G. Gong, New construction for balanced boolean functions with very high nonlinearity, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E90-A, No.1, Special Section on Cryptography and Information Security, pp.29-35, January 2007.
• X.X. Fan, T. Wollinger, and G. Gong, Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems over binary fields, IET Information Security, Vol. 1, Issue 2, June 2007, pp. 65-81.
• K. Hoeper and G. Gong, Preventing or utilizing key escrow in identity-based schemes employed in mobile ad hoc networks, International Journal of Security and Networks (IJSN), Special Issue on Cryptography in Networks, Vol.2 - Issue3/4 - 2007, pp. 239-250.

### Book Chapters and Refereed Conference Proceedings

• K. Hoeper and G. Gong. Pre-Authentication and Authentication Models in Ad Hoc Networks, book chapter in Wireless Network Security, edited by Y. Xiao, X. (Sherman) Shen, and D.-Z. Du, Springer Verlag, ISBN: 978-0-387-28040-0, 2007.
• K. Hoeper and G. Gong, Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes, book chapter in Security in Distributed and Networking Systems, Y. Xiao and Y. Pan (Eds.), World Scientific Publishing Co., 2007, in the book series on Computer and Network Security.
• Y. Nawaz and G. Gong, Distributing fixed time slices in heterogeneous networks of workstations (NOWs), The Proceedings of the Fifth International Symposium on Parallel and Distributed Processing and Applications (ISPA07), August 29 - 31, 2007, Lecture Notes in Computer Sciences, Stojmenovic et al. (Eds.), Vol. 4742, pp. 612-621, Springer-Verlag, 2007.
• Xinxin Fan and G. Gong, Efficient explicit formulae for genus 2 hyperelliptic curves over prime fields and their implementations, the Proceedings of Selected Areas in Cryptography, August 16-17, Ottawa, Canada. Lecture Notes in Computer Science, Adams et al. (Eds), Vol. 4876, pp. 155-172, Springer-Verlag, 2007.
• S.W. Golomb and G. Gong, Actions of the unitary group on irreducible/primitive polynomials and their applications to randomness of sequences, the Proceedings of 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, July 1 ?6, 2007, Bergen, Norway.
• G. Gong, Correlation of multiple bent function signal sets, invited talk, the Proceedings of 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, July 1 ?6, 2007, Bergen, Norway.
• G. Gong, Constructions of multiple shift-distinct signal sets with low correlation, Proceedings of International Symposium on Information Theory (ISIT 2007), June 24 - June 29, 2007, Nice, France, pp.2306-2310.
• S. Rønjom, G. Gong and T. Helleseth, On attacks on filtering generators using linear subspace structures, Sequences, Subsequences, and Consequences, Lecture Notes in Computer Science, S.W. Golomb et al. (Eds.), Vol. 4893, pp. 204-217, Springer-Verlag, 2007.
• G. Gong, Randomness and representation of span n sequences, Sequences, Subsequences, and Consequences, Lecture Notes in Computer Science, S.W. Golomb et al (Eds.), Vol. 4893, pp. 192-203, Springer-Verlag, 2007
• N.Y. Yu and G. Gong, The Perfect Binary Sequence of Period 4 for Low Periodic and Aperiodic Autocorrelations, Sequences, Subsequences, and Consequences, Lecture Notes in Computer Science, S.W. Golomb et al. (Eds.), Vol. 4893, pp. 37-49, Springer-Verlag, 2007.
• Y. Nawaz and K. C. Gupta and G. Gong, Efficient techniques to find algebraic immunity of s-boxes based on power mappings, Proceedings of International Workshop on Coding and Cryptography, April 16-20, 2007, Versailles, France, pp.237-246.

## Selected Publications (2006)

### Research Papers

• K,M.Khoo and G. Gong, New construction for balanced boolean functions with very high nonlinearity, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, vol. E90-A, No.1, Special Section onCryptography and Information Security, pp.29-35, January 2007.
• G.Gong and H.Y. Song, Two-tuple balance of non-binary sequences with ideal 2-level autocorrelation, Discrete Applied Mathematics, Volume: 154, Issue: 18, December 1, 2006, pp. 2590-2598.
• A.Youssef, S. E. Tavares, and G. Gong, On Some Probabilistic Approximations forAES-like S-boxes, Discrete Mathematics, Vol. 306,pp.2016-2020, 2006.
• N.Y.Yu and G. Gong, New family of binary sequences with low correlation and large size, IEEE Trans. on Inform. Theory, vol. 52, No. 4, pp. 1624-1636, April 2006. Technical Report, CACR 2005-29, Universityof Waterloo, Aug. 2005.
• N.Y.Yu and G. Gong, Constructions of quadratic bent functions, IEEE Trans. on Inform.Theory, vol. 52, No. 7, pp. 3291-3299, July 2006. Technical Report, CACR2005-29, University of Waterloo,Aug. 2005.
• A.M.Youssefand G. Gong, On the linear complexity of sequences over $GF(2^n)$, Theoretical ComputerScience, Vol.352, Issues 1-3 , March 2006, pp. 288-292.
• K. Khoo, G. Gong,and D. R. Stinson, A new characterization of semi-bent and bent functions on finite fields, Designs,Codes, and Cryptography, vol. 38-2, February 2006, pp. 279-295.
• Katrin Hoeper and Guang Gong, Key revocation for identity-based schemes in mobile ad hoc networks, Proceedings of 5th International Conference on AD-HOC Networks and Wireless -AD HOCNOW, Lecture Notes in Computer Science, T. Kunz and S.S. Ravi (Eds.), Vol.4104, pp.224 ¨C 237, Springer-Verlag, 2006.
• Nam Yul Yu and Guang Gong, Realizations from decimation Hadamard transform for special classes of binary sequences with two-level autocorrelation, Coding and Cryptography, Lecture Notes in Computer Science, T. Helleseth et al. (Eds.), vol. 3969,Springer-Verlag,pp. 371-385, 2006.
• Nam Yul Yu and Guang Gong, Cross correlation properties of binary sequences with ideal two-level autocorrelation, Sequences and Their Applications (SETA06), LNCS, G. Gong et al. (Eds.), vol.4086, Springer-Verlag, pp. 104-118.
• Kenneth Giuliani and Guang Gong, A new algorithm to compute remote terms in special types of characteristic sequences, Sequences andTheir Applications, LNCS, G. Gong et al.(Eds.), vol. 4086,Springer-Verlag, pp. 242-252.
• Y. Nassir, G. Gong, and K.C. Gupta, Upper bounds on algebraic immunity of boolean power functions, Fast Software Encryption, Lecture Notes in Computer Science (LNCS), M. Robshaw (Ed.), vol. 4047, pp. 375-389, Springer,2006.
• Guang Gong, Solomon W. Golomb, and Hong-Yeop Song, A Note on Low Correlation Zone SignalSets, 40th Annual Conference of Information Sciences and Systems(CISS 2006), March 22-24, 2006, Princeton University, Technical Co-Sponsorship With IEEE Information Theory Society. Technical Report, CACR 2006-06, University of Waterloo, January 2006.
• N.Y.Yu and G. Gong, Interleaved construction of binary sequences with optimal autocorrelation magnitude, Proc. of IEEE Information Theory Workshop (ITW), pp. 530-534, Chengdu, China, Oct. 22-26, 2006.
• Katrin Hoeper and Guang Gong, Integrated DH-like key exchange protocols from LUC, GH and XTR, Proceedings of International Symposium on Information Theory(ISIT 2006),July 9 - July 14, 2006, Seattle, Washington.
• N.Y.Yu and G. Gong, Quadratic bent functions of polynomial forms and their applications to bent sequences, Proc. of 23rd Biennial Symposium on Communication, pp. 128 - 131, Kingston, Ontario, Canada,May 30 -June 1, 2006.

### Technical Reports

• X.Fan, T. Wollinger andG. Gong, Efficient explicit formulae for genus 3 hyper elliptic curve cryptosystems, CACR 2006-38, University of Waterloo, Canada,Dec. 2006.
• Y.Nawaz, K. Gupta and G.Gong, Algebraic immunity of S-boxes based on power mappings: Analysis andconstruction, CACR 2006-34, University of Waterloo, Canada, Oct. 2006.
• N.Y.Yul and G. Gong, On asymptotic optimality of binary sequence families, CACR2006-28, University ofWaterloo, Canada, May 2006.
• G.Gong, Design of SignalSets with Low Interference for CDMA Applications in Networking Environment,CACR 2006-05, University of Waterloo, Canada, Jan., 2006.

## Selected Publications (2005)

### Journal Articles and Referred Conference Proceedings

• K. Giuliani and G. Gong, New LFSR-based cryptosystems and the trace discrete logarithm problem (Trace-DLP), Sequences and Their Applications, Tor Helleseth et al. (Eds.), Lecture Notes in Computer Science, vol. 3486, Springer-verlag, 2005, pp. 298-312.
• Katrin Hoeper and Guang Gong, Pre-Authentication and Authentication Models in AdHocNetworks, Wireless and Mobile Network Security, Y.Xiao et al. (Eds.), Springer-verlag 2006.
• Shaoquan Jiang and Guang Gong, A Round and Communication Efficient Secure Ranking Protocol, RSA Conference2006, Cryptographers' Track, February 13-17. D. Pointvheval (Ed.), Lecture Notes in Computer Science, vol. 3860, Springer-verlag,2006, pp.350-364.
• Guang Gong, Kishan Chand Gupta, Martin Hell, and Yassir Nawaz, Towards a General RC4-like Keystream Generator, SKLOIS Conference on Information Security and Cryptology (CICS05), December15-17, Beijing, China. Springer-verlag, 2006.
• N. Y. Yu and G. Gong, Realization of decimation-Hadamard transform for binary generalized GMW sequences, Proceedings of Workshop on Coding and Cryptography (WCC2005), pp.127-136,Bergen, Norway, March 14-18. 2005. Technical Report, CORR 2005-08, University of Waterloo, Apr. 2005. Springer-verlag, 2006.
• F. Chiu, N. Y. Yu, and G. Gong, Maximum correlationof binary signals over fading channels, Proceedings ofInternationalSymposium on Information Theory (ISIT 2005), Adelaide, Australia, September4-9. 2005.
• Khoongming Khoo, Guang Gong, Guat-Ee Tan, and Hian-KiatLee, Comparison of boolean function design, Proceedings of International Symposium on Information Theory (ISIT 2005), Adelaide, Australia,September 4-9. 2005.
• Katrin Hoeper and Guang Gong, Limitations of Key Escrow in Ad Hoc Networks, Proceedings of first International Conference on Security and Privacy for Emerging Areas in Communication Networks, Athens, Greece, September 5-9, 2005.
• N. Y. Yu and G. Gong, Higher order autocorrelation of binary sequences with ideal two-level autocorrelation, Proceedings of Canadian Workshop on Information Theory (CWIT'05), pp. 391 - 394, Montreal, Canada, June 5-8, 2005.
• Yassir Nawaz and Guang Gong, Algebraic immunity of some cryptographic Boolean functions, Proceedings of Canadian Workshop on Information Theory (CWIT'05), pp.371-374, Montreal, Canada, June 5-8, 2005.
• Katrin Hoeper and Guang Gong, Identity-Based Key Exchange Protocols for Ad Hoc Networks, Proceedings of Canadian Workshop on Information Theory (CWIT '05), Montreal, Canada, Jun 5-8, 2005.
• L. Xiao, S. Tavares, A. Youssef, and G. Gong, Improved Cascaded Stream Ciphers Using Feedback, Proceedings of 18th Annual Canadian Conference onElectrical and Computer Engineering (CCECE'05), May 1-4, 2005, Saskatoon, Canada.
• Yassir Nawaz and Guang Gong, The WG Steam Cipher, Proceedings of the Symmetric Key Encryption Workshop,May 25-26, Arhus, Denmark,2005. Also submitted to ECRYPTSTREAM CIPHERPROJECT. Technical Report,_ CACR 2005-15, University of Waterloo, April2005.

### Technical Reports

• K. Hoeper and G. Gong, Efficient Key Exchange Protocols for Wireless Networks and Mobile Devices, Technical Report, CARR 2005.
• N. Yu and G. Gong, Realizations of Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation, Technical Report, University of Waterloo, CACR2005-14.
• Guang Gong, Design of Signal Sets with Low Interference for CDMA Applications in Networking Environment, Technical Report, CACR 2006-5, University of Waterloo

## Selected Publications (2004)

### Research Papers

• G.Gong and S.Q. Jiang, Editing Generator and its Cryptanalysis, Special issue on Multimedia Networking and Wireless Communications, International Journal of Wireless and Mobile Computing, Inderscience Publishers, 2004.
• ZongDuo Dai, Shaoquan Jiang, Kyoki Imamura and Guang Gong, Asymptotic Behavior of Normalized Linear Complexity of Ultimately Non-periodic sequences, IEEE Trans. on Inform. Theory, vol.50, No.11, November 2004, pp.2911-2915.
• Shaoquan Jiang and Guang Gong, Password Based Key Exchange with Mutual Authentication, Selected Area in Cryptography, August 2004, Waterloo, Canada, pre-proceeding, pp. 291-306. H.Handschuh et al. (Eds.), Lecture Notes in Computer Science, vol.3357, Springer-verlag, pp. 267-279.
• Shaoquan Jiang and Guang Gong, Multi-service Oriented Broadcast Encryption, Australian Conference on Information Security and Privacy, H.Wang. et al (Eds.), LNCS 3108, Springer-verlag, pp. 1-12. 2004.
• K.Giuliani_and G. Gong, Efficient key agreement and signature schemes using compact representation in $GF(p^{10})$ (full version), IEEE International Symposium on Information Theory, June28 - July 2, 2004, Chicago, IL.
• K. Giulianiand G. Gong, New LFSR-based cryptosystems and the trace discrete logarithm problem, the third international conference on sequences and their applications (SETA'04), October 25 - 29, 2004 in Seoul, South Korea. Full paper at Lectures Notes in Computer Science, Springer.
• C.Y. Lam and G. Gong, A Lower Bound for the Linear Span of Filtering Sequences, Proceedings of conference on State of the Art of Stream Ciphers, pp. 220-233, October 14-15, 2004, Brugge, Belgium.
• Guang Gong, Randomness and Discrepancy Transforms, Progress on Cryptography, K.F. Chen (Ed.), Kluwer Academic Publishing, pp. 1-8, 2004.

### Technical Reports

• Y. Kim, H. Song and G. Gong, Cross correlation of q-ary Power Residue Sequences of Period p is Upper Bounded by $sqrt(p)+2$, Technical Report, University of Waterloo, CACR 2004-07.
• G. Gong, On Existence and Invariant of Algebraic Attacks, Technical Report, University of Waterloo, CACR 2004-17.
• K. Hoeper and G. Gong, Models of Authentication in Ad Hoc Networks and Their RelatedNetwork Properties, Technical Report, University of Waterloo, CACR 2004-03.

## Selected Publications (2003)

### Papers in books

• K. M. Khoo and G. Gong, New constructions for resilient and highly nonlinear boolean functions, Information Security and Privacy, Lectures Notes in Computer Science, R. Safavi-Naini and J.Seberry (Ed), Springer-Verlag, 2003, vol.2727, pp. 498-509. Technical Report, University of Waterloo,CACR 2003-10.
• G. Gong, Array correlation and sequences with equal magnitude correlation, Mathematical Properties of Sequences and Other Combinatorial Structures, J.-S. No, H.-Y. Song, T. Helleseth, and V.Kumar (Ed), Kluwer Academic Publishers, NewYork, 2003, pp. 33-43.
• Shaoquan Jiang and Guang Gong, On Edit Distance Attack to Alternating Step Generator, Mathematical Properties of Sequences and Other Combinatorial Structures, J.-S. No, H.-Y. Song, T. Helleseth, and V.Kumar (Ed), Kluwer Academic Publishers, New York, 2003, 85-92.
• J. H. Kim,H. Y. Song, and G. Gong, Trace Function Representation of Hall's Sextic Residue Sequences of Period $p \equiv 7 ~\mbox{(mod$8$)}$, Mathematical Properties of Sequences andOther Related Structures, J. S. No,H. Y. Song, T. Helleseth, and V. Kumar (Ed), Kluwer Academic Publishers, NewYork, 2003, pp.23-32.
• C. C.Y. Lam, G. Gong, and S. A. Vanstone, Message authentication codes with error correcting capabilities, Information and Communications Security, Lectures Notes in Computer Science, R. Deng, S. Qing, F.Bao, and J. Zhou(Ed). Berlin, Springer-Verlag, vol. 2513. CACR 2002-19.

### Referred Conference Proceedings

• G. Gong and K.M. Khoo, Additive autocorrelation of resilient boolean functions, the Proceedings of TenthAnnual Workshop on Selected Areas in Cryptography, August 11-12,2003, Ottawa, Canada, Lectures Notes in Computer Science (LNCS), M. Matrui and R. Zuccherato (Ed.), Berlin, Springer-Verlag, vol. 3006.
• G. Gong and S.Q. Jiang, The editing generators and its cryptanalysis, the Annual International Workshop on Cryptology and Network Security, September 24-26, 2003, Miami, Florida, USA, the proceedings integrated in the Proceedings of the Ninth International Conference on Distributed Multimedia Systems, pp. 673-678.
• G. Gong and H.Y. Song, Two-Tuple-Balance of Non-Binary Sequences with Ideal Two-Level Autocorrelation, Proceedings of 2003 IEEE International Symposium onInformation Theory (ISIT2003), June 29-July 4, 2003, Yokohama, Japan, pp.404.
• Z. D. Dai, G. Gong and H. Y. Song, Trace Representation of Binary Jacobi Sequences, Proceedings of 2003 IEEE International Symposium on Information Theory (ISIT2003), June 29-July 4, 2003, Yokohama, Japan, pp.379.
• Z. D. Dai, G. Gong and H.Y. Song, Trace Representation of Binary e-th ResidueSequence of Period p, Proceedings of 2003 IEEE International Symposium on Information Theory (ISIT2003), June 29-July 4, 2003, Yokohama, Japan, pp.378.
• K. M. Khooand G. Gong, Highly nonlinear s-boxes with reduced bound on maximum correlation, Proceedings of 2003 IEEE International Symposium on Information Theory (ISIT2003), June 29-July 4, 2003, Yokohama, Japan, pp. 254, full paper.
• Z. D. Dai, G. Gong and H.Y. Song, Trace representation and linear complexity of binary e-th residue sequences, Proceedings of International Workshop on Coding and Cryptography (WCC2003), March 24-28, 2003, Versailles, France, pp.121-133.

## Selected Publications (2002)

### Referred Conference Proceedings

• Khoongming Khoo, Guang Gong and Douglas R. Stinson, A new family of Gold-like sequences, IEEE International Symposium on Information Theory, Lausanne, Switzerland, June 30-July 5, 2002.
• Guang Gong, Zongduo Dai and Solomon W. Golomb, On existence of 2-level autocorrelation sequences realized from the decimation-Hadamard transformation, 2002 IEEE International Symposium on Information Theory, Lausanne, Switzerland,June 30-July 5, 2002.
• G. Gong, Array correlation and sequences with equal magnitude correlation, Golomb Symposium, University of Southern California, Los Angeles, May 30 - June2, 2002.

### Technical Reports

• C.Y. Lam and Guang Gong, Randomness of Elliptic Curve Sequences, CACR 2002-18.
• Guang Gong and Hong-Yeop Song, Two-Tuple Balance of Non-Binary Sequences with Ideal Two-Level Autocorrelation, CACR 2002-20.
• Jeong-Heon Kim, Hong-Yeop Song and Guang Gong, Trace Function Representation of Hall's Sextic Residue Sequences of Period $p \equiv 7 (mod 8)$, CACR 2002-23.
• Guang Gong, Anwar Hasan, Huapeng Wu, and Amr Youssef, An Efficient Algorithm for Exponentiation in DH Key Exchange and DSA inCubicExtension Fields, CACR 2002-27.
• Shaoquan Jiang and Guang Gong, On Edit Distance Attack to Alternating Step Generator, CACR 2002-28. Published in Mathematical Properties of Sequences and Other Combinatorial Structures, J. S. No, H. Y. Song, T. Helleseth, and V. Kumar (Ed), Kluwer Academic Publishers, New York, 2003, pp. 85-92.
• Shaoquan Jiang and Guang Gong, Cryptanalysis of Stream Cipher -- A Survey, CACR 2002-29.
• Shaoquan Jiang and Guang Gong, The Editing Generator and Its Cryptanalysis, CACR 2002-30

## Selected Publications (2001)

### Journal Articles

• Z.D. Dai, G. Gong and D.F. Ye, Cascaded GMW functions and its classification, Sciences in China (Series A), vol.44, No.6, pp.709-71, June 2001.
• Z.D. Dai, J.H. Yang, D.F. Ye, G.Gong, Cryptanalysis of the original and the revised Xinmei digital signature scheme, Electronics Letters, vol.37, No.4, pp.220, March 2001.
• T.W. Cusick and G. Gong, A conjecture onbinary sequences with the "trinomial property", IEEE Trans. on Inform. Theory, vol. 47, No. 1, January 2001, pp. 426-427.

### Referred Conference Proceedings

• A.M. Youssef and G. Gong, Cryptanalysis of a public-key cryptosystem proposed at ACISP2000, Information Securityand Privacy, Lectures Notes in Computer Science, Vijay Varadharajan and Yi Mu (Ed.), Berlin, Springer-Verlag, 2001, vol. 2119, pp. 15-20.
• K. J. Giuliani and G. Gong, Generating large instances of the Gong-Harn cryptosystems, Conference on Cryptography and Coding, Dec.17-19, 2001, Cirencester,UK.
• A.M. Youssef and G. Gong, Boolean functions with large distance to all bijective monomials: N odd case, the Proceedings of the Eighth Annual Workshop on Selected Areas in Cryptography, Toronto, August16-18, 2001. CACR 2001-57
• G. Gong, L. Harn and H.P. Wu, The GH public-key cryptosystems, the Proceedings of the Eighth Annual Workshop on Selected Areas in Cryptography, Toronto, August16-18, 2001. CACR 2001-35.
• S.W. Golomb and G. Gong, Hyper-Cyclotomic Algebra, Sequences and their Applications, Proceedings of SETA'01, Discrete Mathematics and Theoretical ComputerScience, Springer, 2001, pp.154-165. CACR 2001-33.
• G. Gong and Charles C.Y. Lam, Recursive sequences over elliptic curves, Sequences and their Applications, Proceedings of SETA'01, Discrete Mathematics and TheoreticalComputerScience, Springer,2001, pp. 182-196. CACR 2001-35.
• Z.D. Dai, J.H. Yang, G. Gong and P. Wang, Linear complexities of generalized Legendre sequences, Sequences and their Applications, Proceedings of SETA'01, DiscreteMathematics and Theoretical Computer Science, Springer, 2001, pp. 145-153. CACR 2001-34.
• A.M. Youssef and G. Gong, Hyper-Bent Functions, Advances in Cryptology- Eurocrypto'2001, Lecture Notes in Computer Science 2045, Springer, 2001, pp. 406-419. CACR 2001-58.
• M. Ludkovski and G. Gong, New families of ideal 2-level autocorrelation ternary sequences from second order DHT, Proceedings of the second International Workshop in Coding and Cryptography, January 8-12, 2001, Paris, France, pp.345-354

## Selected Publications (1984 - 2000)

### Slides of Talks

• The GH Public-key Cryptosystem, October 2000, Queen's University.
• On Welch-Gong Transformation Sequence Generators, the Seventh Annual Workshop on Selected Areas in Cryptography, August2000, Waterloo.
• Inverse Hadamard Transforms of Two-Level Autocorrelation Sequences, ISIT 2000, June 2000, Sorrento.

### Journal Articles

• Shaoquan Jiang, Z. T. Dai and G. Gong, Notes on q-ary interleaved sequences, Chinese Sci. Bull. 45 (2000), no. 6, 502-507.
• S. W. Golomb, G. Gong and Z.D. Dai, ,Cyclic inequivalence of cascaded GMW sequences, Discrete Mathathematics, vol. 219 (2000), pp. 279-285. Technical Report, University of Waterloo, CACR 98-37.
• Anchang Chang, P. Gaal, S. W. Golomb, Guang Gong,Tor Helleseth, and P. Vijay Kumar, On a conjectured ideal autocorrealtion sequences and a realted triple error correcting cyclic code, IEEE Trans. on Inform. Theory, vol. 46, No. 2, March 2000, pp.680-686.
• G. Gong, Z.T. Dai and S.W. Golomb, Criterion and Counting for Cyclically shift distinct q-ary GMW sequences of period qn-1, IEEE Trans. on Inform. Theory, vol. 46, No.2, March 2000, pp. 474-484. Technical Report, University of Waterloo, CACR 99-13.
• L. Harn, H.-Y. Lin and G. Gong, Bounded-to-unbounded poker game, Electronics Letters, vol.36, No. 3, February 2000, pp. 214-215.
• G. Gong and L. Harn, Public-key cryptosystems based on cubic finite field extensions, IEEE Trans. on Inform. Theory, vol. 45, No.7, November 1999, pp. 2601-2605.
• G. Gong and S.W. Golomb, Transform Domain Analysis of DES, IEEE Trans. on Inform. Theory, vol. 45, No.6, September 1999, pp. 2065-2073.
• G. Gong and S.W. Golomb, Hadamard Transforms of Three Term Sequences, IEEE Trans. on Inform. Theory, vol. 45, No. 6, September 1999, pp. 2059-2060.
• Z.T. Dai, S.W. Golomb, and G. Gong, Generating all linear or thomorphism without repetitions, Discrete Mathematics, 205 (1999), pp. 47-55.
• S.W. Golomb and G. Gong, Periodic sequences with the "Trinomial Property", IEEE Trans. on Inform. Theory, vol. 45, No.4, May 1999, pp. 1276-1279.
• G. Gong and S.W. Golomb, Binary Sequences with Two-Level Autocorrelation, IEEE Trans. on Inform. Theory, vol. 45, No.2, March 1999, pp.692-693.
• J.S. No, S.W. Golomb, G. Gong, H.K. Lee, and P.Gaal, New binary pseudo-random sequences of period $2^n - 1$ with ideal autocorrelation, IEEE Trans. on Inform. Theory, vol. 44, No. 2, March 1998, pp. 814-817.
• L. Harn and G. Gong, Digital signature with subliminal channel, IEE, Proc. Comput. Digital Tech. , vol. 144, No. 5, September 1997.
• G. Gong and Z.D Dai, On constructions of SAC permutation polynomials, Systems Science and Mathematical Sciences, vol. 10, No. 2, 1997, pp. 120-128.
• G. Gong, A new class of q-ary PN sequences, IEEE Trans.on Inform. Theory, vol. 43, N0. 3, May 1997,pp. 1007-1012.
• G. Gong, On q-ary cascaded GMW sequences, IEEE Trans. on Inform. Theory, vol. 42, No.1,January 1996, pp. 263-267.
• G. Gong, Theory and applications of q-ary interleaved sequences, IEEE Trans. on Inform. Theory, vol. 41, No. 2, March 1995, pp. 400-411.
• G. Gong, G.Z. Xiao, Synthesis and uniqueness of m-sequences over GF(q^n) as n-phase sequences over GF(q), IEEE Trans. on Communications, vol. 42, No.8, August 1994.
• G. Gong, A.Di Porto, W. Wolfowicz, Galois linear group sequences, LA COMUNICAZIONE, Note Recensioni Notizie, vol. XLII,J uly-December 1993, pp. 83-89.
• G. Gong, Solving phase sets of nonlinear feed forward sequences with maximal linear complexity, Science Bulletin of China, China, No. 7, April 1991, pp. 551-554, (in Chinese).
• G. Gong, Spectral analysis and algorithm of nonlinear feed forward generators, J. of China Institute of Communications, vol. 12, No. 6, Nov. 1991. pp. 61-64. (In Chinese)
• G. Gong, Runs, component sequences and vector sequences of m-sequences over Galois fields, ACTA ELECTRONICS SILICA, vol. 14, No. 4, July 1986, pp. 94-100, (inChinese).

### Referred Conference Proceedings

• G. Gong and A. Youssef, On Welch-Gong Transformation Sequence Generators, the Proceedings of the Sevenh Annual Workshop on Selected Areas in Cryptography, August 2000, Waterloo, Canada.
• G. Gong and S.W. Golomb, Inverse Hadamard transforms of two-level autocorrelation sequences, Proceedings of 2000 IEEE International Sumposium on Information Theory, June 2000, Sorrento, Italy, pp. 300.
• A.M. Youssef and G. Gong, On the Interpolation Attacks on Block Ciphers, Proceedings of the Fifth Conference on Fast Software Encryption, March 2000, New York. Technical Report, University of Waterloo, CACR 99-64, December 1999.
• S. W. Golomb, G. Gong, and L. Mittenthal, Constructions of or thomorphisms of $Z_2^n$ numbers, Proceedings of the Fifth International Conference on Finite Fields and Applications, August 2-6, 1999, Augsburg, Germany.
• G. Gong, T. Berson and D. Stinson, Elliptic curve pseudo-random sequence generator, the Proceedings of the Sixth Annual Workshop on Selected Areas in Cryptography, August9-10, 1999, Kingston, Canada.
• L. Harn, H.Y. Lin, and G. Gong, A global key recovery system, the Proceeding of the International Workshop on Cryptographic Techniques & E-Commerce, July 5-8, 1999, Hong Kong, pp. 81-86.
• L. Harn and G. Gong, Elliptic curve digital signatures and accessories, the Proceedings of the International Workshop on Cryptographic Techniques & E-Commerce, July 5-8, 1999, Hong Kong, pp. 126-131.
• Shaoquan Jiang, Zongduo Dai and Guang Gong, Notes on q-ary interleaved sequences, International Conference on Sequences and their Applications, December 14-17, 1998, Singapore.
• Anchang Chang, S. W. Golomb, Guang Gong and P. Vijay Kumar, On the linear span of ideal autocorrelation sequences arising from the Segre hyperoval, the Proceedings of International Conference on Sequences and their Applications, December 14-17, 1998, Singapore.
• P. Gaal, S.W. Golomb, G. Gong, and P.V. Kumar, On a sequence conjectured to have ideal 2-level autocorrelation function, the Proceedings of 1998 IEEE International Symposium on Information Theory, August 16-22 1998, MIT, Cambridge, MA.
• S.W. Golomb and G. Gong, Investigation of periodic sequences with the "TrinomialProperty", the Proceedings of 1998 IEEE International Symposium on Information Theory, August 16-22, 1998, MIT, Cambridge, MA.
• G. Gong and L. Harn, A new approach for public key distribution, the Proceedings of China-Crypto'98, May 1998, Chengdu, China.
• G. Gong, P. Gaal and S.W. Golomb, A suspected infinity class of cyclic Hadamard difference sets, the Proceedings of 1997 IEEE Information Workshop, July 6-12, 1997, Longyearbyen, Svalbard, Norway.
• G. Gong and L. Harn, Efficiency Lucas-type public key cryptosystems, the Proceedings of 1996 International Conference on Cryptology and InformationSecurity, Dec. 19-21, 1996.
• X.G. Chang, Z.D. Dai, G. Gong, Some cryptographic properties of exponential functions, Advanced in Cryptology - ASIACYPTO'94, Springer's Lecture Notes in Computer Science, Nov.1994.
• X.G. Chang, Z.D. Dai, G. Gong, Some cryptographic properties of exponential functions, Proceedings of ChinaCrypt'94 , Nov.1994. (In Chinese)
• G. Gong, GMW-type permutation polynomial sequences, the Proceedings of ChinaCrypt'94, Nov. 1994. (In Chinese)
• G. Gong, A new class of sequences: mapping sequences, the Proceedings of the 10th International Symposium of Applied Algebra, Algebraic Algorithms and Error Correcting Codes, Lecture Notesin Computer Science, May 1993.
• G. Gong, A. Di Porto, and W. Wolfowicz, Performance testing of Galois linear group sequences, the Proceedings of the 3rd Symposium of State and Progress of Research in Cryptography, February 1993, Rome, Italy, pp.90-105.
• G. Gong, Non linear generators of binary sequences with controllable complexity and double key, Advanced in Cryptology - AUSCRYPT'90, Springer's Lecture Notes in Computer Science453, January 1990,pp. 32-35.
• G. Gong, Quadratic span of feedback shift register sequences, the Proceedings of the 2nd Symposium of State and Progress of Research in Secure Communications, September 1990 (in Chinese).
• G. Gong, An new public-key cryptosystem based on matrix rings, the First National Conference of Cryptography, October1984, Xian (in Chinese). This paper received the best research paper award in 1984 from the Chinese Institute of Electronics

### Technical Reports

• G. Gong and S.W. Golomb, A Construction of Latin Squares of Orders 16, 32 and 64, Technical Report, Teledyne Electronic Technologies, May 1997.
• G. Gong, A. Di Porto, and W. Wolfowicz, A public key cryptosystem based on Dickson permutation polynomials in finite fields, FUB report: 3T04492, October 1992.
• G. Gong and A. M. Youssef, On the Welch-Gong transformation sequence generators, submitted to IEEE Trans. on Inform. Theory. May 2000. Technical Report, University of Waterloo, CACR 2000-30, May 2000.
• A. M. Youssef and G. Gong, On the quadratic span of binary sequences, Technical Report,University of Waterloo, CACR 2000-20, March 2000.
• G. Gong, Discrepancy transforms and their applications, Technical Report, University ofWaterloo, CACR 99-60, August 1999.
• L. Harn, G. Gong, and H.Y. Lin, A public-key cryptosystem based on LFSR state-space, Aug. 1998.

### Textbook

• Abstract Algebra for Electrical Engineering and Computer Science, Printed by the Administration Office for Graduate Students, University of Electronic Science and Technology of China (UESTC), Chengdu, China. Used for graduate students in UESTC from 1987 to 1995.

### Translation

• As a co-translator, translated the English version of the following book into Chinese: The I Ching and the Genetic Codes ---- the Hidden Key to Life, Martin Schonberger, ASI Publishers Inc., 1979. Xi Dian University Press, 1993. Originally published in German as Verborgener Schlussel zum Leben, 1973 by O.W.Barth Berlag, Munchen.