Guang Gong

Ontology type: schema:Person     

Person Info





Publications in SciGraph latest 50 shown

  • 2022-06-15 Homomorphic Evaluation of Lightweight Cipher Boolean Circuits in FOUNDATIONS AND PRACTICE OF SECURITY
  • 2022-06-15 Implementation of Lightweight Ciphers and Their Integration into Entity Authentication with IEEE 802.11 Physical Layer Transmission in FOUNDATIONS AND PRACTICE OF SECURITY
  • 2021-07-21 Correlation Power Analysis and Higher-Order Masking Implementation of WAGE in SELECTED AREAS IN CRYPTOGRAPHY
  • 2021-02-27 Pisces: A New Zero-Knowledge Protocol for Blockchain Privacy in FOUNDATIONS AND PRACTICE OF SECURITY
  • 2020-04-29 PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model in PUBLIC-KEY CRYPTOGRAPHY – PKC 2020
  • 2020-04-17 U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme in FOUNDATIONS AND PRACTICE OF SECURITY
  • 2020-04-17 Lempel-Ziv Compression with Randomized Input-Output for Anti-compression Side-Channel Attacks Under HTTPS/TLS in FOUNDATIONS AND PRACTICE OF SECURITY
  • 2019-05-16 The Fourier spectral characterization for the correlation-immune functions over Fp in CRYPTOGRAPHY AND COMMUNICATIONS
  • 2019-04-14 Securing Internet-of-Things in FOUNDATIONS AND PRACTICE OF SECURITY
  • 2018-12-30 Rapid Hardware Design for Cryptographic Modules with Filtering Structures over Small Finite Fields in ARITHMETIC OF FINITE FIELDS
  • 2018-05-05 Error analysis of weak Poly-LWE instances in CRYPTOGRAPHY AND COMMUNICATIONS
  • 2018-04-12 Secure simultaneous bit extraction from Koblitz curves in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2017-12-23 sLiSCP: Simeck-Based Permutations for Lightweight Sponge Cryptographic Primitives in SELECTED AREAS IN CRYPTOGRAPHY – SAC 2017
  • 2017-11-25 MILP-Based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher in CRYPTOGRAPHY AND CODING
  • 2017-08-08 On ideal t-tuple distribution of filtering de Bruijn sequence generators in CRYPTOGRAPHY AND COMMUNICATIONS
  • 2017-03-09 On the Multi-output Filtering Model and Its Applications in CODES, CRYPTOLOGY AND INFORMATION SECURITY
  • 2016-02-10 On algebraic immunity of trace inverse functions on finite fields of characteristic two in JOURNAL OF SYSTEMS SCIENCE AND COMPLEXITY
  • 2015-11-06 New Message Authentication Code Based on APN Functions and Stream Ciphers in NETWORK AND SYSTEM SECURITY
  • 2015-09-01 The Simeck Family of Lightweight Block Ciphers in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS -- CHES 2015
  • 2015-06-26 Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions in CRYPTOGRAPHY AND COMMUNICATIONS
  • 2014-11-28 Quadratic zero-difference balanced functions, APN functions and strongly regular graphs in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2014-11-18 A Simple Construction of Almost Perfect Quinary ASK and QAM Sequences in SEQUENCES AND THEIR APPLICATIONS - SETA 2014
  • 2014-11-10 Generating Good Span n Sequences Using Orthogonal Functions in Nonlinear Feedback Shift Registers in OPEN PROBLEMS IN MATHEMATICS AND COMPUTATIONAL SCIENCE
  • 2014-09-10 More constructions of differentially 4-uniform permutations on F22k in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2014-08-26 Sequences with good correlation property based on depth and interleaving techniques in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2014-06-15 Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64 in CRYPTOGRAPHY AND COMMUNICATIONS
  • 2014-01-17 Novel last passage time based jitter model with application to low slew rate/high noise ring oscillator in ANALOG INTEGRATED CIRCUITS AND SIGNAL PROCESSING
  • 2013-10-13 Optimal parameters for the WG stream cipher family in CRYPTOGRAPHY AND COMMUNICATIONS
  • 2013-08-28 Resilience to distinguishing attacks on WG-7 cipher and their generalizations in CRYPTOGRAPHY AND COMMUNICATIONS
  • 2013 WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices in QUALITY, RELIABILITY, SECURITY AND ROBUSTNESS IN HETEROGENEOUS NETWORKS
  • 2013 Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation in CRYPTOLOGY AND NETWORK SECURITY
  • 2013 Filtering Nonlinear Feedback Shift Registers Using Welch-Gong Transformations for Securing RFID Applications in QUALITY, RELIABILITY, SECURITY AND ROBUSTNESS IN HETEROGENEOUS NETWORKS
  • 2013 LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks in AD HOC NETWORKS
  • 2013 Cryptographically Strong de Bruijn Sequences with Large Periods in SELECTED AREAS IN CRYPTOGRAPHY
  • 2012 BUPLE: Securing Passive RFID Communication through Physical Layer Enhancements in RFID. SECURITY AND PRIVACY
  • 2012 Odd Perfect Sequences and Sets of Spreading Sequences with Zero or Low Odd Periodic Correlation Zone in SEQUENCES AND THEIR APPLICATIONS – SETA 2012
  • 2012 New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences in SEQUENCES AND THEIR APPLICATIONS – SETA 2012
  • 2012 On the Security of Hummingbird-2 against Side Channel Cube Attacks in RESEARCH IN CRYPTOLOGY
  • 2011-08-24 Framework for MIMO cross-layer secure communication based on STBC in TELECOMMUNICATION SYSTEMS
  • 2010-08-20 A framework of physical layer technique assisted authentication for vehicular communication networks in SCIENCE CHINA INFORMATION SCIENCES
  • 2010 DHT-Based Detection of Node Clone in Wireless Sensor Networks in AD HOC NETWORKS
  • 2010 Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2010 Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks in AD HOC NETWORKS
  • 2010 Computationally Efficient Mutual Entity Authentication in Wireless Sensor Networks in AD HOC NETWORKS
  • 2010 Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks in AD-HOC, MOBILE AND WIRELESS NETWORKS
  • 2010 New Constructions of Complete Non-cyclic Hadamard Matrices, Related Function Families and LCZ Sequences in SEQUENCES AND THEIR APPLICATIONS – SETA 2010
  • 2009 Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences in CODING AND CRYPTOLOGY
  • 2009 Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates in SELECTED AREAS IN CRYPTOGRAPHY
  • 2008-02-15 Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity in APPLICABLE ALGEBRA IN ENGINEERING, COMMUNICATION AND COMPUTING
  • 2008-01-01 A Study on the Pseudorandom Properties of Sequences Generated Via the Additive Order in SEQUENCES AND THEIR APPLICATIONS - SETA 2008
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

        "@context": "", 
        "affiliation": [
            "affiliation": {
              "id": "", 
              "type": "Organization"
            "isCurrent": true, 
            "type": "OrganizationRole"
            "id": "", 
            "type": "Organization"
            "id": "", 
            "type": "Organization"
            "id": "", 
            "type": "Organization"
            "id": "", 
            "type": "Organization"
            "id": "", 
            "type": "Organization"
        "familyName": "Gong", 
        "givenName": "Guang", 
        "id": "sg:person.014435421415.03", 
        "identifier": [
            "name": "orcid_id", 
            "type": "PropertyValue", 
            "value": "0000-0003-2684-9259"
        "sameAs": [
        "sdDataset": "persons", 
        "sdDatePublished": "2022-12-01T07:13", 
        "sdLicense": "", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/person/person_901.jsonl", 
        "type": "Person"

    Download the RDF metadata as:  json-ld nt turtle xml License info


    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' ''

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' ''

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' ''

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' ''


    This table displays all metadata directly associated to this object as RDF triples.

    31 TRIPLES      11 PREDICATES      18 URIs      8 LITERALS      3 BLANK NODES

    Subject Predicate Object
    1 sg:person.014435421415.03 schema:affiliation N3a090d8aed4c4de2b69e600024e799af
    2 grid-institutes:grid.39591.37
    3 grid-institutes:grid.411292.d
    4 grid-institutes:grid.42505.36
    5 grid-institutes:grid.458446.f
    6 grid-institutes:grid.59053.3a
    7 schema:familyName Gong
    8 schema:givenName Guang
    9 schema:identifier N3b8881914396490f90fd9f841951bfb4
    10 schema:sameAs
    12 schema:sdDatePublished 2022-12-01T07:13
    13 schema:sdLicense
    14 schema:sdPublisher N17e5ce18d5944875be369599bb704dd9
    15 sgo:license sg:explorer/license/
    16 sgo:sdDataset persons
    17 rdf:type schema:Person
    18 N17e5ce18d5944875be369599bb704dd9 schema:name Springer Nature - SN SciGraph project
    19 rdf:type schema:Organization
    20 N3a090d8aed4c4de2b69e600024e799af schema:affiliation grid-institutes:grid.46078.3d
    21 sgo:isCurrent true
    22 rdf:type schema:OrganizationRole
    23 N3b8881914396490f90fd9f841951bfb4 schema:name orcid_id
    24 schema:value 0000-0003-2684-9259
    25 rdf:type schema:PropertyValue
    26 grid-institutes:grid.39591.37 schema:Organization
    27 grid-institutes:grid.411292.d schema:Organization
    28 grid-institutes:grid.42505.36 schema:Organization
    29 grid-institutes:grid.458446.f schema:Organization
    30 grid-institutes:grid.46078.3d schema:Organization
    31 grid-institutes:grid.59053.3a schema:Organization

    Preview window. Press ESC to close (or click here)