| 1 | 2012 | FSE | pc |
| 2 | 2006 | Asiacrypt | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2007 | Time-Memory-Data Trade-off Attack on Stream Ciphers based on Maiorana-McFarland Functions | eprint | online |
| 2 | 2006 | Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and Construction | eprint | online |
| 3 | 2006 | Upper Bounds on Algebraic Immunity of Boolean Power Functions | fse | online |
| 4 | 2005 | A 32-bit RC4-like Keystream Generator | eprint | online |
| 5 | 2004 | Password Based Key Exchange with Mutual Authentication | eprint | online |
| 6 | 2003 | Hybrid Broadcast Encryption and Security Analysis | eprint | online |
| 7 | 2001 | Hyper-bent Functions | eurocrypt | 406-419 |
| 8 | 2000 | On the Interpolation Attacks on Block Ciphers | fse | 109-120 |
| 9 | 1994 | Some Cryptographic Properties of Exponential Functions | asiacrypt | 415-418 |
| 10 | 1990 | Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key | auscrypt | 32-36 |
Coauthors of Guang Gong |