Zheng Gong's Bibliography at GitHub


Contact Information

Prof.Zheng Gong

Current affiliation: School of Computer Science, South China Normal University

Office: 410-412

Telefone: +86-21-85211353-405

E-mail: cis.gong(YouKonw)gmail.com


Reseach interests (Last but not least)


Publications list

Please retrieve my publication lists from My DBLP

  • Conference papers
    1. Yufeng Tang, Zheng Gong*, Liangju Zhao, Bin Li. Revisiting the Computation Analysis against Internal Encodings in White-Box Implementations, CHES 2023(4). 493-522
    2. Tongxia Deng, Ping Li, Shunzhi Yang, Yupeng Zhang, Zheng Gong, Ming Duan and Yiyuan Luo. A Deep-Learning Approach for Predicting Round Obfuscation in White-Box Block Ciphers, ACNS-SCI 2023, Springer.
    3. Yufeng Tang, Zheng Gong*, Jinhai Chen and Nanjiang Xie. Higher-Order DCA Attacks on White-Box Implementations with Masking and Shuffling Countermeasures, IACR Transactions on Cryptographic Hardware and Embedded Systems, CHES 2023(1), 369-400.
    4. Yufeng Tang, Zheng Gong*, Tao Sun, Jinhai Chen, and Fan Zhang. Adaptive Side-Channel Analysis Model and Its Applications to White-Box Block Cipher Implementations, Inscrypt 2021, Spinger LNCS 13007, pp. 399-417.
    5. Nanjiang Xie, Zheng Gong*, Yufeng Tang, Lei Wang, Yamin Wen. Protecting White-Box Block Ciphers with GCM. IEEE DSC 2022.
    6. Yuheng Yuan, Zhenzhong He, Zheng Gong* and Weidong Qiu, Acceleration of AES encryption with OpenCL, 9th Asia Joint Conference on Information Security (Asia JCIS). IEEE CS, pp.64-70, 2014 Sept.
    7. Yamin Wen and Zheng Gong*, A Dynamic Matching Secret Handshake Scheme without Random Oracle, NSS 2014, Springer LNCS, pp.409-420, 2014.
    8. Yee Wei Law, Zheng Gong, Tie Luo, Slaven Marusic and Marimuthu Palaniswami. Comparative Study of Multicast Authentication Schemes with Application to Wide-Area Measurement System, ACM AsiaCCS 2013, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communication, pp. 287-298, 2013.
    9. Josep Balasch, Baris Ege, Thomas Eisenbarth, Benoit GĂ©rard, Zheng Gong, et al. Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices, The Eleventh Smart Card Research and Advanced Application Conference (CARDIS 2012), Springer LNCS 7771, pp. 158-172, 2013.
    10. Shusheng Liu, Zheng Gong* and Libin Wang. Improved Related-Key Differential Attacks on Reduced-Round LBlock, ICICS 2012, Springer LNCS 7618, pp.58-69, 2012.
    11. Thomas Eisenbath, Zheng Gong et al. Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices. AfricaCrypt 2012, Springer LNCS 7374, pp.172-187, 2012.
    12. Yiyuan Luo, Xuejia Lai and Zheng Gong. Indifferentiability of Domain Extension Modes for Hash Functions. INTRUST 2011, LNCS 7222, Springer, pp. 138-155, 2012.
    13. Zheng Gong*, Svetla Nikova and Yee Wei Law. KLEIN: A New Family of Lightweight Block Ciphers. RFIDSec 2011, LNCS 7055, pp. 1-18, 2012.
    14. Zheng Gong and Marc X. Makkes. Hardware Trojan Side-Channels based on Physical Unclonable Functions. WISTP 2011, LNCS 6633, Springer, pp.294-303, 2011.
    15. Bozhong Liu, Zheng Gong*, Weidong Qiu and Dong Zheng. On the Security of 4-bit Involutive S-boxes for Lightweight Designs. Information Security Practice and Experience, ISPEC 2011, LNCS 6672, Springer, pp.247-256, 2011.
    16. Zheng Gong, Qiang Tang, Yee Wei Law and Hongyang Chen. KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks, The 6th China International Conference on Information Security and Cryptology (Inscrypt 2010), LNCS 6584, Springer, pp. 268-283, 2011.
    17. Zheng Gong, Pieter Hartel, Svetla Nikova and Bo Zhu. Towards Secure and Practical MACs for Body Sensor Networks. Progress in Cryptology - Indocrypt 2009. LNCS 5922, Springer, 2009.
    18. Weidong Qiu, Yaowei Zhou, Bo Zhu, Yanfei Zheng, Mi Wen and Zheng Gong. Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN. ISA 2009, LNCS 5576, Springer, pp. 200-209, 2009.
    19. Zheng Gong, Xiangxue Li and Kefei Chen. Efficient partially blind signature scheme with provable security. The Twelfth Annual International Computing and Combinatorics Conference (COCOON'06), LNCS Vol.4112, pp.378-86, 2006.
  • Journal papers
    1. Yamin Wen, Jinyu Guo, Zheng Gong, Cong Lin. A New Private Mutual Authentication Scheme with Group Discovery. Journal of Information Security and Applications. 77 (2023) 103558.
    2. Jinhai Chen, Zheng Gong*, Yufeng Tang, Xinfeng Dong. A comprehensive analysis of lightweight 8-bit sboxes from iterative structures. Journal of Information Security and Applications. 70 (2022) 103302.
    3. Man Wei, Siwei Sun, Zihao Wei, Zheng Gong and Lei Hu. A smaller first-order DPA resistant AES implementation with no fresh randomness, SCIENCE CHINA Information Sciences, Sci China Inf Sci, 2022, 65: 169102.
    4. Yufeng Tang, Zheng Gong*, Tao Sun, Jinhai Chen, Zhe Liu. WBMatrix: An Optimized Matrix Library for White-Box Block Cipher Implementations. IEEE Transactions on Computers, 10.1109/TC.2022.3152449.
    5. Yungen Wei, Zheng Gong*, Shunzhi Yang, Kai Ye, Yamin Wen. EdgeCRNN: an edge-computing oriented model of acoustic feature enhancement for keyword spotting, J Ambient Intell Human Comput 13, 1525-1535 (2022).
    6. Zhenhua Huang, Shunzhi Yang, MengChu Zhou, Zhetao Li, Zheng Gong, Yunwen Chen. Feature Map Distillation of Thin Nets for Low-Resolution Object Recognition. IEEE Trans. Image Process. 31: 1364-1379 (2022).
    7. Zhenhua Huang, Shunzhi Yang, Mengchu Zhou, Zheng Gong, Abdullah Abusorrah, Chen Lin, Zheng Huang. Making Accurate Object Detection at the Edge: Review and New Approach, Artificial Intelligence Review, 55, pages2245-2274 (2022).
    8. Siyu Pang, Tingting Lin, Xuejia Lai and Zheng Gong. A White-Box Implementation of IDEA, Symmetry, 2021, 13, 1066. https://doi.org/10.3390/sym13061066.
    9. Yamin Wen, Fangguo Zhang, Huaxiong Wang, Yinbin Miao and Zheng Gong*. Intersection-Policy Private Mutual Authentication from Authorized Private Set Intersection, SCIENCE CHINA Information Sciences (2020) 63: 122101.
    10. Yamin Wen, Fangguo Zhang, Huaxiong Wang, Zheng Gong*, Yinbin Miao, Yuqiao Deng. A New Secret Handshake Scheme with Multi-Symptom Intersection for Mobile Healthcare Social Networks. Information Science, 520: 142-154 (2020).
    11. Guohong Liao, Zheng Gong*, Zheng Huang, and Weidong Qiu. A generic optimization method of Multivariate Systems on Graphic Processing Units. Soft Computing, 22(23): 7857-7864 (2018).
    12. Lu Zhou, Chunhua Su, Yamin Wen, Weijie Li, and Zheng Gong. Towards Practical White-Box Lightweight Block Cipher Implementations for IoTs. Future Generation Computer Systems Volume 86, September 2018, Pages 507-514.
    13. Yamin Wen, Zheng Gong*, Zhengan Huang and Weidong Qiu. A New Efficient Authorized Private Set Intersection Protocol from Schnorr Signature and Its Applications, Cluster Computing, Springer, 21(1): 287-297 (2018).
    14. Xinjie ZHAO, Fan ZHANG, Shize GUO and Zheng GONG. Optimal Model Search for Hardware Trojan based Bit-level Fault Attack on Block Ciphers. SCIENCE CHINA Information Sciences 61(3): 039106:1-039106:3 (2018)
    15. Shaohua Tang, Weijian Li, Jianhao Wu, Zheng Gong, Ming Tang.Power Analysis Attacks against FPGA Implementation of KLEIN, SECURITY AND COMMUNICATION NETWORKS, 9(18): 5849-5857 (2016).
    16. Bozhong Liu, Zheng Gong and Weidong Qiu, Automatic Search of Threshold Implementations of 4-Bit S-boxes Resisting DPA, Chinese Journal of Electronics, Vol.26, No.1, January 2017, pp. 93-100.
    17. Bozhong Liu, Weidong Qiu, Lin Jiang, and Zheng Gong. Software pipelining for graphic processing unit acceleration: Partition, scheduling and granularity, International Journal of High Performance Computing Applications, 30(2): 169-185, 2016.
    18. Weidong Qiu, Zheng Gong*, Yidong Guo, Bozhong Liu, Xiaoming Tang and Yuheng Yuan. GPU-Based High Performance Password Recovery Technique for Hash Functions, Journal of Information Science and Engineering, Vol.32, 97-112, 2016.
    19. GONG Zheng*, LIU Shusheng, WEN Yamin, LUO Yiyuan, QIU Weidong. Biclique Cryptanalysis Using Balanced Complete Bipartite Subgraphs, SCIENCE CHINA Information Sciences, 2016, 59(4): 049101(3).
    20. Yamin Wen, Zheng Gong*, Private Mutual Authentications with Fuzzy Matching, Int.J. High Performance System Architecture, Vol. 5, No.1, 2014, pp.3-12.
    21. Zheng Gong, Pieter Hartel, Svetla Nikova, Shaohua Tang and Bo Zhu. TuLP: A New Family of Lightweight Message Authentication Code for Body Sensor Networks. Journal of Computer Science and Technology, 29(1), pp.53-69, 2014.
    22. Shusheng Liu, Zheng Gong* and Libin Wang. Cryptanalysis of Reduced-Round DASH, Journal of Computer Science and Technology. 28(1): 159-164 Jan. 2013.
    23. Yee Wei Law, Giorgi Moniava, Zheng Gong, Pieter Hartel and Marimuthu Palaniswami. KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks. Security and Communication Networks, Wiley InterScience. Volume 4, Issue 11, pages 1309-1329, November 2011.
    24. Weidong Qiu, Zheng Gong, Bozhong Liu, Yu Long and Kefei Chen. Restrictive partially blind signature for resource-constrained information systems. Knowledge and Information Systems. Springer, 26(1): 87-103, 2011.
    25. Zheng Gong, Weidong Qiu, Zheng Huang and Kefei Chen. Transitive Signature from LFSR. Journal of Information Science and Engineering. 2010, vol. 26(1), pp. 131-143.
    26. Yiyuan Luo, Xuejia Lai, Zheng Gong. Pseudorandomness Analysis of the Lai-Massey Scheme, Information Processing Letters, Volume 111 (2), pages 90 - 96, October, 2010.
    27. Zheng Gong, Yu Long, Xuan Hong and Kefei Chen. Practical Certificateless Aggregate Signatures from Bilinear Maps. Journal of Information Science and Engineering. 2010, vol. 26(6), pp. 2093-2106.
    28. Zheng Huang, Zheng Gong and Qiang Li. Batch Secret Sharing for Secure Multiparty Computation in Asynchronous Network. Journal of Shanghai Jiaotong University, 14(1), pp. 112-116, Feb 2009.
    29. Xuan Hong, Kefei Chen, Xiangxue Li and Zheng Gong. A Universal Composability Framework for Analysis of Proxy Threshold Signature. Journal of Shanghai Jiaotong University. 14(1), pp. 107-111, Feb 2009.
    30. Zheng Gong, Xuejia Lai and Kefei Chen. A Synthetic Indifferentiability Analysis of Block-Cipher-Based Hash Functions. Designs, Codes and Cryptography, Springer. 48:3, pp. 293-305, September 2008.
    31. Zheng Gong, Xiangxue Li, Zheng Dong and Kefei Chen. A Generic Construction for Intrusion-Resilient Signature from LFSR. Journal of Information Science and Engineering, 24(5), pp. 1347-1360, 2008.

    Projects list

    Please retrieve my resume for more detailed information My Resume


    Last modify date: 2018/09/12