Nawaz, Y. ., Gupta, K. C., & Gong, G. . (2007). Efficient techniques to find algebraic immunity of s-boxes based on power mappings. Versailles, France. (Original work published 2007)
Reference author: G. Gong
First name
G.
Last name
Gong
Fan, X. ., & Gong, G. . (2007). Efficient explicit formulae for genus 2 hyperelliptic curves over prime fields and their implementations. Ottawa, Canada: Springer-Verlag. (Original work published 2007)
Yu, N. ., & Gong, G. . (2007). The Perfect Binary Sequence of Period 4 for Low Periodic and Aperiodic Autocorrelations, Sequences, Subsequences, and Consequences. Springer-Verlag.
Gong, G. . (2007). Randomness and representation of span n sequences. Springer-Verlag.
Hoeper, K. ., & Gong, G. . (2007). Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes. Y. Xiao and Y. Pan (Eds.), World Scientific Publishing Co.
Hoeper, K. ., & Gong, G. . (2007). Pre-Authentication and Authentication Models in Ad Hoc Networks. edited by Y. Xiao, X. (Sherman) Shen, and D.-Z. Du, Springer Verlag.
Fan, X. ., Hu, H. ., Gong, G. ., Smith, E. ., & Engels, D. . (2009). Lightweight Implementation of Hummingbird Cryptographic Algorithm on 4-Bit Microcontroller, to appear in the Proceedings of The 1st International Workshop on RFID Security and Cryptography 2009 (RISC\textquoteright09). London, UK. (Original work published 2009)
Yu, N. ., & Gong, G. . (2009). Multiplexing realizations of the decimation-Hadamard transform of two-level autocorrelation sequences. Springer. (Original work published 2009)
Chai, Q. ., & Gong, G. . (2011). Differential Cryptanalysis of Two Joint Encryption and Error Correction Schemes. Houston, TX, USA. (Original work published 2011)
Fan, X. ., Gong, G. ., & Hu, H. . (2011). Remedying the Hummingbird Cryptographic Algorithm. Changsha, Hunan, China. (Original work published 2011)
- Previous page
- Currently on page 11 11
- Next page