Gong, G. . (2007). Constructions of multiple shift-distinct signal sets with low correlation. Nice, France. (Original work published 2007)
Reference author: G. Gong
First name
G.
Last name
Gong
R\onjom, S. ., Gong, G. ., & Helleseth, T. . (2007). On attacks on filtering generators using linear subspace structures, Sequences, Subsequences, and Consequences. Springer-Verlag.
Golomb, S. ., & Gong, G. . (2007). Actions of the unitary group on irreducible/primitive polynomials and their applications to randomness of sequences. Bergen, Norway. (Original work published 2007)
Hoeper, K. ., & Gong, G. . (2007). Pre-Authentication and Authentication Models in Ad Hoc Networks. edited by Y. Xiao, X. (Sherman) Shen, and D.-Z. Du, Springer Verlag.
Hoeper, K. ., & Gong, G. . (2007). Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes. Y. Xiao and Y. Pan (Eds.), World Scientific Publishing Co.
Fan, X. ., & Gong, G. . (2007). Efficient explicit formulae for genus 2 hyperelliptic curves over prime fields and their implementations. Ottawa, Canada: Springer-Verlag. (Original work published 2007)
Hu, H. ., & Gong, G. . (2010). A new class of ternary and quaternary sequences with two-level autocorrelation. (Original work published 2010)
Yu, N. ., & Gong, G. . (2010). On the structure of M-ary Sidelnikov sequences of period p2m-1. (Original work published 2010)
Luo, Y. ., Chai, Q. ., Gong, G. ., & Lai, X. . (2010). WG-7, A Lightweight Stream Cipher With Good Cryptographic Properties. Miami, Florida, USA. (Original work published 2010)
Fan, X. ., Hu, H. ., Gong, G. ., Smith, E. ., & Engels, D. . (2009). Lightweight Implementation of Hummingbird Cryptographic Algorithm on 4-Bit Microcontroller, to appear in the Proceedings of The 1st International Workshop on RFID Security and Cryptography 2009 (RISC\textquoteright09). London, UK. (Original work published 2009)
- Previous page
- Currently on page 11 11
- Next page