Fan, X. ., & Gong, G. . (2013). Security Challenges in Smart-Grid Metering and Control Systems. Technology Innovation Management (TIM) Review, 42-49. (Original work published 2013)
Reference author: G. Gong
First name
G.
Last name
Gong
Li, Z. ., & Gong, G. . (2012). HB^C entity authentication for low-cost pervasive devices. IET Information Security.
Gong, G. ., Aagaard, M. ., & Fan, X. . (2013). Resilience to distinguishing attacks on WG-7 cipher and their generalizations. Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences, 5, 277-289. (Original work published 2013)
Weng, G. ., Tan, Y. ., & Gong, G. . (2013). On Quadratic APN Functions and Their Related Algebraic Objects. Designs, Codes and Cryptography.
Li, Z. ., Gong, G. ., & Qin, Z. . (2013). Secure and efficient LCMQ entity authentication protocol. IEEE Transactions on Information Theory. (Original work published 2013)
El-Razouk, H. ., Reyhani-Masoleh, A. ., & Gong, G. . (2013). New Implementations of the WG Stream Cipher. IEEE Transactions on Very Large Scale Integration (VLSI) Systems. (Original work published 2013)
Wang, Z. ., Gong, G. ., & Yu, N. . (2013). New polyphase sequence families with low correlation derived from the Weil bound of exponential sums. IEEE Transactions on Information Theory, 59, 3990-3998. (Original work published 2013)
Mandal, K. ., Fan, X. ., & Gong, G. . (2013). Warbler: a lightweight pseudorandom number generator for EPC C1 Gen2 passive RFID tags. Journal of RFID Security and Cryptography, 2, 82-91. (Original work published 2013)
Fan, X. ., & Gong, G. . (2012). Accelerating signature-based broadcast authentication for wireless sensor networks. Journal of Ad Hoc Networks, 10, 723-736. (Original work published 2012)
Yang, Y. ., Gong, G. ., & Tang, X. . (2012). On the perfect cyclically conjugated even and odd periodic autocorrelation properties of quaternary Golay sequences. IEEE Transactions on Information Theory.
- Previous page
- Currently on page 15 15
- Next page