Mandal, K. ., & Gong, G. . (2013). Filtering nonlinear feedback shift registers using Welch-Gong transformations for securing RFID applications. Berlin, Germany: Springer-Verlag. (Original work published 2013)
Reference author: G. Gong
First name
G.
Last name
Gong
Wu, T. ., & Gong, G. . (2013). The weakness of integrity protection for LTE. Budapest, Hungary: Technical Report. (Original work published 2013)
Mandal, K. ., Gong, G. ., Fan, X. ., & Aagaard, M. . (2013). On Selection of Optimal Parameters for the WG Stream Cipher Family. Toronto, Canada. (Original work published 2013)
Fan, X. ., & Gong, G. . (2013). Securing NFC with Elliptic Curve Cryptography — Challenges and Solutions (Short Paper). Amsterdam, Netherlands: IOS Press. (Original work published 2013)
Zhu, B. ., Tan, Y. ., & Gong, G. . (2013). Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation. Berlin, Germany: Springer-Verlag: M. Abdalla, C. Nita-Rotaru and R. Dahab (Eds.). (Original work published 2013)
Zhang, B. ., & Gong, G. . (2013). Randomness Properties of Stream Ciphers for Wireless Communications. Tokyo, Japan. (Original work published 2013)
Weng, G. ., Tan, Y. ., & Gong, G. . (2013). On Quadratic APN Functions and Their Related Algebraic Objects. Bergen, Norway. (Original work published 2013)
Gong, G. ., Huo, F. ., & Yang, Y. . (2013). Large Zero Correlation Zone of Golay Pairs and QAM Golay Pairs. Istanbul, Turkey. (Original work published 2013)
Aagaard, M. D., Gong, G. ., & Mota, R. K. (2013). Hardware Implementations of the WG-5 Cipher for Passive RFID Tags. Austin, TX, USA. (Original work published 2013)
Huo, F. ., Yang, C. ., Gong, G. ., & Poovendran, R. . (2013). A Framework to Securing RFID Transmissions by Varying Transmitted Reader\textquoterights Power. Amsterdam, Netherlands: IOS Press. (Original work published 2013)
- Previous page
- Currently on page 17 17
- Next page