Carlet, C. ., Gong, G. ., & Tan, Y. . (2014). Quadratic zero-difference balanced functions, APN functions and strongly regular graphs. Designs, Codes and Cryptography, 1-26. (Original work published 2014)
Reference author: G. Gong
First name
G.
Last name
Gong
Robson, B. ., Leung, B. ., & Gong, G. . (2014). Truly Random Number Generator Based on Ring Oscillator Utilizing Last Passage Time. IEEE Transactions on Circuits and Systems II: Express Briefs, 61, 937-941. (Original work published 2014)
Huo, F. ., & Gong, G. . (2014). Physical Layer Phase Encryption for Combating the Traffic Analysis Attack. Raleigh, USA. (Original work published 2014)
Hu, H. ., Shao, S. ., Gong, G. ., & Helleseth, T. . (2014). On the proof of Lin\textquoterights conjecture. Honolulu, HI. (Original work published 2014)
Feng, J. ., & Gong, G. . (2014). WiFi-based Location Services Attack on Dual-band Hardware. Raleigh, USA. (Original work published 2014)
Gong, G. . (2013). Character sums and polyphase sequence families with low correlation, DFT and ambiguity. De Gruyter, Germany. (Original work published 2013)
Yang, G. ., Fan, X. ., Aagaard, M. ., & Gong, G. . (2013). Design Space Exploration of the Lightweight Stream Cipher WG-8 for FPGAs and ASICs. Montreal, Canada: ACM Press. (Original work published 2013)
Fan, X. ., Zidaric, N. ., Aagaard, M. ., & Gong, G. . (2013). Efficient Hardware Implementation of the Stream Cipher WG-16 with Composite Field Arithmetic. Berlin, Germany: ACM Press. (Original work published 2014)
Fan, X. ., Wu, T. ., & Gong, G. . (2013). An Efficient Stream Cipher WG-16 and Its Application for Securing 4G-LTE Networks. London, UK. (Original work published 2013)
Gong, G. ., Goh, S. ., & Tan, Y. . (2013). Determining All Permutation Polynomials of the Form G(x) + Tr(H(x)). Finite Fields and Their Applications.
- Previous page
- Currently on page 21 21
- Next page