Mandal, K. ., Yang, B. ., Gong, G. ., & Aagaard, M. . (2017). On Ideal t-Tuple Distribution of Filtering de Bruijn Sequence Generators.
Reference author: G. Gong
First name
G.
Last name
Gong
Mandal, K. ., Fan, X. ., & Gong, G. . (2016). Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices. (Original work published 2016)
Altawy, R. ., Rohit, R. ., He, M. ., Mandal, K. ., Yang, G. ., & Gong, G. . (2017). Towards a Cryptographic Minimal Design: The sLiSCP Family of Permutations. To Appear at IEEE Transactions on Computers. CACR Technical Report cacr2017-04, University of Waterloo.
Gong, G. ., Helleseth, T. ., & Kumar, V. . (2017). Solomon W. Golomb - A Great Mind in our Era. IEEE Transactions on Information Theory Special Issue on Shift-Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb. (Original work published 2018)
Liu, Q. ., Gong, G. ., Wang, Y. ., & Li, H. . (2017). A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach. Mobile Information Systems, 2017, 12. (Original work published 2017)
Yang, Y. ., Tang, X. ., & Gong, G. . (2017). New Almost Perfect, Odd Perfect, and Perfect Sequences from Difference Balanced Functions with d-form Property. Advances in Mathematics of Communications, 11, 67-76. (Original work published 2017)
Chen, Y. ., Case, B. ., Gao, S. ., & Gong, G. . (2017). Error Analysis of Weak Poly-LWE Instances. In Submission Journal of Cryptography and Communications Special Issue on Mathematical Methods for Cryptography, CACR Technical Report cacr2-17-8, University of Waterloo. (Original work published 2017)
Tan, Y. ., Gong, G. ., & Zhu, B. . (2017). Enhanced criteria on differential uniformity and nonlinearity of cryptographic significant functions. Journal of Cryptography and Communications, 8, 291-311. (Original work published 2016)
Yang, B. ., Mandal, K. ., Aagaard, M. ., & Gong, G. . (2017). Efficient Composited de Bruijn Sequence Generators. IEEE Transactions on Computers, 66, 1354-1368. (Original work published 2017)
Huo, F. ., Mitran, P. ., & Gong, G. . (2016). Analysis and validation of active eavesdropping attacks in passive FHSS RFID systems. IEEE Transactions on Information Forensics and Security, 11, 1528-1541. (Original work published 2016)
- Previous page
- Currently on page 23 23
- Next page