Altawy, R. ., Rohit, R. ., He, M. ., Mandal, K. ., Yang, G. ., & Gong, G. . (2017). Towards a Cryptographic Minimal Design: The sLiSCP Family of Permutations. To Appear at IEEE Transactions on Computers. CACR Technical Report cacr2017-04, University of Waterloo.
Reference author: G. Gong
First name
G.
Last name
Gong
Huo, F. ., Mitran, P. ., & Gong, G. . (2016). Analysis and validation of active eavesdropping attacks in passive FHSS RFID systems. IEEE Transactions on Information Forensics and Security, 11, 1528-1541. (Original work published 2016)
Mandal, K. ., & Gong, G. . (2016). Feedback Reconstruction and Implementations of Pseudorandom Number Generators from Composited De Bruijn Sequences. IEEE Transactions on Computers, 65, 2725-2738. (Original work published 2016)
Tan, Y. ., Gong, G. ., & Zhu, B. . (2015). Enhanced Criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions. Journal of Cryptography and Communications, Springer. (Original work published 2015)
Harn, L. ., & Gong, G. . (2015). Conference key establishment protocol using a multivariate polynomial and its applications. Journal of Security and Communication Networks, 8, 1794-1800. (Original work published 2015)
Mandal, K. ., Tan, Y. ., Wu, T. ., & Gong, G. . (2015). A comprehensive security analysis of the TUAK algorithm set. IEEE Transactions on Information Forensics and Security. (Original work published 2015)
Tan, Y. ., & Gong, G. . (2015). Codes, schemes and quadratic zero-difference balanced functions. Design, Codes and Cryptography. (Original work published 2015)
Carlet, C. ., Gong, G. ., & Tan, Y. . (2016). Quadratic zero-difference balanced functions, APN functions and strongly regular graphs. Designs, Codes and Cryptography, 78, 629-654. (Original work published 2016)
Qu, L. ., Tan, Y. ., Li, C. ., & Gong, G. . (2016). More results on differentially 4-uniform permutations on $F_2^2k$. Designs, Codes and Cryptography, 78, 391-408. (Original work published 2016)
Mandal, K. ., & Gong, G. . (2016). Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications. ICST Transactions on Security Safety, 16. (Original work published 2016)
- Previous page
- Currently on page 24 24
- Next page