Fei, Y. ., Gong, G. ., Gongye, C. ., Mandal, K. ., Rohit, R. ., Xu, T. ., Yi, Y. ., & Zidaric, N. . (2020). Power Analysis and Higher-order Masking Implementation of WAGE.
Reference author: G. Gong
First name
G.
Last name
Gong
AlTawy, R. ., & Gong, G. . (2019). Mesh: A Supply Chain Solution with Locally Private Blockchain Transactions. https://doi.org/https://doi.org/10.2478/popets-2019-0041
Gong, G. . (2019). Securing Internet-of-Things. Montreal, Nov., 2018: Springer.
Rohit, R. ., & Gong, G. . (2018). Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64. Santa Barbara. (Original work published 2018)
Fan, X. ., Gong, G. ., Schoenmakers, B. ., & Sica, F. . (2019). Secure Simultaneous Bit Extraction from Koblitz Curves. Journal Designs, Codes and Cryptography, 87, 1-13. (Original work published 2018)
- Previous page
- Currently on page 28 28