Fan, X. ., Mandal, K. ., & Gong, G. . (2013). WG-8: a lightweight stream cipher for resource-constrained smart devices. Berlin, Germany: Springer-Verlag.
Publications
Filter by:
Yang, Y. ., Tang, X. ., & Gong, G. . (2013). Even periodic and odd periodic complementary sequence pairs from generalized Boolean functions. Advances in Mathematics of Communications, 7, 113-125. (Original work published 2013)
Zhu, B. ., Tan, Y. ., & Gong, G. . (2013). Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation. Berlin, Germany: Springer-Verlag: M. Abdalla, C. Nita-Rotaru and R. Dahab (Eds.). (Original work published 2013)
Wang, Z. ., & Gong, G. . (2013). Correlation of binary sequence families derived from multiplicative character of finite fields. (Original work published 2013)
Huo, F. ., Yang, C. ., Gong, G. ., & Poovendran, R. . (2013). A Framework to Securing RFID Transmissions by Varying Transmitted Reader\textquoterights Power. Amsterdam, Netherlands: IOS Press. (Original work published 2013)
Li, Z. ., Gong, G. ., & Qin, Z. . (2013). Secure and efficient LCMQ entity authentication protocol. IEEE Transactions on Information Theory. (Original work published 2013)
Gong, G. . (2013). Character sums and polyphase sequence families with low correlation, DFT and ambiguity. De Gruyter, Germany. (Original work published 2013)
Gong, G. ., Huo, F. ., & Yang, Y. . (2013). Large Zero Autocorrelation Zone of Golay Sequences and Their Applications. IEEE Transactions on Communications, 61, 3967-3979. (Original work published 2013)
Fan, X. ., & Gong, G. . (2013). Securing NFC with Elliptic Curve Cryptography — Challenges and Solutions (Short Paper). Amsterdam, Netherlands: IOS Press. (Original work published 2013)
Aagaard, M. D., Gong, G. ., & Mota, R. K. (2013). Hardware Implementations of the WG-5 Cipher for Passive RFID Tags. Austin, TX, USA. (Original work published 2013)