Yang, Y. ., Gong, G. ., & Tang, X. . (2012). Odd perfect sequences and sets of spreading sequences with zero or low odd periodic correlation zone. (Original work published 2012)
Publications
Filter by:
Harn, L. ., & Gong, G. . (2012). Conference key establishment using polynomials. IEEE Transactions on Computers.
Mandal, K. ., & Gong, G. . (2012). Cryptographically strong de Bruijn sequences with large periods. Springer, Heidelberg.
Fan, X. ., & Gong, G. . (2012). On the security of Hummingbird-2 against side channel cube attacks. Springer Verlag. (Original work published 2012)
Yang, Y. ., Gong, G. ., & Tang, X. . (2012). On the perfect cyclically conjugated even and odd periodic autocorrelation properties of quaternary Golay sequences. IEEE Transactions on Information Theory.
Chai, Q. ., & Gong, G. . (2012). A cryptanalysis of hummingbird-2: the differential sequence analysis. International Journal of Applied Cryptography.
Chai, Q. ., Gong, G. ., & Engels, D. . (2012). How to develop clairaudience — active eavesdropping in passive RFID systems (invited). San Francisco, CA, USA. (Original work published 2012)
Chai, Q. ., & Gong, G. . (2012). Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. Ottawa, Canada. (Original work published 2012)
Gong, G. ., Aagaard, M. ., & Fan, X. . (2012). Resilience to distinguishing attacks on WG-7 cipher and their generalizations. Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences.
Gong, G. ., Helleseth, T. ., Hu, H. ., & Kholosha, A. . (2012). On the dual of certain ternary weakly regular bent functions. IEEE Transactions on Information Theory, 58, 2237-2243. (Original work published 2012)