Wang, Z. ., & Gong, G. . (2013). Correlation of binary sequence families derived from multiplicative character of finite fields. (Original work published 2013)
Publications
Filter by:
Fan, X. ., & Gong, G. . (2013). Securing NFC with Elliptic Curve Cryptography — Challenges and Solutions (Short Paper). Amsterdam, Netherlands: IOS Press. (Original work published 2013)
Yang, Y. ., Gong, G. ., & Tang, X. . (2012). Odd perfect sequences and sets of spreading sequences with zero or low odd periodic correlation zone. (Original work published 2012)
Mandal, K. ., & Gong, G. . (2012). Cryptographically strong de Bruijn sequences with large periods. Springer, Heidelberg.
Yang, Y. ., Gong, G. ., & Tang, X. . (2012). On the perfect cyclically conjugated even and odd periodic autocorrelation properties of quaternary Golay sequences. IEEE Transactions on Information Theory.
Chai, Q. ., & Gong, G. . (2012). A cryptanalysis of hummingbird-2: the differential sequence analysis. International Journal of Applied Cryptography.
Fan, X. ., & Gong, G. . (2012). On the security of Hummingbird-2 against side channel cube attacks. Springer Verlag. (Original work published 2012)
Chai, Q. ., Gong, G. ., & Engels, D. . (2012). How to develop clairaudience — active eavesdropping in passive RFID systems (invited). San Francisco, CA, USA. (Original work published 2012)
Gong, G. ., Aagaard, M. ., & Fan, X. . (2012). Resilience to distinguishing attacks on WG-7 cipher and their generalizations. Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences.
Gong, G. ., Helleseth, T. ., Hu, H. ., & Kholosha, A. . (2012). On the dual of certain ternary weakly regular bent functions. IEEE Transactions on Information Theory, 58, 2237-2243. (Original work published 2012)