Chai, Q. ., & Gong, G. . (2012). A cryptanalysis of hummingbird-2: the differential sequence analysis. International Journal of Applied Cryptography.
Publications
Filter by:
Gong, G. ., Aagaard, M. ., & Fan, X. . (2012). Resilience to distinguishing attacks on WG-7 cipher and their generalizations. Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences.
Chai, Q. ., & Gong, G. . (2012). Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. Ottawa, Canada. (Original work published 2012)
Gong, G. ., Helleseth, T. ., Hu, H. ., & Kholosha, A. . (2012). On the dual of certain ternary weakly regular bent functions. IEEE Transactions on Information Theory, 58, 2237-2243. (Original work published 2012)
Gong, G. ., Huo, F. ., & Yang, Y. . (2012). Large zero autocorrelation zone of Golay sequences. Cambridge, MA, USA.
Gong, G. ., Helleseth, T. ., & Hu, H. . (2012). A three-valued Walsh transform from decimations of Helleseth-Gong sequences. IEEE Transactions on Information Theory, 58, 1158-1162. (Original work published 2012)
Mandal, K. ., Fan, X. ., & Gong, G. . (2012). Warbler: a lightweight pseudorandom number generator gor EPC C1 Gen2 RFID tags. Amsterdam, Netherlands: IOS Press.
Li, Z. ., & Gong, G. . (2012). HB^C entity authentication for low-cost pervasive devices. IET Information Security.
Yang, Y. ., Huo, F. ., & Gong, G. . (2012). Large zero odd periodic autocorrelation zone of Golay sequences and QAM Golay sequences. Cambridge, MA, USA.
Dai, Z. D., Gong, G. ., Song, H. ., & Ye, D. . (2011). Trace representation and linear complexity of binary e-th power residue sequences of period p. IEEE Trans. On Inform Theory, Accepted.