Chai, Q. ., & Gong, G. . (2012). Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. Ottawa, Canada. (Original work published 2012)
Publications
Filter by:
Chai, Q. ., & Gong, G. . (2012). A cryptanalysis of hummingbird-2: the differential sequence analysis. International Journal of Applied Cryptography.
Gong, G. ., Huo, F. ., & Yang, Y. . (2012). Large zero autocorrelation zone of Golay sequences. Cambridge, MA, USA.
Gong, G. ., Aagaard, M. ., & Fan, X. . (2012). Resilience to distinguishing attacks on WG-7 cipher and their generalizations. Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences.
Mandal, K. ., Fan, X. ., & Gong, G. . (2012). Warbler: a lightweight pseudorandom number generator gor EPC C1 Gen2 RFID tags. Amsterdam, Netherlands: IOS Press.
Gong, G. ., Helleseth, T. ., Hu, H. ., & Kholosha, A. . (2012). On the dual of certain ternary weakly regular bent functions. IEEE Transactions on Information Theory, 58, 2237-2243. (Original work published 2012)
Yang, Y. ., Huo, F. ., & Gong, G. . (2012). Large zero odd periodic autocorrelation zone of Golay sequences and QAM Golay sequences. Cambridge, MA, USA.
Gong, G. ., Helleseth, T. ., & Hu, H. . (2012). A three-valued Walsh transform from decimations of Helleseth-Gong sequences. IEEE Transactions on Information Theory, 58, 1158-1162. (Original work published 2012)
Li, Z. ., & Gong, G. . (2012). HB^C entity authentication for low-cost pervasive devices. IET Information Security.
Fan, X. ., & Gong, G. . (2012). LPKM: A lightweight polynomial-based key management protocol for distributed wireless sensor networks. (Original work published 2012)