Zidaric, N. ., Aagaard, M. D., & Gong, G. . (2018). Rapid Hardware Design for Cryptographic Modules with Filtering Structure over Small Finite Fields. Bergen, Norway. (Original work published 2018)
Publications
Filter by:
Mandal, K. ., & Gong, G. . (2018). On Ideal t-Tuple Distribution of Orthogonal Functions in Filtering De Bruijn Generators. Journal of Advances in Mathematics of Communications. Retrieved from http://cacr.uwaterloo.ca/techreports/2018/cacr2018-09.pdf (Original work published 2018)
Altawy, R. ., Rohit, R. ., He, M. ., Mandal, K. ., Yang, G. ., & Gong, G. . (2018). Towards a Cryptographic Minimal Design: The sLiSCP Family of Permutations. IEEE Transactions on Computers, 67, 1341-1358. (Original work published 2018)
Altawy, R. ., Rohit, R. ., He, M. ., Mandal, K. ., Yang, G. ., & Gong, G. . (2018). sLiSCP-light: Towards Lighter Sponge-specific Cryptographic Permutations. Amsterdam, Netherlands. (Original work published 2018)
Yang, M. ., & Gong, G. . (2018). Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS. In Submission Communication Network Security (CNS). (Original work published)
Gong, G. ., Helleseth, T. ., Kumar, V. ., & Golomb, S. W. (2018). Mathematician, Engineer, and Pioneer. IEEE Transactions on Information Theory Special Issue on Shift - Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb, 64, 2844-2857. (Original work published 2018)
Wang, Z. ., & Gong, G. . (2018). Discrete Fourier Transform of Boolean functions over the Complex Field and its Applications. IEEE Transactions on Information Theory Special Issue on Shift-Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb, 64. (Original work published 2018)
Ma, D. ., Budisin, S. ., Wang, Z. ., & Gong, G. . (2018). A New Generalized Paraunitary Generator for Complementary Sets and Complete Complementary Codes of size 2m. IEEE Signal Processing Letters. (Original work published 2018)
Rohit, R. ., & Gong, G. . (2018). Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64. Santa Barbara. (Original work published 2018)
Chen, Y. ., Case, B. ., Gao, S. ., & Gong, G. . (2018). Error Analysis of Weak Poly-LWE Instances. Journal of Cryptography and Communication Special Issue on Mathematical Methods for Cryptography, 1-16. (Original work published 2018)