Gong, G. ., Helleseth, T. ., & Kumar, V. . (2017). Solomon W. Golomb - A Great Mind in our Era. IEEE Transactions on Information Theory Special Issue on Shift-Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb. (Original work published 2018)
Publications
Filter by:
Yang, B. ., Mandal, K. ., Aagaard, M. ., & Gong, G. . (2017). Efficient Composited de Bruijn Sequence Generators. IEEE Transactions on Computers, 66, 1354-1368. (Original work published 2017)
Rohit, R. ., Altawy, R. ., & Gong, G. . (2017). MILP-based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher. St Catherine\textquoterights College, University of Oxford, Oxford, UK. (Original work published 2017)
Altawy, R. ., Rohit, R. ., He, M. ., Mandal, K. ., Yang, G. ., & Gong, G. . (2017). Towards a Cryptographic Minimal Design: The sLiSCP Family of Permutations. To Appear at IEEE Transactions on Computers. CACR Technical Report cacr2017-04, University of Waterloo.
Carlet, C. ., Gong, G. ., & Tan, Y. . (2016). Quadratic zero-difference balanced functions, APN functions and strongly regular graphs. Designs, Codes and Cryptography, 78, 629-654. (Original work published 2016)
Huo, F. ., Mitran, P. ., & Gong, G. . (2016). Analysis and validation of active eavesdropping attacks in passive FHSS RFID systems. IEEE Transactions on Information Forensics and Security, 11, 1528-1541. (Original work published 2016)
Liu, Q. ., & Gong, G. . (2016). Physical Layer Secure Information Exchange Protocol for MIMO Ad hoc Networks Against Passive Attacks. Washington DC, USA. (Original work published 2016)
Mandal, K. ., & Gong, G. . (2016). Feedback Reconstruction and Implementations of Pseudorandom Number Generators from Composited De Bruijn Sequences. IEEE Transactions on Computers, 65, 2725-2738. (Original work published 2016)
Tan, Y. ., Mandal, K. ., Wu, T. ., & Gong, G. . (2016). Security Analysis of TUAK Algorithms for 4G-LTE Authentication and Key Agreement. Waikoloa, Hawaii, USA. (Original work published 2016)
Mandal, K. ., & Gong, G. . (2016). Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications. ICST Transactions on Security Safety, 16. (Original work published 2016)