Mandal, K. ., Fan, X. ., & Gong, G. . (2016). Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices. (Original work published 2016)
Publications
Filter by:
Carlet, C. ., Gong, G. ., & Tan, Y. . (2016). Quadratic zero-difference balanced functions, APN functions and strongly regular graphs. Designs, Codes and Cryptography, 78, 629-654. (Original work published 2016)
Huo, F. ., Mitran, P. ., & Gong, G. . (2016). Analysis and validation of active eavesdropping attacks in passive FHSS RFID systems. IEEE Transactions on Information Forensics and Security, 11, 1528-1541. (Original work published 2016)
Liu, Q. ., & Gong, G. . (2016). Physical Layer Secure Information Exchange Protocol for MIMO Ad hoc Networks Against Passive Attacks. Washington DC, USA. (Original work published 2016)
Mandal, K. ., & Gong, G. . (2016). Feedback Reconstruction and Implementations of Pseudorandom Number Generators from Composited De Bruijn Sequences. IEEE Transactions on Computers, 65, 2725-2738. (Original work published 2016)
Tan, Y. ., Mandal, K. ., Wu, T. ., & Gong, G. . (2016). Security Analysis of TUAK Algorithms for 4G-LTE Authentication and Key Agreement. Waikoloa, Hawaii, USA. (Original work published 2016)
Tan, Y. ., & Gong, G. . (2015). Codes, schemes and quadratic zero-difference balanced functions. Ottawa. (Original work published 2015)
El-Razouk, H. ., Reyhani-Masoleh, A. ., & Gong, G. . (2015). New Hardware Implementations of WG(29,11) and WG-16 Stream Ciphers Using Polynomial Basis. IEEE Trans. Comput., 64, 2020-2035. (Original work published 2015)
Zhu, B. ., Fan, X. ., & Gong, G. . (2015). Pleco and Plectron - Two Provably Secure Password Hashing Algorithms.
Harn, L. ., & Gong, G. . (2015). Conference key establishment protocol using a multivariate polynomial and its applications. Journal of Security and Communication Networks, 8, 1794-1800. (Original work published 2015)