Carlet, C. ., Gong, G. ., & Tan, Y. . (2016). Quadratic zero-difference balanced functions, APN functions and strongly regular graphs. Designs, Codes and Cryptography, 78, 629-654. (Original work published 2016)
Publications
Filter by:
Huo, F. ., Mitran, P. ., & Gong, G. . (2016). Analysis and validation of active eavesdropping attacks in passive FHSS RFID systems. IEEE Transactions on Information Forensics and Security, 11, 1528-1541. (Original work published 2016)
Tan, Y. ., & Gong, G. . (2016). On the existence of aperiodic complementary hexagonal lattice arrays. (Original work published 2016)
Yang, G. ., Aagaard, M. ., & Gong, G. . (2015). Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator. (Original work published 2015)
Wu, T. ., Tan, Y. ., Mandal, K. ., & Gong, G. . (2015). On the multi-output filtering model and its applications. Submitted to Journal of Cryptography and Communications. (Original work published 2015)
Mandal, K. ., Tan, Y. ., Wu, T. ., & Gong, G. . (2015). A comprehensive security analysis of the TUAK algorithm set. IEEE Transactions on Information Forensics and Security. (Original work published 2015)
Yang, G. ., Zhu, B. ., Suder, V. ., Aagaard, M. ., & Gong, G. . (2015). The Simeck Family of Lightweight Block Ciphers. (Original work published 2015)
Tan, Y. ., & Gong, G. . (2015). On the existence of aperiodic complementary hexagonal lattice arrays. Saratoga Spring, NY. (Original work published 2015)
El-Razouk, H. ., Reyhani-Masoleh, A. ., & Gong, G. . (2015). New Hardware Implementations of WG(29,11) and WG-16 Stream Ciphers Using Polynomial Basis. IEEE Trans. Comput., 64, 2020-2035. (Original work published 2015)
Harn, L. ., & Gong, G. . (2015). Conference key establishment protocol using a multivariate polynomial and its applications. Journal of Security and Communication Networks, 8, 1794-1800. (Original work published 2015)