Liu, Q. ., Gong, G. ., Wang, Y. ., & Li, H. . (2015). A novel physical layer security scheme for MIMO Two-Way relay channels. San Diego, USA. (Original work published 2015)
Publications
Filter by:
Wu, T. ., Tan, Y. ., Mandal, K. ., & Gong, G. . (2015). On the multi-output filtering model and its applications. Submitted to Journal of Cryptography and Communications. (Original work published 2015)
Tan, Y. ., & Gong, G. . (2015). Codes, schemes and quadratic zero-difference balanced functions. Ottawa. (Original work published 2015)
Mandal, K. ., Tan, Y. ., Wu, T. ., & Gong, G. . (2015). A comprehensive security analysis of the TUAK algorithm set. IEEE Transactions on Information Forensics and Security. (Original work published 2015)
Zhu, B. ., Fan, X. ., & Gong, G. . (2015). Pleco and Plectron - Two Provably Secure Password Hashing Algorithms.
El-Razouk, H. ., Reyhani-Masoleh, A. ., & Gong, G. . (2015). New Hardware Implementations of WG(29,11) and WG-16 Stream Ciphers Using Polynomial Basis. IEEE Trans. Comput., 64, 2020-2035. (Original work published 2015)
Yang, G. ., Aagaard, M. ., & Gong, G. . (2015). Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator. (Original work published 2015)
Harn, L. ., & Gong, G. . (2015). Conference key establishment protocol using a multivariate polynomial and its applications. Journal of Security and Communication Networks, 8, 1794-1800. (Original work published 2015)
Yang, G. ., Zhu, B. ., Suder, V. ., Aagaard, M. ., & Gong, G. . (2015). The Simeck Family of Lightweight Block Ciphers. (Original work published 2015)
Wu, T. ., & Gong, G. . (2015). Two new message authentication codes based on APN functions and stream ciphers. Security and Communication Networks. (Original work published 2015)