Zhu, S. ., & Gong, G. . (2015). Fuzzy authorization for cloud storage. IEEE Transactions on Cloud Computing, Special Issue on Cloud Security, 2, 422-435. (Original work published 2014)
Publications
Filter by:
Tan, Y. ., & Gong, G. . (2015). Codes, schemes and quadratic zero-difference balanced functions. Design, Codes and Cryptography. (Original work published 2015)
Yang, G. ., Zhu, B. ., Suder, V. ., Aagaard, M. ., & Gong, G. . (2015). The Simeck Family of Lightweight Block Ciphers. (Original work published 2015)
Tan, Y. ., & Gong, G. . (2015). On the existence of aperiodic complementary hexagonal lattice arrays. Saratoga Spring, NY. (Original work published 2015)
Wu, T. ., Tan, Y. ., Mandal, K. ., & Gong, G. . (2015). On the multi-output filtering model and its applications. Submitted to Journal of Cryptography and Communications. (Original work published 2015)
Mandal, K. ., Tan, Y. ., Wu, T. ., & Gong, G. . (2015). A comprehensive security analysis of the TUAK algorithm set. IEEE Transactions on Information Forensics and Security. (Original work published 2015)
Chen, Y. ., & Gong, G. . (2015). Integer Arithmetic over Ciphertext and Homomorphic Data Aggregation. Florence, Italy. (Original work published 2015)
El-Razouk, H. ., Reyhani-Masoleh, A. ., & Gong, G. . (2015). New Hardware Implementations of WG(29,11) and WG-16 Stream Ciphers Using Polynomial Basis. IEEE Trans. Comput., 64, 2020-2035. (Original work published 2015)
Harn, L. ., & Gong, G. . (2015). Conference key establishment protocol using a multivariate polynomial and its applications. Journal of Security and Communication Networks, 8, 1794-1800. (Original work published 2015)
Suder, V. . (2015). International Workshop on Coding and Cryptography. (Original work published 2015)