Tan, Y. ., Gong, G. ., & Zhu, B. . (2015). Enhanced Criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions. Journal of Cryptography and Communications, Springer. (Original work published 2015)
Publications
Filter by:
Zhu, B. ., Fan, X. ., & Gong, G. . (2015). Pleco and Plectron - Two Provably Secure Password Hashing Algorithms.
Yang, G. ., Aagaard, M. ., & Gong, G. . (2015). Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator. (Original work published 2015)
Huo, F. ., & Gong, G. . (2015). XOR encryption vs phase encryption: an in-depth analysis. IEEE Transactions on Electromagnetic Compatibility, 1-9. (Original work published 2015)
Wang, Z. ., Parker, M. ., Gong, G. ., & Wu, G. . (2014). On the PMEPR of binary Golay sequences of length 2^n. IEEE Transactions on Information Theory, 60, 2391-2398. (Original work published 2014)
Hu, H. ., Shao, S. ., Gong, G. ., & Helleseth, T. . (2014). On the proof of Lin\textquoterights conjecture. Honolulu, HI. (Original work published 2014)
Chung, J.-H. ., Gong, G. ., & Yang, K. . (2014). New Families of Optimal Frequency-Hopping Sequences of Composite Lengths. IEEE Transactions on Information Theory, 60, 3688-3697. (Original work published 2014)
Tan, Y. ., Mandal, K. ., & Gong, G. . (2014). Characterization of Theta Effect Kernel and Differential Cryptanalysis of Keccak. Design, Codes and Cryptography.
Hu, H. ., Shao, S. ., Gong, G. ., & Helleseth, T. . (2014). The Proof of Lin\textquoterights Conjecture via the Decimation-Hadamard Transform. IEEE Transactions on Information Theory, 60, 5054-5064. (Original work published 2014)
Feng, J. ., & Gong, G. . (2014). WiFi-based Location Services Attack on Dual-band Hardware. Raleigh, USA. (Original work published 2014)