Huo, F. ., & Gong, G. . (2014). Physical Layer Phase Encryption for Combating the Traffic Analysis Attack. Raleigh, USA. (Original work published 2014)
Publications
Filter by:
Huo, F. ., & Gong, G. . (2014). XOR Encryption vs Phase Encryption: An In-depth Analysis. IEEE Transactions on Electromagnetic Compatibility.
Zhu, B. ., Fan, X. ., & Gong, G. . (2014). Pleco and Plectron — Two Provably Secure Password Hashing Algorithms. IEEE Trans on Dependable and Secure Computing.
Zhu, B. ., & Gong, G. . (2014). Multidimensional Meet-in-the-Middle Attack and Its Applications to KATAN32/48/64. Journal of Cryptography and Communications, Discrete Structures, Boolean Functions and Sequences (CCDS), 6, 313-333. (Original work published 2014)
Hu, H. ., Shao, S. ., Gong, G. ., & Helleseth, T. . (2014). On the proof of Lin\textquoterights conjecture. Honolulu, HI. (Original work published 2014)
Wang, Z. ., Parker, M. ., Gong, G. ., & Wu, G. . (2014). On the PMEPR of binary Golay sequences of length 2^n. IEEE Transactions on Information Theory, 60, 2391-2398. (Original work published 2014)
Chung, J.-H. ., Gong, G. ., & Yang, K. . (2014). New Families of Optimal Frequency-Hopping Sequences of Composite Lengths. IEEE Transactions on Information Theory, 60, 3688-3697. (Original work published 2014)
Feng, J. ., & Gong, G. . (2014). WiFi-based Location Services Attack on Dual-band Hardware. Raleigh, USA. (Original work published 2014)
Tan, Y. ., Mandal, K. ., & Gong, G. . (2014). Characterization of Theta Effect Kernel and Differential Cryptanalysis of Keccak. Design, Codes and Cryptography.
Zhu, B. ., Fan, X. ., & Gong, G. . (2014). Loxin — A Solution to Password-less Universal Login. Toronto, Canada.