Tan, Y. ., Gong, G. ., & Zhu, B. . (2014). Enhanced criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions. Journal of Cryptography and Communications.
Publications
Filter by:
Robson, B. ., Leung, B. ., & Gong, G. . (2014). Truly Random Number Generator Based on Ring Oscillator Utilizing Last Passage Time. IEEE Transactions on Circuits and Systems II: Express Briefs, 61, 937-941. (Original work published 2014)
Huo, F. ., & Gong, G. . (2014). Physical Layer Phase Encryption for Combating the Traffic Analysis Attack. Raleigh, USA. (Original work published 2014)
Mandal, K. ., Gong, G. ., Fan, X. ., & Aagaard, M. . (2014). Optimal Parameters for the WG Stream Cipher Family. Cryptography and Communications, 6, 117-135. (Original work published 2014)
Qu, L. ., Tan, Y. ., Li, C. ., & Gong, G. . (2014). More Constructions of differentially 4-uniform permutations on GF. Designs, Codes and Cryptography, 1-18. (Original work published 2014)
Huo, F. ., & Gong, G. . (2014). XOR Encryption vs Phase Encryption: An In-depth Analysis. IEEE Transactions on Electromagnetic Compatibility.
Huo, F. ., & Gong, G. . (2014). Physical Layer Phase Encryption for Combating the Traffic Analysis Attack. Raleigh, USA. (Original work published 2014)
Zhu, B. ., Fan, X. ., & Gong, G. . (2014). Pleco and Plectron — Two Provably Secure Password Hashing Algorithms. IEEE Trans on Dependable and Secure Computing.
Zhu, B. ., & Gong, G. . (2014). Multidimensional Meet-in-the-Middle Attack and Its Applications to KATAN32/48/64. Journal of Cryptography and Communications, Discrete Structures, Boolean Functions and Sequences (CCDS), 6, 313-333. (Original work published 2014)
Hu, H. ., Shao, S. ., Gong, G. ., & Helleseth, T. . (2014). On the proof of Lin\textquoterights conjecture. Honolulu, HI. (Original work published 2014)