Abubaker, R., & Gong, G. (2024). Frequency distance sequences for packet detection in physical-layer security https://doi.org/10.1007/s10623-024-01475-x
References
Filter by:
Badakhshan, M., & Gong, G. (2023). Privacy-Preserving Ownership Transfer: Challenges and An Outlined Solution Based on Zero-Knowledge Proofs Presented at the IEEE World Forum on Internet of Things (WF-IoT) conference. Aveiro, Portugal : IEEE.
Luo, G., Fu, S., & Gong, G. (2023). Speeding Up Multi-Scalar Multiplication over Fixed Points Towards Efficient zkSNARKs IACR Transactions on Cryptographic Hardware and Embedded Systems (CHES), 2023.
Guo, F., Wang, Z., & . (2023). Constructing Quadratic and Cubic Negabent Functions over Finite Fields
Badakhshan, M., & Gong, G. (2023). Zupply: Anonymously Maintained Decentralized DAG Data Record Over Public Blockchains Retrieved from https://www.techrxiv.org/users/792438/articles/1083613/master/file/data/Badakhshan2024Zupply/Badakhshan2024Zupply.pdf
Abubaker, R., & Gong, G. (2023). Highspeed Physical Layer Key Exchange through OFDM Channel Whitening Orlando, Florida, USA: IEEE.
Wang, Z., & Gong, G. (2023). Constructions of complementary sequence sets and complete complementary codes by 2-level autocorrelation sequences and permutation polynomials IEEE Transactions on Information Theory.
Luo, G., & Gong, G. (2023). On the Optimization of Pippenger\textquoterights Bucket Method with Precomputation Journal of Design, Codes and Cryptography.
Fu, S., & Gong, G. (2022). Polaris: Transparent Succinct Zero-Knowledge Arguments for R1CS with Efficient Verifier Virtual Conference (Sydney, Australia), July 11-14.
Guo, F., Wang, Z., & Gong, G. (2022). Several secondary methods for constructing bent\textendashnegabent functions Design, Codes and Cryptography, 91. Retrieved from https://doi.org/10.1007/s10623-022-01133-0 (Original work published 2022)