Nawaz, Y., Gupta, K. C., & Gong, G. (2007). Efficient techniques to find algebraic immunity of s-boxes based on power mappings Versailles, France. (Original work published 2007)
Reference author: G. Gong
First name
G.
Last name
Gong
Fan, X., & Gong, G. (2007). Efficient explicit formulae for genus 2 hyperelliptic curves over prime fields and their implementations Ottawa, Canada: Springer-Verlag. (Original work published 2007)
Yu, N., & Gong, G. (2007). The Perfect Binary Sequence of Period 4 for Low Periodic and Aperiodic Autocorrelations, Sequences, Subsequences, and Consequences Springer-Verlag.
Gong, G. (2007). Randomness and representation of span n sequences Springer-Verlag.
Hoeper, K., & Gong, G. (2007). Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes Y. Xiao and Y. Pan (Eds.), World Scientific Publishing Co.
Hoeper, K., & Gong, G. (2007). Pre-Authentication and Authentication Models in Ad Hoc Networks edited by Y. Xiao, X. (Sherman) Shen, and D.-Z. Du, Springer Verlag.
Fan, X., Hu, H., Gong, G., Smith, E., & Engels, D. (2009). Lightweight Implementation of Hummingbird Cryptographic Algorithm on 4-Bit Microcontroller, to appear in the Proceedings of The 1st International Workshop on RFID Security and Cryptography 2009 (RISC\textquoteright09) London, UK. (Original work published 2009)
Yu, N., & Gong, G. (2009). Multiplexing realizations of the decimation-Hadamard transform of two-level autocorrelation sequences Springer. (Original work published 2009)
Chai, Q., & Gong, G. (2011). Differential Cryptanalysis of Two Joint Encryption and Error Correction Schemes Houston, TX, USA. (Original work published 2011)
Fan, X., Gong, G., & Hu, H. (2011). Remedying the Hummingbird Cryptographic Algorithm Changsha, Hunan, China. (Original work published 2011)
- Previous page
- Currently on page 11 11
- Next page