Fan, X., & Gong, G. (2013). Security Challenges in Smart-Grid Metering and Control Systems Technology Innovation Management (TIM) Review, 42-49. (Original work published 2013)
Reference author: G. Gong
First name
G.
Last name
Gong
Li, Z., & Gong, G. (2012). HB^C entity authentication for low-cost pervasive devices IET Information Security.
Gong, G., Aagaard, M., & Fan, X. (2013). Resilience to distinguishing attacks on WG-7 cipher and their generalizations Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences, 5, 277-289. (Original work published 2013)
Weng, G., Tan, Y., & Gong, G. (2013). On Quadratic APN Functions and Their Related Algebraic Objects Designs, Codes and Cryptography.
Li, Z., Gong, G., & Qin, Z. (2013). Secure and efficient LCMQ entity authentication protocol IEEE Transactions on Information Theory. (Original work published 2013)
El-Razouk, H., Reyhani-Masoleh, A., & Gong, G. (2013). New Implementations of the WG Stream Cipher IEEE Transactions on Very Large Scale Integration (VLSI) Systems. (Original work published 2013)
Wang, Z., Gong, G., & Yu, N. (2013). New polyphase sequence families with low correlation derived from the Weil bound of exponential sums IEEE Transactions on Information Theory, 59, 3990-3998. (Original work published 2013)
Mandal, K., Fan, X., & Gong, G. (2013). Warbler: a lightweight pseudorandom number generator for EPC C1 Gen2 passive RFID tags Journal of RFID Security and Cryptography, 2, 82-91. (Original work published 2013)
Fan, X., & Gong, G. (2012). Accelerating signature-based broadcast authentication for wireless sensor networks Journal of Ad Hoc Networks, 10, 723-736. (Original work published 2012)
Yang, Y., Gong, G., & Tang, X. (2012). On the perfect cyclically conjugated even and odd periodic autocorrelation properties of quaternary Golay sequences IEEE Transactions on Information Theory.
- Previous page
- Currently on page 15 15
- Next page