Mandal, K., & Gong, G. (2013). Filtering nonlinear feedback shift registers using Welch-Gong transformations for securing RFID applications Berlin, Germany: Springer-Verlag. (Original work published 2013)
Reference author: G. Gong
First name
G.
Last name
Gong
Wu, T., & Gong, G. (2013). The weakness of integrity protection for LTE Budapest, Hungary: Technical Report. (Original work published 2013)
Mandal, K., Gong, G., Fan, X., & Aagaard, M. (2013). On Selection of Optimal Parameters for the WG Stream Cipher Family Toronto, Canada. (Original work published 2013)
Fan, X., & Gong, G. (2013). Securing NFC with Elliptic Curve Cryptography — Challenges and Solutions (Short Paper) Amsterdam, Netherlands: IOS Press. (Original work published 2013)
Zhu, B., Tan, Y., & Gong, G. (2013). Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation Berlin, Germany: Springer-Verlag: M. Abdalla, C. Nita-Rotaru and R. Dahab (Eds.). (Original work published 2013)
Zhang, B., & Gong, G. (2013). Randomness Properties of Stream Ciphers for Wireless Communications Tokyo, Japan. (Original work published 2013)
Weng, G., Tan, Y., & Gong, G. (2013). On Quadratic APN Functions and Their Related Algebraic Objects Bergen, Norway. (Original work published 2013)
Gong, G., Huo, F., & Yang, Y. (2013). Large Zero Correlation Zone of Golay Pairs and QAM Golay Pairs Istanbul, Turkey. (Original work published 2013)
Aagaard, M. D., Gong, G., & Mota, R. K. (2013). Hardware Implementations of the WG-5 Cipher for Passive RFID Tags Austin, TX, USA. (Original work published 2013)
Huo, F., Yang, C., Gong, G., & Poovendran, R. (2013). A Framework to Securing RFID Transmissions by Varying Transmitted Reader\textquoterights Power Amsterdam, Netherlands: IOS Press. (Original work published 2013)
- Previous page
- Currently on page 17 17
- Next page