Chai, Q., Gong, G., & Engels, D. (2012). How to develop clairaudience — active eavesdropping in passive RFID systems (invited) San Francisco, CA, USA. (Original work published 2012)
Reference author: G. Gong
First name
G.
Last name
Gong
Mandal, K., & Gong, G. (2012). Cryptographically strong de Bruijn sequences with large periods Springer, Heidelberg.
Zhu, B., & Gong, G. (2014). Multidimensional Meet-in-the-Middle Attack and Its Applications to KATAN32/48/64 Journal of Cryptography and Communications, Discrete Structures, Boolean Functions and Sequences (CCDS), 6, 313-333. (Original work published 2014)
Chung, J.-H., Gong, G., & Yang, K. (2014). New Families of Optimal Frequency-Hopping Sequences of Composite Lengths IEEE Transactions on Information Theory, 60, 3688-3697. (Original work published 2014)
El-Razouk, H., Reyhani-Masoleh, A., & Gong, G. (2014). New implementations of the WG stream cipher IEEE Transactions on VLSI, 22. (Original work published 2014)
Leung, B., Gong, G., Mcleish, D., & Robson, S. (2014). Novel last passage time based jitter model with application to low slew rate/high noise ring oscillator Journal of Analog Integrated Circuits and Signal Processing, 78, 853-863. (Original work published 2014)
Mandal, K., Gong, G., Fan, X., & Aagaard, M. (2014). Optimal Parameters for the WG Stream Cipher Family Cryptography and Communications, 6, 117-135. (Original work published 2014)
Zhu, B., Fan, X., & Gong, G. (2014). Pleco and Plectron — Two Provably Secure Password Hashing Algorithms IEEE Trans on Dependable and Secure Computing.
Wang, Z., Parker, M., Gong, G., & Wu, G. (2014). On the PMEPR of binary Golay sequences of length 2^n IEEE Transactions on Information Theory, 60, 2391-2398. (Original work published 2014)
Hu, H., Shao, S., Gong, G., & Helleseth, T. (2014). The Proof of Lin\textquoterights Conjecture via the Decimation-Hadamard Transform IEEE Transactions on Information Theory, 60, 5054-5064. (Original work published 2014)
- Previous page
- Currently on page 19 19
- Next page