Qu, L., Tan, Y., Li, C., & Gong, G. (2014). More Constructions of differentially 4-uniform permutations on GF Designs, Codes and Cryptography, 1-18. (Original work published 2014)
Reference author: G. Gong
First name
G.
Last name
Gong
Tan, Y., Gong, G., & Zhu, B. (2014). Enhanced criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions Journal of Cryptography and Communications. (Original work published 2014)
Tan, Y., Gong, G., & Zhu, B. (2014). Enhanced criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions Journal of Cryptography and Communications.
Mandal, K., & Gong, G. (2015). Feedback reconstruction and implementations of pseudorandom number generators from composited de Bruijn sequences IEEE Transactions on Computers. (Original work published 2015)
Zhu, S., & Gong, G. (2015). Fuzzy authorization for cloud storage IEEE Transactions on Cloud Computing, Special Issue on Cloud Security, 2, 422-435. (Original work published 2014)
Wu, T., Tan, Y., Mandal, K., & Gong, G. (2015). On the multi-output filtering model and its applications Submitted to Journal of Cryptography and Communications. (Original work published 2015)
El-Razouk, H., Reyhani-Masoleh, A., & Gong, G. (2015). New Hardware Implementations of WG(29,11) and WG-16 Stream Ciphers Using Polynomial Basis IEEE Trans. Comput., 64, 2020-2035. (Original work published 2015)
Wu, T., & Gong, G. (2015). Two new message authentication codes based on APN functions and stream ciphers Security and Communication Networks. (Original work published 2015)
Huo, F., & Gong, G. (2015). XOR encryption vs phase encryption: an in-depth analysis IEEE Transactions on Electromagnetic Compatibility, 1-9. (Original work published 2015)
Tan, Y., Mandal, K., & Gong, G. (2014). Characterization of Theta Effect Kernel and Differential Cryptanalysis of Keccak Design, Codes and Cryptography.
- Previous page
- Currently on page 20 20
- Next page