Altawy, R., Rohit, R., He, M., Mandal, K., Yang, G., & Gong, G. (2017). Towards a Cryptographic Minimal Design: The sLiSCP Family of Permutations To Appear at IEEE Transactions on Computers. CACR Technical Report Cacr2017-04, University of Waterloo.
Reference author: G. Gong
First name
G.
Last name
Gong
Huo, F., Mitran, P., & Gong, G. (2016). Analysis and validation of active eavesdropping attacks in passive FHSS RFID systems IEEE Transactions on Information Forensics and Security, 11, 1528-1541. (Original work published 2016)
Mandal, K., & Gong, G. (2016). Feedback Reconstruction and Implementations of Pseudorandom Number Generators from Composited De Bruijn Sequences IEEE Transactions on Computers, 65, 2725-2738. (Original work published 2016)
Tan, Y., Gong, G., & Zhu, B. (2015). Enhanced Criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions Journal of Cryptography and Communications, Springer. (Original work published 2015)
Harn, L., & Gong, G. (2015). Conference key establishment protocol using a multivariate polynomial and its applications Journal of Security and Communication Networks, 8, 1794-1800. (Original work published 2015)
Mandal, K., Tan, Y., Wu, T., & Gong, G. (2015). A comprehensive security analysis of the TUAK algorithm set IEEE Transactions on Information Forensics and Security. (Original work published 2015)
Tan, Y., & Gong, G. (2015). Codes, schemes and quadratic zero-difference balanced functions Design, Codes and Cryptography. (Original work published 2015)
Carlet, C., Gong, G., & Tan, Y. (2016). Quadratic zero-difference balanced functions, APN functions and strongly regular graphs Designs, Codes and Cryptography, 78, 629-654. (Original work published 2016)
Qu, L., Tan, Y., Li, C., & Gong, G. (2016). More results on differentially 4-uniform permutations on $F_2^2k$ Designs, Codes and Cryptography, 78, 391-408. (Original work published 2016)
Mandal, K., & Gong, G. (2016). Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications ICST Transactions on Security Safety, 16. (Original work published 2016)
- Previous page
- Currently on page 24 24
- Next page