Qu, L., Tan, Y., Li, C., & Gong, G. (2014). More Constructions of differentially 4-uniform permutations on GF Designs, Codes and Cryptography, 1-18. (Original work published 2014)
References
Filter by:
2014
Huo, F., & Gong, G. (2014). XOR Encryption vs Phase Encryption: An In-depth Analysis IEEE Transactions on Electromagnetic Compatibility.
Zhu, B., Fan, X., & Gong, G. (2014). Pleco and Plectron — Two Provably Secure Password Hashing Algorithms IEEE Trans on Dependable and Secure Computing.
Huo, F., & Gong, G. (2014). Physical Layer Phase Encryption for Combating the Traffic Analysis Attack Raleigh, USA. (Original work published 2014)
Zhu, B., & Gong, G. (2014). Multidimensional Meet-in-the-Middle Attack and Its Applications to KATAN32/48/64 Journal of Cryptography and Communications, Discrete Structures, Boolean Functions and Sequences (CCDS), 6, 313-333. (Original work published 2014)
2013
Fan, X., Zidaric, N., Aagaard, M., & Gong, G. (2013). Efficient Hardware Implementation of the Stream Cipher WG-16 with Composite Field Arithmetic Berlin, Germany: ACM Press. (Original work published 2014)
Mandal, K., Gong, G., Fan, X., & Aagaard, M. (2013). On Selection of Optimal Parameters for the WG Stream Cipher Family Toronto, Canada. (Original work published 2013)
Weng, G., Tan, Y., & Gong, G. (2013). On Quadratic APN Functions and Their Related Algebraic Objects Bergen, Norway. (Original work published 2013)
Yang, Y., Tang, X., & Gong, G. (2013). Even periodic and odd periodic complementary sequence pairs from generalized Boolean functions Advances in Mathematics of Communications, 7, 113-125. (Original work published 2013)
Wang, Z., & Gong, G. (2013). Correlation of binary sequence families derived from multiplicative character of finite fields (Original work published 2013)