Fan, X., Mandal, K., & Gong, G. (2013). WG-8: a lightweight stream cipher for resource-constrained smart devices Berlin, Germany: Springer-Verlag.
References
Filter by:
Wang, Z., Gong, G., & Yu, N. (2013). New polyphase sequence families with low correlation derived from the Weil bound of exponential sums IEEE Transactions on Information Theory, 59, 3990-3998. (Original work published 2013)
Zhu, B., Tan, Y., & Gong, G. (2013). Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation Berlin, Germany: Springer-Verlag: M. Abdalla, C. Nita-Rotaru and R. Dahab (Eds.). (Original work published 2013)
Huo, F., Yang, C., Gong, G., & Poovendran, R. (2013). A Framework to Securing RFID Transmissions by Varying Transmitted Reader\textquoterights Power Amsterdam, Netherlands: IOS Press. (Original work published 2013)
Weng, G., Tan, Y., & Gong, G. (2013). On Quadratic APN Functions and Their Related Algebraic Objects Designs, Codes and Cryptography.
Gong, G. (2013). Character sums and polyphase sequence families with low correlation, DFT and ambiguity De Gruyter, Germany. (Original work published 2013)
Fan, X., & Gong, G. (2013). Securing NFC with Elliptic Curve Cryptography — Challenges and Solutions (Short Paper) Amsterdam, Netherlands: IOS Press. (Original work published 2013)
Wang, Z., & Gong, G. (2013). Correlation of binary sequence families derived from multiplicative character of finite fields (Original work published 2013)
Gong, G., Goh, S., & Tan, Y. (2013). Determining All Permutation Polynomials of the Form G(x) + Tr(H(x)) Finite Fields and Their Applications.
Gong, G., Aagaard, M., & Fan, X. (2013). Resilience to distinguishing attacks on WG-7 cipher and their generalizations Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences, 5, 277-289. (Original work published 2013)