Fan, X., Mandal, K., & Gong, G. (2013). WG-8: a lightweight stream cipher for resource-constrained smart devices Berlin, Germany: Springer-Verlag.
References
Filter by:
El-Razouk, H., Reyhani-Masoleh, A., & Gong, G. (2013). New Implementations of the WG Stream Cipher IEEE Transactions on Very Large Scale Integration (VLSI) Systems. (Original work published 2013)
Zhu, B., Tan, Y., & Gong, G. (2013). Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation Berlin, Germany: Springer-Verlag: M. Abdalla, C. Nita-Rotaru and R. Dahab (Eds.). (Original work published 2013)
Huo, F., Yang, C., Gong, G., & Poovendran, R. (2013). A Framework to Securing RFID Transmissions by Varying Transmitted Reader\textquoterights Power Amsterdam, Netherlands: IOS Press. (Original work published 2013)
Gong, G. (2013). Character sums and polyphase sequence families with low correlation, DFT and ambiguity De Gruyter, Germany. (Original work published 2013)
Wang, Z., Gong, G., & Yu, N. (2013). New polyphase sequence families with low correlation derived from the Weil bound of exponential sums IEEE Transactions on Information Theory, 59, 3990-3998. (Original work published 2013)
Fan, X., & Gong, G. (2013). Securing NFC with Elliptic Curve Cryptography — Challenges and Solutions (Short Paper) Amsterdam, Netherlands: IOS Press. (Original work published 2013)
Wang, Z., & Gong, G. (2013). Correlation of binary sequence families derived from multiplicative character of finite fields (Original work published 2013)
Aagaard, M. D., Gong, G., & Mota, R. K. (2013). Hardware Implementations of the WG-5 Cipher for Passive RFID Tags Austin, TX, USA. (Original work published 2013)
Gong, G., Aagaard, M., & Fan, X. (2013). Resilience to distinguishing attacks on WG-7 cipher and their generalizations Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences, 5, 277-289. (Original work published 2013)