Zhang, B., & Gong, G. (2013). Randomness Properties of Stream Ciphers for Wireless Communications Tokyo, Japan. (Original work published 2013)
References
Filter by:
Mandal, K., & Gong, G. (2013). Filtering nonlinear feedback shift registers using Welch-Gong transformations for securing RFID applications Berlin, Germany: Springer-Verlag. (Original work published 2013)
Fan, X., Mandal, K., & Gong, G. (2013). WG-8: a lightweight stream cipher for resource-constrained smart devices Berlin, Germany: Springer-Verlag.
Wang, Z., & Gong, G. (2013). Correlation of binary sequence families derived from multiplicative character of finite fields (Original work published 2013)
Gong, G., Aagaard, M., & Fan, X. (2013). Resilience to distinguishing attacks on WG-7 cipher and their generalizations Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences, 5, 277-289. (Original work published 2013)
El-Razouk, H., Reyhani-Masoleh, A., & Gong, G. (2013). New Implementations of the WG Stream Cipher IEEE Transactions on Very Large Scale Integration (VLSI) Systems. (Original work published 2013)
Zhu, B., Tan, Y., & Gong, G. (2013). Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation Berlin, Germany: Springer-Verlag: M. Abdalla, C. Nita-Rotaru and R. Dahab (Eds.). (Original work published 2013)
Huo, F., Yang, C., Gong, G., & Poovendran, R. (2013). A Framework to Securing RFID Transmissions by Varying Transmitted Reader\textquoterights Power Amsterdam, Netherlands: IOS Press. (Original work published 2013)
Gong, G. (2013). Character sums and polyphase sequence families with low correlation, DFT and ambiguity De Gruyter, Germany. (Original work published 2013)
Li, Z., Gong, G., & Qin, Z. (2013). Secure and efficient LCMQ entity authentication protocol IEEE Transactions on Information Theory. (Original work published 2013)