Harn, L., & Gong, G. (2012). Conference key establishment using polynomials IEEE Transactions on Computers.
References
Filter by:
Fan, X., & Gong, G. (2012). On the security of Hummingbird-2 against side channel cube attacks Springer Verlag. (Original work published 2012)
Chai, Q., Gong, G., & Engels, D. (2012). How to develop clairaudience — active eavesdropping in passive RFID systems (invited) San Francisco, CA, USA. (Original work published 2012)
Yang, Y., Gong, G., & Tang, X. (2012). On the perfect cyclically conjugated even and odd periodic autocorrelation properties of quaternary Golay sequences IEEE Transactions on Information Theory.
Chai, Q., & Gong, G. (2012). A cryptanalysis of hummingbird-2: the differential sequence analysis International Journal of Applied Cryptography.
Chai, Q., & Gong, G. (2012). Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers Ottawa, Canada. (Original work published 2012)
Gong, G., Huo, F., & Yang, Y. (2012). Large zero autocorrelation zone of Golay sequences Cambridge, MA, USA.
Gong, G., Aagaard, M., & Fan, X. (2012). Resilience to distinguishing attacks on WG-7 cipher and their generalizations Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences.
Gong, G., Helleseth, T., Hu, H., & Kholosha, A. (2012). On the dual of certain ternary weakly regular bent functions IEEE Transactions on Information Theory, 58, 2237-2243. (Original work published 2012)
Mandal, K., Fan, X., & Gong, G. (2012). Warbler: a lightweight pseudorandom number generator gor EPC C1 Gen2 RFID tags Amsterdam, Netherlands: IOS Press.