Chai, Q., & Gong, G. (2012). Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers Ottawa, Canada. (Original work published 2012)
References
Filter by:
Chai, Q., & Gong, G. (2012). A cryptanalysis of hummingbird-2: the differential sequence analysis International Journal of Applied Cryptography.
Gong, G., Huo, F., & Yang, Y. (2012). Large zero autocorrelation zone of Golay sequences Cambridge, MA, USA.
Gong, G., Aagaard, M., & Fan, X. (2012). Resilience to distinguishing attacks on WG-7 cipher and their generalizations Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences.
Mandal, K., Fan, X., & Gong, G. (2012). Warbler: a lightweight pseudorandom number generator gor EPC C1 Gen2 RFID tags Amsterdam, Netherlands: IOS Press.
Gong, G., Helleseth, T., Hu, H., & Kholosha, A. (2012). On the dual of certain ternary weakly regular bent functions IEEE Transactions on Information Theory, 58, 2237-2243. (Original work published 2012)
Yang, Y., Huo, F., & Gong, G. (2012). Large zero odd periodic autocorrelation zone of Golay sequences and QAM Golay sequences Cambridge, MA, USA.
Gong, G., Helleseth, T., & Hu, H. (2012). A three-valued Walsh transform from decimations of Helleseth-Gong sequences IEEE Transactions on Information Theory, 58, 1158-1162. (Original work published 2012)
Li, Z., & Gong, G. (2012). HB^C entity authentication for low-cost pervasive devices IET Information Security.
Fan, X., & Gong, G. (2012). LPKM: A lightweight polynomial-based key management protocol for distributed wireless sensor networks (Original work published 2012)