Fan, X., & Gong, G. (2012). On the security of Hummingbird-2 against side channel cube attacks Springer Verlag. (Original work published 2012)
References
Filter by:
Gong, G., Helleseth, T., & Hu, H. (2012). A three-valued Walsh transform from decimations of Helleseth-Gong sequences IEEE Transactions on Information Theory, 58, 1158-1162. (Original work published 2012)
Safkhani, M., Bagheri, N., Naderi, M., Luo, Y., & Chai, Q. (2011). Tag Impersonation Attack on Two RFID Mutual Authentication Protocols Vienna, Austria. (Original work published 2011)
Mandal, K., Fan, X., & Gong, G. (2011). A Lightweight Pseudorandom Number Generator For EPC Class 1 Gen2 RFID Tags Bauhaus-University Weimar, Germany. (Original work published 2011)
Dai, Z. D., Gong, G., Song, H., & Ye, D. (2011). Trace representation and linear complexity of binary e-th power residue sequences of period p IEEE Trans. On Inform Theory, Accepted.
Li, Z., & Gong, G. (2011). Computationally Efficient Mutual Entity Authentication in Wireless Sensor Networks Journal of Ad Hoc Networks, 9, 202-215.
Yang, Y., Tang, X., Gong, G., & Zhou, Z. (2011). On the optimality of ZCZ sequence sets Guilin, Guangxi. (Original work published 2011)
Gupta, K., Nawaz, Y., & Gong, G. (2011). Upper Bound for Algebraic Immunity on a Subclass of Maiorana McFarland Class of Bent Functions Information Processing Letters, 111, 247-249.
Gong, G., Ronjom, S., Helleseth, T., & Hu, H. (2011). Fast Discrete Fourier Spectra Attacks on Stream Ciphers IEEE Transactions on Information Theory, 57, 5555-5565. (Original work published 2011)
Fan, X., Gong, G., & Hu, H. (2011). Remedying the Hummingbird Cryptographic Algorithm Changsha, Hunan, China. (Original work published 2011)