Gong, G., Huo, F., & Yang, Y. (2012). Large zero autocorrelation zones of Golay sequences and their applications IEEE Transactions on Communication. (Original work published 2012)
References
Filter by:
Fan, X., & Gong, G. (2012). On the security of Hummingbird-2 against side channel cube attacks Springer Verlag. (Original work published 2012)
Gupta, K., Nawaz, Y., & Gong, G. (2011). Upper Bound for Algebraic Immunity on a Subclass of Maiorana McFarland Class of Bent Functions Information Processing Letters, 111, 247-249.
Safkhani, M., Bagheri, N., Naderi, M., Luo, Y., & Chai, Q. (2011). Tag Impersonation Attack on Two RFID Mutual Authentication Protocols Vienna, Austria. (Original work published 2011)
Gong, G., Ronjom, S., Helleseth, T., & Hu, H. (2011). Fast Discrete Fourier Spectra Attacks on Stream Ciphers IEEE Transactions on Information Theory, 57, 5555-5565. (Original work published 2011)
Mandal, K., Fan, X., & Gong, G. (2011). A Lightweight Pseudorandom Number Generator For EPC Class 1 Gen2 RFID Tags Bauhaus-University Weimar, Germany. (Original work published 2011)
Yu, N., & Gong, G. (2011). Near-complementary sequences with low PMEPR for peak power control in multicarrier communications IEEE Transactions on Information Theory, 57, 505-513. (Original work published 2011)
Yang, Y., Tang, X., Gong, G., & Zhou, Z. (2011). On the optimality of ZCZ sequence sets Guilin, Guangxi. (Original work published 2011)
Wang, Z., & Gong, G. (2011). New sequences design from Weil representation with low two-dimensional correlation in both time and phase shifts IEEE Transactions on Information Theory, 57, 4600-4611. (Original work published 2011)
Fan, X., Gong, G., & Hu, H. (2011). Remedying the Hummingbird Cryptographic Algorithm Changsha, Hunan, China. (Original work published 2011)