Chai, Q., & Gong, G. (2012). A cryptanalysis of hummingbird-2: the differential sequence analysis International Journal of Applied Cryptography.
References
Filter by:
2012
Chai, Q., & Gong, G. (2012). BUPLE: securing passive RFID communication through physical layer enhancements Springer, Heidelberg.
2011
Fan, X., & Gong, G. (2011). On the Security of Hummingbird-2 against Side Channel Cube Attacks Bauhaus-University Weimar, Germany. (Original work published 2011)
Hu, H., & Gong, G. (2011). Periods on two kinds of nonlinear feedback shift registers with time varying feedback functions International Journal of Foundations of Computer Science, 22, 1317-1329.
Fan, X., Gong, G., Engels, D., & Smith, E. (2011). A Lightweight Privacy-Preserving Mutual Authentication Protocol for RFID Systems Houston, TX, USA. (Original work published 2011)
Safkhani, M., Bagheri, N., Naderi, M., Luo, Y., & Chai, Q. (2011). Tag Impersonation Attack on Two RFID Mutual Authentication Protocols Vienna, Austria. (Original work published 2011)
Dai, Z. D., Gong, G., Song, H., & Ye, D. (2011). Trace representation and linear complexity of binary e-th power residue sequences of period p IEEE Trans. On Inform Theory, Accepted.
Mandal, K., Fan, X., & Gong, G. (2011). A Lightweight Pseudorandom Number Generator For EPC Class 1 Gen2 RFID Tags Bauhaus-University Weimar, Germany. (Original work published 2011)
Li, Z., & Gong, G. (2011). Computationally Efficient Mutual Entity Authentication in Wireless Sensor Networks Journal of Ad Hoc Networks, 9, 202-215.
Gupta, K., Nawaz, Y., & Gong, G. (2011). Upper Bound for Algebraic Immunity on a Subclass of Maiorana McFarland Class of Bent Functions Information Processing Letters, 111, 247-249.