Chai, Q., & Gong, G. (2011). BUPLE: Securing Passive RFID Communication through Physical Layer Enhancements Amherst, MA, USA. (Original work published 2011)
References
Filter by:
Hu, H., & Gong, G. (2011). Periods on two kinds of nonlinear feedback shift registers with time varying feedback functions International Journal of Foundations of Computer Science, 22, 1317-1329.
Fan, X., Gong, G., & Hu, H. (2011). Remedying the Hummingbird Cryptographic Algorithm Changsha, Hunan, China. (Original work published 2011)
Chai, Q., & Gong, G. (2011). Differential Cryptanalysis of Two Joint Encryption and Error Correction Schemes Houston, TX, USA. (Original work published 2011)
Dai, Z. D., Gong, G., Song, H., & Ye, D. (2011). Trace representation and linear complexity of binary e-th power residue sequences of period p IEEE Trans. On Inform Theory, Accepted.
Fan, X., & Gong, G. (2011). On the Security of Hummingbird-2 against Side Channel Cube Attacks Bauhaus-University Weimar, Germany. (Original work published 2011)
Li, Z., & Gong, G. (2011). Computationally Efficient Mutual Entity Authentication in Wireless Sensor Networks Journal of Ad Hoc Networks, 9, 202-215.
Fan, X., Gong, G., Engels, D., & Smith, E. (2011). A Lightweight Privacy-Preserving Mutual Authentication Protocol for RFID Systems Houston, TX, USA. (Original work published 2011)
Yu, N., & Gong, G. (2010). On the structure of M-ary Sidelnikov sequences of period p2m-1 (Original work published 2010)
Engels, D., Fan, X., Gong, G., Hu, H., & Smith, E. M. (2010). Hummingbird: ultra-lightweight cryptography for resource-constrained devices Tenerife, Canary Islands, Spain.