Fan, X., Wollinger, T., & Gong, G. (2007). Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems over binary fields IET Information Security, 1, 65-81. (Original work published 2007)
References
Filter by:
Nawaz, Y., & Gong, G. (2007). Distributing fixed time slices in heterogeneous networks of workstations (NOWs) Springer-Verlag. (Original work published 2007)
Khoo, K., & Gong, G. (2007). New construction for balanced boolean functions with very high nonlinearity IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, E90-A, 29-35. (Original work published 2007)
Fan, X., & Gong, G. (2007). Efficient explicit formulae for genus 2 hyperelliptic curves over prime fields and their implementations Ottawa, Canada: Springer-Verlag. (Original work published 2007)
Golomb, S., & Gong, G. (2007). Actions of the unitary group on irreducible/primitive polynomials and their applications to randomness of sequences Bergen, Norway. (Original work published 2007)
Gong, G., Golomb, S. W., & Song, H. (2007). A note on low correlation zone signal sets IEEE Trans. On Information Theory, 53, 2575-2581. (Original work published 2007)
Nawaz, Y., Gupta, K. C., & Gong, G. (2007). Efficient techniques to find algebraic immunity of s-boxes based on power mappings Versailles, France. (Original work published 2007)
R\onjom, S., Gong, G., & Helleseth, T. (2007). On attacks on filtering generators using linear subspace structures, Sequences, Subsequences, and Consequences Springer-Verlag.
Hoeper, K., & Gong, G. (2007). Preventing or utilizing key escrow in identity-based schemes employed in mobile ad hoc networks International Journal of Security and Networks (IJSN), Special Issue on Cryptography in Networks, 2, 239-250. (Original work published 2007)
Hoeper, K., & Gong, G. (2007). Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes Y. Xiao and Y. Pan (Eds.), World Scientific Publishing Co.