Youssef, A., Tavares, S. E., & Gong, G. (2006). On Some Probabilistic Approximations forAES-like S-boxes Discrete Mathematics, 306, 2016-2020.
References
Filter by:
2006
K, M., & Gong, G. (2006). New construction for balanced boolean functions with very high nonlinearity IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Cryptography and Information Security, E90-A, 29-35. (Original work published 2007)
Hoeper, K., & Gong, G. (2006). Integrated DH-like key exchange protocols from LUC, GH and XTR Proceedings of International Symposium on Information Theory(ISIT 2006).
Nassir, Y., Gong, G., & Gupta, K. (2006). Upper bounds on algebraic immunity of boolean power functions Fast Software Encryption, Lecture Notes in Computer Science (LNCS), M. Robshaw (Ed.), 375-389. (Original work published 2006)
2005
Hoeper, K., & Gong, G. (2005). Limitations of Key Escrow in Ad Hoc Networks Athens, Greece. (Original work published 2005)
Dai, Z., Jiang, S., Imamura, K., & Gong, G. (2005). Asymptotic Behavior of Normalized Linear Complexity of Ultimately Non-periodic sequences IEEE Trans. On Inform. Theory, 50, 2911-2915. (Original work published 2005)
Nawaz, Y., & Gong, G. (2005). The WG Steam Cipher Denmark. (Original work published 2005)
Xiao, L., Tavares, S., Youssef, A., & Gong, G. (2005). Improved Cascaded Stream Ciphers Using Feedback Saskatoon, Canada. (Original work published 2005)
Gong, G., & Gupta, K. C. (2005). Martin Hell, and Yassir Nawaz, Towards a General RC4-like Keystream Generator Beijing, China: Springer-verlag.
Hoeper, K., & Gong, G. (2005). Pre-Authentication and Authentication Models in AdHocNetworks Wireless and Mobile Network Security, Y.Xiao et al. (Eds.).