Nassir, Y., Gong, G., & Gupta, K. (2006). Upper bounds on algebraic immunity of boolean power functions Fast Software Encryption, Lecture Notes in Computer Science (LNCS), M. Robshaw (Ed.), 375-389. (Original work published 2006)
References
Filter by:
Yu, N., & Gong, G. (2006). New family of binary sequences with low correlation and large size IEEE Trans. On Inform. Theory, 52, 1624-1636. (Original work published 2006)
Yu, N., & Gong, G. (2006). Interleaved construction of binary sequences with optimal autocorrelation magnitude Proc. Of IEEE Information Theory Workshop (ITW), 530-534. (Original work published 2006)
Gong, G., Golomb, S. W., & Song, H.-Y. (2006). A Note on Low Correlation Zone SignalSets 40th Annual Conference of Information Sciences and Systems (CISS 2006), Princeton University, Technical Co-Sponsorship With IEEE Information Theory Society.
Hoeper, K., & Gong, G. (2005). Pre-Authentication and Authentication Models in AdHocNetworks Wireless and Mobile Network Security, Y.Xiao et al. (Eds.).
Xiao, L., Tavares, S., Youssef, A., & Gong, G. (2005). Improved Cascaded Stream Ciphers Using Feedback Saskatoon, Canada. (Original work published 2005)
Chiu, F., . Y. Yu, N., & Gong, G. (2005). Maximum correlationof binary signals over fading channels Adelaide, Australia. (Original work published 2005)
Giuliani, K., & Gong, G. (2005). New LFSR-based cryptosystems and the trace discrete logarithm problem (Trace-DLP) Lecture Notes in Computer Science.
. Y. Yu, N., & Gong, G. (2005). Realization of decimation-Hadamard transform for binary generalized GMW sequences Bergen, Norway: Technical Report, CORR 2005-08, Springer-verlag.
Khoo, K., Gong, G., Tan, G.-E., & -KiatLee, H. (2005). Comparison of boolean function design Adelaide, Australia. (Original work published 2005)