Youssef, A., & Gong, G. (2006). On the linear complexity of sequences over $GF(2^n)$ Theoretical ComputerScience, 352, 288-292. (Original work published 2006)
References
Filter by:
Yu, N. Y., & Gong, G. (2006). Realizations from decimation Hadamard transform for special classes of binary sequences with two-level autocorrelation Coding and Cryptography, Lecture Notes in Computer Science, 3969, 371-385.
Khoo, K., Gong, G., & Stinson, D. R. (2006). A new characterization of semi-bent and bent functions on finite fields Designs,Codes, and Cryptography, 38-2, 279-295. (Original work published 2006)
Yu, N. Y., & Gong, G. (2006). Cross correlation properties of binary sequences with ideal two-level autocorrelation Sequences and Their Applications (SETA06), LNCS, 4086, 104-118.
. Y. Yu, N., & Gong, G. (2005). Realization of decimation-Hadamard transform for binary generalized GMW sequences Bergen, Norway: Technical Report, CORR 2005-08, Springer-verlag.
Xiao, L., Tavares, S., Youssef, A., & Gong, G. (2005). Improved Cascaded Stream Ciphers Using Feedback Saskatoon, Canada. (Original work published 2005)
Jiang, S., & Gong, G. (2005). A Round and Communication Efficient Secure Ranking Protocol Lecture Notes in Computer Science, Springer-verlag. (Original work published 2005)
Hoeper, K., & Gong, G. (2005). Limitations of Key Escrow in Ad Hoc Networks Athens, Greece. (Original work published 2005)
Dai, Z., Jiang, S., Imamura, K., & Gong, G. (2005). Asymptotic Behavior of Normalized Linear Complexity of Ultimately Non-periodic sequences IEEE Trans. On Inform. Theory, 50, 2911-2915. (Original work published 2005)
Nawaz, Y., & Gong, G. (2005). The WG Steam Cipher Denmark. (Original work published 2005)