Nawaz, Y., & Gong, G. (2005). The WG Steam Cipher Denmark. (Original work published 2005)
References
Filter by:
Gong, G., & Gupta, K. C. (2005). Martin Hell, and Yassir Nawaz, Towards a General RC4-like Keystream Generator Beijing, China: Springer-verlag.
Chiu, F., . Y. Yu, N., & Gong, G. (2005). Maximum correlationof binary signals over fading channels Adelaide, Australia. (Original work published 2005)
Dai, Z., Jiang, S., Imamura, K., & Gong, G. (2005). Asymptotic Behavior of Normalized Linear Complexity of Ultimately Non-periodic sequences IEEE Trans. On Inform. Theory, 50, 2911-2915. (Original work published 2005)
Khoo, K., Gong, G., Tan, G.-E., & -KiatLee, H. (2005). Comparison of boolean function design Adelaide, Australia. (Original work published 2005)
Giuliani, K., & Gong, G. (2005). New LFSR-based cryptosystems and the trace discrete logarithm problem (Trace-DLP) Lecture Notes in Computer Science.
Hoeper, K., & Gong, G. (2005). Pre-Authentication and Authentication Models in AdHocNetworks Wireless and Mobile Network Security, Y.Xiao et al. (Eds.).
Gong, G., & Jiang, S. (2004). Editing Generator and its Cryptanalysis, Special issue on Multimedia Networking and Wireless Communications International Journal of Wireless and Mobile Computing, Inderscience Publishers.
Jiang, S., & Gong, G. (2004). Multi-service Oriented Broadcast Encryption Springer-verlag.
Jiang, S., & Gong, G. (2004). Password Based Key Exchange with Mutual Authentication Selected Area in Cryptography, 3357, 291-306. (Original work published 2004)