. Y. Yu, N., & Gong, G. (2005). Realization of decimation-Hadamard transform for binary generalized GMW sequences Bergen, Norway: Technical Report, CORR 2005-08, Springer-verlag.
References
Filter by:
Hoeper, K., & Gong, G. (2005). Pre-Authentication and Authentication Models in AdHocNetworks Wireless and Mobile Network Security, Y.Xiao et al. (Eds.).
Xiao, L., Tavares, S., Youssef, A., & Gong, G. (2005). Improved Cascaded Stream Ciphers Using Feedback Saskatoon, Canada. (Original work published 2005)
Jiang, S., & Gong, G. (2005). A Round and Communication Efficient Secure Ranking Protocol Lecture Notes in Computer Science, Springer-verlag. (Original work published 2005)
Hoeper, K., & Gong, G. (2005). Limitations of Key Escrow in Ad Hoc Networks Athens, Greece. (Original work published 2005)
Nawaz, Y., & Gong, G. (2005). The WG Steam Cipher Denmark. (Original work published 2005)
Gong, G., & Gupta, K. C. (2005). Martin Hell, and Yassir Nawaz, Towards a General RC4-like Keystream Generator Beijing, China: Springer-verlag.
Correlation among signal sets (2004). Houston, Texas: Coding and Cryptography Session.
Jiang, S., & Gong, G. (2004). Password Based Key Exchange with Mutual Authentication Selected Area in Cryptography, Waterloo, Canada, 291-306. (Original work published 2004)
Giuliani, K., & Gong, G. (2004). Efficient key agreement and signature schemes using compact representation in $GF(p^10)$ (full version) Chicago, IL. (Original work published 2004)