Yang, M., & Gong, G. (2018). Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS In Submission Communication Network Security (CNS). (Original work published)
References
Filter by:
Ma, D., Wang, Z., & Gong, G. (2018). A Direct Method to Construct Golay Complementary Sets Based on Boolean Functions Toronto, Canada. (Original work published 2018)
Gong, G., Helleseth, T., Kumar, V., & Golomb, S. W. (2018). Mathematician, Engineer, and Pioneer IEEE Transactions on Information Theory Special Issue on Shift - Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb, 64, 2844-2857. (Original work published 2018)
Zidaric, N., Aagaard, M. D., & Gong, G. (2018). Rapid Hardware Design for Cryptographic Modules with Filtering Structure over Small Finite Fields Bergen, Norway. (Original work published 2018)
Wang, Z., & Gong, G. (2018). Discrete Fourier Transform of Boolean functions over the Complex Field and its Applications IEEE Transactions on Information Theory Special Issue on Shift-Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb, 64. (Original work published 2018)
Ma, D., Budisin, S., Wang, Z., & Gong, G. (2018). A New Generalized Paraunitary Generator for Complementary Sets and Complete Complementary Codes of size 2m IEEE Signal Processing Letters. (Original work published 2018)
Altawy, R., Rohit, R., He, M., Mandal, K., Yang, G., & Gong, G. (2018). sLiSCP-light: Towards Lighter Sponge-specific Cryptographic Permutations Amsterdam, Netherlands. (Original work published 2018)
Chen, Y., Case, B., Gao, S., & Gong, G. (2018). Error Analysis of Weak Poly-LWE Instances Journal of Cryptography and Communication Special Issue on Mathematical Methods for Cryptography, 1-16. (Original work published 2018)
Mandal, K., Gong, G., & Liu, C. (2018). NIKE-based Fast Privacy-preserving High-dimensional Data Aggregation for Mobile Devices Submitted to IEEE Transaction on Dependable and Secure Computing, Technical Report, University of Waterloo. (Original work published 2018)
Zidaric, N., Aagaard, M., & Gong, G. (2018). Hardware Optimizations and Analysis for the WG-16 Cipher with Tower Field Arithmetic IEEE Transactions on Computers. (Original work published 2019)