Mandal, K., Yang, B., Guang, G., & Aagaard, M. (2016). On ideal t-tuple distribution of filtering de. Bruijn sequence generators Chengdu, China. (Original work published 2016)
References
Filter by:
Carlet, C., Gong, G., & Tan, Y. (2016). Quadratic zero-difference balanced functions, APN functions and strongly regular graphs Designs, Codes and Cryptography, 78, 629-654. (Original work published 2016)
Huo, F., Mitran, P., & Gong, G. (2016). Analysis and validation of active eavesdropping attacks in passive FHSS RFID systems IEEE Transactions on Information Forensics and Security, 11, 1528-1541. (Original work published 2016)
Chen, Y., Tan, Y., & Gong, G. (2016). New Bounds and Constructions of Weak Systematic Algebraic Modification Detection Codes Chengdu, China. (Original work published 2016)
Mandal, K., & Gong, G. (2016). Feedback Reconstruction and Implementations of Pseudorandom Number Generators from Composited De Bruijn Sequences IEEE Transactions on Computers, 65, 2725-2738. (Original work published 2016)
Liu, Q., & Gong, G. (2016). Physical Layer Secure Information Exchange Protocol for MIMO Ad hoc Networks Against Passive Attacks Washington DC, USA. (Original work published 2016)
Suder, V. (2015). International Workshop on Coding and Cryptography (Original work published 2015)
El-Razouk, H., Reyhani-Masoleh, A., & Gong, G. (2015). New Hardware Implementations of WG(29,11) and WG-16 Stream Ciphers Using Polynomial Basis IEEE Trans. Comput., 64, 2020-2035. (Original work published 2015)
Harn, L., & Gong, G. (2015). Conference key establishment protocol using a multivariate polynomial and its applications Journal of Security and Communication Networks, 8, 1794-1800. (Original work published 2015)
Liu, Q., Gong, G., Wang, Y., & Li, H. (2015). A novel physical layer security scheme for MIMO Two-Way relay channels San Diego, USA. (Original work published 2015)