Liu, Q., & Gong, G. (2016). Physical Layer Secure Information Exchange Protocol for MIMO Ad hoc Networks Against Passive Attacks Washington DC, USA. (Original work published 2016)
References
Filter by:
Carlet, C., Gong, G., & Tan, Y. (2016). Quadratic zero-difference balanced functions, APN functions and strongly regular graphs Designs, Codes and Cryptography, 78, 629-654. (Original work published 2016)
Tan, Y., Mandal, K., Wu, T., & Gong, G. (2016). Security Analysis of TUAK Algorithms for 4G-LTE Authentication and Key Agreement Waikoloa, Hawaii, USA. (Original work published 2016)
Huo, F., Mitran, P., & Gong, G. (2016). Analysis and validation of active eavesdropping attacks in passive FHSS RFID systems IEEE Transactions on Information Forensics and Security, 11, 1528-1541. (Original work published 2016)
Mandal, K., & Gong, G. (2016). Feedback Reconstruction and Implementations of Pseudorandom Number Generators from Composited De Bruijn Sequences IEEE Transactions on Computers, 65, 2725-2738. (Original work published 2016)
Tan, Y., & Gong, G. (2016). On the existence of aperiodic complementary hexagonal lattice arrays (Original work published 2016)
El-Razouk, H., Reyhani-Masoleh, A., & Gong, G. (2015). New Hardware Implementations of WG(29,11) and WG-16 Stream Ciphers Using Polynomial Basis IEEE Trans. Comput., 64, 2020-2035. (Original work published 2015)
Yang, G., Zhu, B., Suder, V., Aagaard, M., & Gong, G. (2015). The Simeck Family of Lightweight Block Ciphers (Original work published 2015)
Harn, L., & Gong, G. (2015). Conference key establishment protocol using a multivariate polynomial and its applications Journal of Security and Communication Networks, 8, 1794-1800. (Original work published 2015)
Tan, Y., & Gong, G. (2015). On the existence of aperiodic complementary hexagonal lattice arrays Saratoga Spring, NY. (Original work published 2015)