Huo, F., & Gong, G. (2015). XOR encryption vs phase encryption: an in-depth analysis IEEE Transactions on Electromagnetic Compatibility, 1-9. (Original work published 2015)
References
Filter by:
2015
Tan, Y., & Gong, G. (2015). Codes, schemes and quadratic zero-difference balanced functions Ottawa. (Original work published 2015)
Mandal, K., & Gong, G. (2015). Feedback reconstruction and implementations of pseudorandom number generators from composited de Bruijn sequences IEEE Transactions on Computers. (Original work published 2015)
Zhu, B., Fan, X., & Gong, G. (2015). Pleco and Plectron - Two Provably Secure Password Hashing Algorithms
Yang, G., Aagaard, M., & Gong, G. (2015). Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator (Original work published 2015)
Zhu, S., & Gong, G. (2015). Fuzzy authorization for cloud storage IEEE Transactions on Cloud Computing, Special Issue on Cloud Security, 2, 422-435. (Original work published 2014)
Tan, Y., & Gong, G. (2015). Codes, schemes and quadratic zero-difference balanced functions Design, Codes and Cryptography. (Original work published 2015)
Yang, G., Zhu, B., Suder, V., Aagaard, M., & Gong, G. (2015). The Simeck Family of Lightweight Block Ciphers (Original work published 2015)
Tan, Y., & Gong, G. (2015). On the existence of aperiodic complementary hexagonal lattice arrays Saratoga Spring, NY. (Original work published 2015)
Wu, T., Tan, Y., Mandal, K., & Gong, G. (2015). On the multi-output filtering model and its applications Submitted to Journal of Cryptography and Communications. (Original work published 2015)