Huo, F., & Gong, G. (2015). XOR encryption vs phase encryption: an in-depth analysis IEEE Transactions on Electromagnetic Compatibility, 1-9. (Original work published 2015)
References
Filter by:
Mandal, K., & Gong, G. (2015). Feedback reconstruction and implementations of pseudorandom number generators from composited de Bruijn sequences IEEE Transactions on Computers. (Original work published 2015)
Chen, Y., & Gong, G. (2015). Integer Arithmetic over Ciphertext and Homomorphic Data Aggregation Florence, Italy. (Original work published 2015)
Zhu, S., & Gong, G. (2015). Fuzzy authorization for cloud storage IEEE Transactions on Cloud Computing, Special Issue on Cloud Security, 2, 422-435. (Original work published 2014)
Suder, V. (2015). International Workshop on Coding and Cryptography (Original work published 2015)
Tan, Y., & Gong, G. (2015). Codes, schemes and quadratic zero-difference balanced functions Design, Codes and Cryptography. (Original work published 2015)
Wu, T., Tan, Y., Mandal, K., & Gong, G. (2015). On the multi-output filtering model and its applications Submitted to Journal of Cryptography and Communications. (Original work published 2015)
Liu, Q., Gong, G., Wang, Y., & Li, H. (2015). A novel physical layer security scheme for MIMO Two-Way relay channels San Diego, USA. (Original work published 2015)
Mandal, K., Tan, Y., Wu, T., & Gong, G. (2015). A comprehensive security analysis of the TUAK algorithm set IEEE Transactions on Information Forensics and Security. (Original work published 2015)
Tan, Y., & Gong, G. (2015). Codes, schemes and quadratic zero-difference balanced functions Ottawa. (Original work published 2015)