Wu, T., & Gong, G. (2015). Two new message authentication codes based on APN functions and stream ciphers Security and Communication Networks. (Original work published 2015)
References
Filter by:
Tan, Y., Gong, G., & Zhu, B. (2015). Enhanced Criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions Journal of Cryptography and Communications, Springer. (Original work published 2015)
Liu, Q., Gong, G., Wang, Y., & Li, H. (2015). A novel physical layer security scheme for MIMO Two-Way relay channels San Diego, USA. (Original work published 2015)
Huo, F., & Gong, G. (2015). XOR encryption vs phase encryption: an in-depth analysis IEEE Transactions on Electromagnetic Compatibility, 1-9. (Original work published 2015)
Tan, Y., & Gong, G. (2015). Codes, schemes and quadratic zero-difference balanced functions Ottawa. (Original work published 2015)
Mandal, K., & Gong, G. (2015). Feedback reconstruction and implementations of pseudorandom number generators from composited de Bruijn sequences IEEE Transactions on Computers. (Original work published 2015)
Zhu, B., Fan, X., & Gong, G. (2015). Pleco and Plectron - Two Provably Secure Password Hashing Algorithms
Yang, G., Aagaard, M., & Gong, G. (2015). Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator (Original work published 2015)
Zhu, S., & Gong, G. (2015). Fuzzy authorization for cloud storage IEEE Transactions on Cloud Computing, Special Issue on Cloud Security, 2, 422-435. (Original work published 2014)
Tan, Y., & Gong, G. (2015). Codes, schemes and quadratic zero-difference balanced functions Design, Codes and Cryptography. (Original work published 2015)