Zhu, B., Fan, X., & Gong, G. (2015). Pleco and Plectron - Two Provably Secure Password Hashing Algorithms
References
Filter by:
Wu, T., Tan, Y., Mandal, K., & Gong, G. (2015). On the multi-output filtering model and its applications Submitted to Journal of Cryptography and Communications. (Original work published 2015)
Yang, G., Aagaard, M., & Gong, G. (2015). Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator (Original work published 2015)
Mandal, K., Tan, Y., Wu, T., & Gong, G. (2015). A comprehensive security analysis of the TUAK algorithm set IEEE Transactions on Information Forensics and Security. (Original work published 2015)
Hu, H., Shao, S., Gong, G., & Helleseth, T. (2014). On the proof of Lin\textquoterights conjecture Honolulu, HI. (Original work published 2014)
Tan, Y., Gong, G., & Zhu, B. (2014). Enhanced criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions Journal of Cryptography and Communications.
Robson, B., Leung, B., & Gong, G. (2014). Truly Random Number Generator Based on Ring Oscillator Utilizing Last Passage Time IEEE Transactions on Circuits and Systems II: Express Briefs, 61, 937-941. (Original work published 2014)
Mandal, K., Gong, G., Fan, X., & Aagaard, M. (2014). Optimal Parameters for the WG Stream Cipher Family Cryptography and Communications, 6, 117-135. (Original work published 2014)
Feng, J., & Gong, G. (2014). WiFi-based Location Services Attack on Dual-band Hardware Raleigh, USA. (Original work published 2014)
Qu, L., Tan, Y., Li, C., & Gong, G. (2014). More Constructions of differentially 4-uniform permutations on GF Designs, Codes and Cryptography, 1-18. (Original work published 2014)