Mandal, K., & Gong, G. (2015). Feedback reconstruction and implementations of pseudorandom number generators from composited de Bruijn sequences IEEE Transactions on Computers. (Original work published 2015)
References
Filter by:
Zhu, B., Fan, X., & Gong, G. (2015). Pleco and Plectron - Two Provably Secure Password Hashing Algorithms
Yang, G., Aagaard, M., & Gong, G. (2015). Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator (Original work published 2015)
Zhu, S., & Gong, G. (2015). Fuzzy authorization for cloud storage IEEE Transactions on Cloud Computing, Special Issue on Cloud Security, 2, 422-435. (Original work published 2014)
Hu, H., Shao, S., Gong, G., & Helleseth, T. (2014). On the proof of Lin\textquoterights conjecture Honolulu, HI. (Original work published 2014)
El-Razouk, H., Reyhani-Masoleh, A., & Gong, G. (2014). New implementations of the WG stream cipher IEEE Transactions on VLSI, 22. (Original work published 2014)
Tan, Y., Gong, G., & Zhu, B. (2014). Enhanced criteria on Differential Uniformity and Nonlinearity of Cryptographic Significant Functions Journal of Cryptography and Communications. (Original work published 2014)
Carlet, C., Gong, G., & Tan, Y. (2014). Quadratic zero-difference balanced functions, APN functions and strongly regular graphs Designs, Codes and Cryptography, 1-26. (Original work published 2014)
Feng, J., & Gong, G. (2014). WiFi-based Location Services Attack on Dual-band Hardware Raleigh, USA. (Original work published 2014)
Leung, B., Gong, G., Mcleish, D., & Robson, S. (2014). Novel last passage time based jitter model with application to low slew rate/high noise ring oscillator Journal of Analog Integrated Circuits and Signal Processing, 78, 853-863. (Original work published 2014)