Huo, F., & Gong, G. (2014). Physical Layer Phase Encryption for Combating the Traffic Analysis Attack Raleigh, USA. (Original work published 2014)
References
Filter by:
Zhu, B., Fan, X., & Gong, G. (2014). Pleco and Plectron — Two Provably Secure Password Hashing Algorithms IEEE Trans on Dependable and Secure Computing.
Zhu, B., & Gong, G. (2014). Multidimensional Meet-in-the-Middle Attack and Its Applications to KATAN32/48/64 Journal of Cryptography and Communications, Discrete Structures, Boolean Functions and Sequences (CCDS), 6, 313-333. (Original work published 2014)
Hu, H., Shao, S., Gong, G., & Helleseth, T. (2014). On the proof of Lin\textquoterights conjecture Honolulu, HI. (Original work published 2014)
Wang, Z., Parker, M., Gong, G., & Wu, G. (2014). On the PMEPR of binary Golay sequences of length 2^n IEEE Transactions on Information Theory, 60, 2391-2398. (Original work published 2014)
Chung, J.-H., Gong, G., & Yang, K. (2014). New Families of Optimal Frequency-Hopping Sequences of Composite Lengths IEEE Transactions on Information Theory, 60, 3688-3697. (Original work published 2014)
Tan, Y., Mandal, K., & Gong, G. (2014). Characterization of Theta Effect Kernel and Differential Cryptanalysis of Keccak Design, Codes and Cryptography.
Feng, J., & Gong, G. (2014). WiFi-based Location Services Attack on Dual-band Hardware Raleigh, USA. (Original work published 2014)
Hu, H., Shao, S., Gong, G., & Helleseth, T. (2014). The Proof of Lin\textquoterights Conjecture via the Decimation-Hadamard Transform IEEE Transactions on Information Theory, 60, 5054-5064. (Original work published 2014)
Zhu, B., Fan, X., & Gong, G. (2014). Loxin — A Solution to Password-less Universal Login Toronto, Canada.