Yang, Y., Tang, X., & Gong, G. (2017). New Almost Perfect, Odd Perfect, and Perfect Sequences from Difference Balanced Functions with d-form Property Advances in Mathematics of Communications, 11, 67-76. (Original work published 2017)
References
Filter by:
Rohit, R., Altawy, R., & Gong, G. (2017). MILP-based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher St Catherine\textquoterights College, University of Oxford, Oxford, UK. (Original work published 2017)
Liu, Q., Gong, G., Wang, Y., & Li, H. (2017). A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach Mobile Information Systems, 2017, 12. (Original work published 2017)
Wang, Z., & Gong, G. (2017). Discrete Fourier Transform of Boolean Functions over the Complex Field and Its Applications IEEE Transactions on Information Theory Special Issue on Shift-Register Sequences, Codes and Cryptography in Memory of Solomon W. Golomb. (Original work published 2018)
Liu, Q., & Gong, G. (2016). Physical Layer Secure Information Exchange Protocol for MIMO Ad hoc Networks Against Passive Attacks Washington DC, USA. (Original work published 2016)
Qu, L., Tan, Y., Li, C., & Gong, G. (2016). More results on differentially 4-uniform permutations on $F_2^2k$ Designs, Codes and Cryptography, 78, 391-408. (Original work published 2016)
Mandal, K., Fan, X., & Gong, G. (2016). Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices (Original work published 2016)
Tan, Y., Mandal, K., Wu, T., & Gong, G. (2016). Security Analysis of TUAK Algorithms for 4G-LTE Authentication and Key Agreement Waikoloa, Hawaii, USA. (Original work published 2016)
Carlet, C., Gong, G., & Tan, Y. (2016). Quadratic zero-difference balanced functions, APN functions and strongly regular graphs Designs, Codes and Cryptography, 78, 629-654. (Original work published 2016)
Huo, F., Mitran, P., & Gong, G. (2016). Analysis and validation of active eavesdropping attacks in passive FHSS RFID systems IEEE Transactions on Information Forensics and Security, 11, 1528-1541. (Original work published 2016)