Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Gong, Guang Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 2 of 2 reviews    
   A unified method for finding impossible differentials of block cipher structures
Luo Y., Lai X., Wu Z., Gong G. Information Sciences 263211-220, 2014.  Type: Article

Impossible differential analysis is widely used as a cryptographic tool for key recovering or distinguishing attacks on block ciphers. There are mainly two methods for searching impossible differentials: one is case-by-case analysis an...
...
Nov 6 2014  
  Communication system security
Chen L., Gong G., Chapman & Hall/CRC, Boca Raton, FL, 2012. 750 pp.  Type: Book (978-1-439840-36-8)

Lidong Chen, of the National Institute of Standards and Technology, and Guang Gong, of the University of Waterloo, formulated the material in this text while teaching courses for engineers at the graduate and advanced undergraduate lev...
...
Aug 28 2012  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy