KLEIN: a new family of lightweight block ciphers Z Gong, S Nikova, YW Law International workshop on radio frequency identification: security and …, 2011 | 550 | 2011 |
Two certificateless aggregate signatures from bilinear maps Z Gong, Y Long, X Hong, K Chen Eighth ACIS International Conference on Software Engineering, Artificial …, 2007 | 188 | 2007 |
Compact implementation and performance evaluation of block ciphers in ATtiny devices T Eisenbarth, Z Gong, T Güneysu, S Heyse, S Indesteege, S Kerckhof, ... Progress in Cryptology-AFRICACRYPT 2012: 5th International Conference on …, 2012 | 144 | 2012 |
Compact implementation and performance evaluation of hash functions in attiny devices J Balasch, B Ege, T Eisenbarth, B Gérard, Z Gong, T Güneysu, S Heyse, ... Smart Card Research and Advanced Applications: 11th International Conference …, 2013 | 71 | 2013 |
EdgeRNN: a compact speech recognition network with spatio-temporal features for edge computing S Yang, Z Gong, K Ye, Y Wei, Z Huang, Z Huang IEEE Access 8, 81468-81478, 2020 | 55 | 2020 |
Feature map distillation of thin nets for low-resolution object recognition Z Huang, S Yang, MC Zhou, Z Li, Z Gong, Y Chen IEEE Transactions on Image Processing 31, 1364-1379, 2022 | 34 | 2022 |
Tulp: A family of lightweight message authentication codes for body sensor networks Z Gong, P Hartel, S Nikova, SH Tang, B Zhu Journal of computer science and technology 29, 53-68, 2014 | 30 | 2014 |
Improved related-key differential attacks on reduced-round LBlock S Liu, Z Gong, L Wang International Conference on Information and Communications Security, 58-69, 2012 | 28 | 2012 |
Kalwen: A new practical and interoperable key management scheme for body sensor networks YW Law, G Moniava, Z Gong, P Hartel, M Palaniswami Security and communication networks 4 (11), 1309-1329, 2011 | 28 | 2011 |
Practical Certificateless Aggregate Signatures from Bilinear Maps. Z Gong, Y Long, X Hong, K Chen J. Inf. Sci. Eng. 26 (6), 2093-2106, 2010 | 25 | 2010 |
Pseudorandomness analysis of the (extended) Lai–Massey scheme Y Luo, X Lai, Z Gong Information processing letters 111 (2), 90-96, 2010 | 22 | 2010 |
A synthetic indifferentiability analysis of some block-cipher-based hash functions Z Gong, X Lai, K Chen Designs, Codes and Cryptography 48, 293-305, 2008 | 22 | 2008 |
Password guessing based on LSTM recurrent neural networks L Xu, C Ge, W Qiu, Z Huang, Z Gong, J Guo, H Lian 2017 IEEE International Conference on Computational Science and Engineering …, 2017 | 19 | 2017 |
Software pipelining for graphic processing unit acceleration: Partition, scheduling and granularity B Liu, W Qiu, L Jiang, Z Gong The International Journal of High Performance Computing Applications 30 (2 …, 2016 | 19 | 2016 |
GPU-Based High Performance Password Recovery Technique for Hash Functions. W Qiu, Z Gong, Y Guo, B Liu, X Tang, Y Yuan J. Inf. Sci. Eng. 32 (1), 97-112, 2016 | 19 | 2016 |
Towards secure and practical MACs for body sensor networks Z Gong, P Hartel, S Nikova, B Zhu Progress in Cryptology-INDOCRYPT 2009: 10th International Conference on …, 2009 | 17 | 2009 |
EdgeCNN: Convolutional neural network classification model with small inputs for edge computing S Yang, Z Gong, K Ye, Y Wei, Z Huang, Z Huang arXiv preprint arXiv:1909.13522, 2019 | 14 | 2019 |
Comparative study of multicast authentication schemes with application to wide-area measurement system YW Law, Z Gong, T Luo, S Marusic, M Palaniswami Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 14 | 2013 |
Hardware Trojan side-channels based on physical unclonable functions Z Gong, MX Makkes IFIP International Workshop on Information Security Theory and Practices …, 2011 | 14 | 2011 |
On the security of 4-bit involutive s-boxes for lightweight designs B Liu, Z Gong, W Qiu, D Zheng International Conference on Information Security Practice and Experience …, 2011 | 14 | 2011 |