Follow
Zheng Gong
Zheng Gong
Professor of Computer Science, South China Normal University
Verified email at scnu.edu.cn
Title
Cited by
Cited by
Year
KLEIN: a new family of lightweight block ciphers
Z Gong, S Nikova, YW Law
International workshop on radio frequency identification: security and …, 2011
5742011
Two certificateless aggregate signatures from bilinear maps
Z Gong, Y Long, X Hong, K Chen
Eighth ACIS International Conference on Software Engineering, Artificial …, 2007
1932007
Compact implementation and performance evaluation of block ciphers in ATtiny devices
T Eisenbarth, Z Gong, T Güneysu, S Heyse, S Indesteege, S Kerckhof, ...
Progress in Cryptology-AFRICACRYPT 2012: 5th International Conference on …, 2012
1492012
Compact implementation and performance evaluation of hash functions in attiny devices
J Balasch, B Ege, T Eisenbarth, B Gérard, Z Gong, T Güneysu, S Heyse, ...
Smart Card Research and Advanced Applications: 11th International Conference …, 2013
702013
EdgeRNN: a compact speech recognition network with spatio-temporal features for edge computing
S Yang, Z Gong, K Ye, Y Wei, Z Huang, Z Huang
IEEE Access 8, 81468-81478, 2020
592020
Feature map distillation of thin nets for low-resolution object recognition
Z Huang, S Yang, MC Zhou, Z Li, Z Gong, Y Chen
IEEE Transactions on Image Processing 31, 1364-1379, 2022
432022
Tulp: A family of lightweight message authentication codes for body sensor networks
Z Gong, P Hartel, S Nikova, SH Tang, B Zhu
Journal of computer science and technology 29, 53-68, 2014
312014
Kalwen: A new practical and interoperable key management scheme for body sensor networks
YW Law, G Moniava, Z Gong, P Hartel, M Palaniswami
Security and communication networks 4 (11), 1309-1329, 2011
292011
Improved related-key differential attacks on reduced-round LBlock
S Liu, Z Gong, L Wang
International Conference on Information and Communications Security, 58-69, 2012
272012
Practical Certificateless Aggregate Signatures from Bilinear Maps.
Z Gong, Y Long, X Hong, K Chen
J. Inf. Sci. Eng. 26 (6), 2093-2106, 2010
262010
Pseudorandomness analysis of the (extended) Lai–Massey scheme
Y Luo, X Lai, Z Gong
Information processing letters 111 (2), 90-96, 2010
232010
A synthetic indifferentiability analysis of some block-cipher-based hash functions
Z Gong, X Lai, K Chen
Designs, Codes and Cryptography 48, 293-305, 2008
222008
Password guessing based on LSTM recurrent neural networks
L Xu, C Ge, W Qiu, Z Huang, Z Gong, J Guo, H Lian
2017 IEEE International Conference on Computational Science and Engineering …, 2017
212017
Software pipelining for graphic processing unit acceleration: Partition, scheduling and granularity
B Liu, W Qiu, L Jiang, Z Gong
The International Journal of High Performance Computing Applications 30 (2 …, 2016
202016
GPU-Based High Performance Password Recovery Technique for Hash Functions.
W Qiu, Z Gong, Y Guo, B Liu, X Tang, Y Yuan
J. Inf. Sci. Eng. 32 (1), 97-112, 2016
192016
EdgeCNN: Convolutional neural network classification model with small inputs for edge computing
S Yang, Z Gong, K Ye, Y Wei, Z Huang, Z Huang
arXiv preprint arXiv:1909.13522, 2019
162019
Comparative study of multicast authentication schemes with application to wide-area measurement system
YW Law, Z Gong, T Luo, S Marusic, M Palaniswami
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
142013
On the security of 4-bit involutive s-boxes for lightweight designs
B Liu, Z Gong, W Qiu, D Zheng
International Conference on Information Security Practice and Experience …, 2011
142011
Towards secure and practical MACs for body sensor networks
Z Gong, P Hartel, S Nikova, B Zhu
International Conference on Cryptology in India, 182-198, 2009
142009
A two‐phase knowledge distillation model for graph convolutional network‐based recommendation
Z Huang, Z Lin, Z Gong, Y Chen, Y Tang
International Journal of Intelligent Systems 37 (9), 5902-5923, 2022
132022
The system can't perform the operation now. Try again later.
Articles 1–20