Chai, Q. ., & Gong, G. . (2011). Differential Cryptanalysis of Two Joint Encryption and Error Correction Schemes. Houston, TX, USA. (Original work published 2011)
Reference author: Q. Chai
First name
Q.
Last name
Chai
Safkhani, M. ., Bagheri, N. ., Naderi, M. ., Luo, Y. ., & Chai, Q. . (2011). Tag Impersonation Attack on Two RFID Mutual Authentication Protocols. Vienna, Austria. (Original work published 2011)
Chai, Q. ., & Gong, G. . (2010). A lightweight protocol to robust TID-based anti-counterfeiting. Orlando, Florida, USA. (Original work published 2010)
Chai, Q. ., & Gong, G. . (2010). A Lightweight Protocol to Robust TID-Based Anti-Counterfeiting (Full Paper).
Luo, Y. ., Chai, Q. ., Gong, G. ., & Lai, X. . (2010). WG-7, A Lightweight Stream Cipher With Good Cryptographic Properties. Miami, Florida, USA. (Original work published 2010)
Chai, Q. ., & Gong, G. . (2012). BUPLE: securing passive RFID communication through physical layer enhancements. Springer, Heidelberg.
Chai, Q. ., & Gong, G. . (2012). A cryptanalysis of hummingbird-2: the differential sequence analysis. International Journal of Applied Cryptography.
Chai, Q. ., Gong, G. ., & Engels, D. . (2012). How to develop clairaudience — active eavesdropping in passive RFID systems (invited). San Francisco, CA, USA. (Original work published 2012)
Chai, Q. ., & Gong, G. . (2012). Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. Ottawa, Canada. (Original work published 2012)
Chai, Q. ., & Gong, G. . (2011). BUPLE: Securing Passive RFID Communication through Physical Layer Enhancements. Amherst, MA, USA. (Original work published 2011)