Wu, T. ., & Gong, G. . (2013). The weakness of integrity protection for LTE. Budapest, Hungary: Technical Report. (Original work published 2013)
Reference author: T. Wu
First name
T.
Last name
Wu
Wu, T. ., Tan, Y. ., Mandal, K. ., & Gong, G. . (2015). On the multi-output filtering model and its applications. Submitted to Journal of Cryptography and Communications. (Original work published 2015)
Wu, T. ., & Gong, G. . (2015). Two new message authentication codes based on APN functions and stream ciphers. Security and Communication Networks. (Original work published 2015)
Fan, X. ., Wu, T. ., & Gong, G. . (2013). An Efficient Stream Cipher WG-16 and Its Application for Securing 4G-LTE Networks. London, UK. (Original work published 2013)
Wu, T. ., Tan, Y. ., Mandal, K. ., & Gong, G. . (2017). On the Multi-Output Filtering Model and Its Applications. (Original work published 2017)
Tan, Y. ., Mandal, K. ., Wu, T. ., & Gong, G. . (2016). Security Analysis of TUAK Algorithms for 4G-LTE Authentication and Key Agreement. Waikoloa, Hawaii, USA. (Original work published 2016)
Mandal, K. ., Tan, Y. ., Wu, T. ., & Gong, G. . (2015). A comprehensive security analysis of the TUAK algorithm set. IEEE Transactions on Information Forensics and Security. (Original work published 2015)