Fan, X. ., & Gong, G. . (2012). LPKM: A lightweight polynomial-based key management protocol for distributed wireless sensor networks. (Original work published 2012)
Reference author: X. Fan
First name
X.
Last name
Fan
Gong, G. ., Aagaard, M. ., & Fan, X. . (2012). Resilience to distinguishing attacks on WG-7 cipher and their generalizations. Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences.
Fan, X. ., & Gong, G. . (2012). On the security of Hummingbird-2 against side channel cube attacks. Springer Verlag. (Original work published 2012)
Mandal, K. ., Fan, X. ., & Gong, G. . (2012). Warbler: a lightweight pseudorandom number generator gor EPC C1 Gen2 RFID tags. Amsterdam, Netherlands: IOS Press.
Gong, G. ., Aagaard, M. ., & Fan, X. . (2013). Resilience to distinguishing attacks on WG-7 cipher and their generalizations. Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences, 5, 277-289. (Original work published 2013)
Fan, X. ., & Gong, G. . (2013). Securing NFC with Elliptic Curve Cryptography — Challenges and Solutions (Short Paper). Amsterdam, Netherlands: IOS Press. (Original work published 2013)
Fan, X. ., & Gong, G. . (2013). Securing ZigBee Smart Energy Profile 1.x with OpenECC Library. Berlin, Germany: ACM Press. (Original work published 2013)
Zhu, B. ., Fan, X. ., & Gong, G. . (2015). Pleco and Plectron - Two Provably Secure Password Hashing Algorithms.
Zhu, B. ., Fan, X. ., & Gong, G. . (2014). Loxin — A Solution to Password-less Universal Login. Toronto, Canada.
Mandal, K. ., Gong, G. ., Fan, X. ., & Aagaard, M. . (2014). Optimal Parameters for the WG Stream Cipher Family. Cryptography and Communications, 6, 117-135. (Original work published 2014)
- Previous page
- Currently on page 2 2
- Next page