Zhu, B. ., Fan, X. ., & Gong, G. . (2014). Pleco and Plectron — Two Provably Secure Password Hashing Algorithms. IEEE Trans on Dependable and Secure Computing.
Reference author: X. Fan
First name
X.
Last name
Fan
Yang, G. ., Fan, X. ., Aagaard, M. ., & Gong, G. . (2013). Design Space Exploration of the Lightweight Stream Cipher WG-8 for FPGAs and ASICs. Montreal, Canada: ACM Press. (Original work published 2013)
Fan, X. ., Zidaric, N. ., Aagaard, M. ., & Gong, G. . (2013). Efficient Hardware Implementation of the Stream Cipher WG-16 with Composite Field Arithmetic. Berlin, Germany: ACM Press. (Original work published 2014)
Fan, X. ., Wu, T. ., & Gong, G. . (2013). An Efficient Stream Cipher WG-16 and Its Application for Securing 4G-LTE Networks. London, UK. (Original work published 2013)
Mandal, K. ., Fan, X. ., & Gong, G. . (2016). Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices. (Original work published 2016)
Fan, X. ., Gong, G. ., Schoenmakers, B. ., & Sica, F. . (2019). Secure Simultaneous Bit Extraction from Koblitz Curves. Journal Designs, Codes and Cryptography, 87, 1-13. (Original work published 2018)
- Previous page
- Currently on page 3 3