Mandal, K., Gong, G., Fan, X., & Aagaard, M. (2014). Optimal Parameters for the WG Stream Cipher Family Cryptography and Communications, 6, 117-135. (Original work published 2014)
Reference author: K. Mandal
First name
K.
Last name
Mandal
Altawy, R., Rohit, R., He, M., Mandal, K., Yang, G., & Gong, G. (2017). Towards a Cryptographic Minimal Design: The sLiSCP Family of Permutations To Appear at IEEE Transactions on Computers. CACR Technical Report Cacr2017-04, University of Waterloo.
Mandal, K., Fan, X., & Gong, G. (2016). Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices (Original work published 2016)
Mandal, K., & Gong, G. (2016). Feedback Reconstruction and Implementations of Pseudorandom Number Generators from Composited De Bruijn Sequences IEEE Transactions on Computers, 65, 2725-2738. (Original work published 2016)
Mandal, K., & Gong, G. (2016). Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications ICST Transactions on Security Safety, 16. (Original work published 2016)
Mandal, K., Yang, B., Guang, G., & Aagaard, M. (2016). On ideal t-tuple distribution of filtering de. Bruijn sequence generators Chengdu, China. (Original work published 2016)
Tan, Y., Mandal, K., Wu, T., & Gong, G. (2016). Security Analysis of TUAK Algorithms for 4G-LTE Authentication and Key Agreement Waikoloa, Hawaii, USA. (Original work published 2016)
Mandal, K., Tan, Y., Wu, T., & Gong, G. (2015). A comprehensive security analysis of the TUAK algorithm set IEEE Transactions on Information Forensics and Security. (Original work published 2015)
Mandal, K., & Gong, G. (2018). On Ideal t-Tuple Distribution of Orthogonal Functions in Filtering De Bruijn Generators Journal of Advances in Mathematics of Communications. Retrieved from http://cacr.uwaterloo.ca/techreports/2018/cacr2018-09.pdf (Original work published 2018)
Mandal, K., Gong, G., & Liu, C. (2018). NIKE-based Fast Privacy-preserving High-dimensional Data Aggregation for Mobile Devices Submitted to IEEE Transaction on Dependable and Secure Computing, Technical Report, University of Waterloo. (Original work published 2018)
- Previous page
- Currently on page 2 2
- Next page