Chai, Q., & Gong, G. (2011). Differential Cryptanalysis of Two Joint Encryption and Error Correction Schemes Houston, TX, USA. (Original work published 2011)
Reference author: Q. Chai
First name
Q.
Last name
Chai
Safkhani, M., Bagheri, N., Naderi, M., Luo, Y., & Chai, Q. (2011). Tag Impersonation Attack on Two RFID Mutual Authentication Protocols Vienna, Austria. (Original work published 2011)
Chai, Q., & Gong, G. (2010). A lightweight protocol to robust TID-based anti-counterfeiting Orlando, Florida, USA. (Original work published 2010)
Chai, Q., & Gong, G. (2010). A Lightweight Protocol to Robust TID-Based Anti-Counterfeiting (Full Paper)
Luo, Y., Chai, Q., Gong, G., & Lai, X. (2010). WG-7, A Lightweight Stream Cipher With Good Cryptographic Properties Miami, Florida, USA. (Original work published 2010)
Chai, Q., & Gong, G. (2011). BUPLE: Securing Passive RFID Communication through Physical Layer Enhancements Amherst, MA, USA. (Original work published 2011)
Chai, Q., & Gong, G. (2012). BUPLE: securing passive RFID communication through physical layer enhancements Springer, Heidelberg.
Chai, Q., & Gong, G. (2012). A cryptanalysis of hummingbird-2: the differential sequence analysis International Journal of Applied Cryptography.
Chai, Q., Gong, G., & Engels, D. (2012). How to develop clairaudience — active eavesdropping in passive RFID systems (invited) San Francisco, CA, USA. (Original work published 2012)
Chai, Q., & Gong, G. (2012). Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers Ottawa, Canada. (Original work published 2012)