Wu, T., & Gong, G. (2013). The weakness of integrity protection for LTE Budapest, Hungary: Technical Report. (Original work published 2013)
Reference author: T. Wu
First name
T.
Last name
Wu
Wu, T., Tan, Y., Mandal, K., & Gong, G. (2015). On the multi-output filtering model and its applications Submitted to Journal of Cryptography and Communications. (Original work published 2015)
Wu, T., & Gong, G. (2015). Two new message authentication codes based on APN functions and stream ciphers Security and Communication Networks. (Original work published 2015)
Fan, X., Wu, T., & Gong, G. (2013). An Efficient Stream Cipher WG-16 and Its Application for Securing 4G-LTE Networks London, UK. (Original work published 2013)
Wu, T., Tan, Y., Mandal, K., & Gong, G. (2017). On the Multi-Output Filtering Model and Its Applications (Original work published 2017)
Tan, Y., Mandal, K., Wu, T., & Gong, G. (2016). Security Analysis of TUAK Algorithms for 4G-LTE Authentication and Key Agreement Waikoloa, Hawaii, USA. (Original work published 2016)
Mandal, K., Tan, Y., Wu, T., & Gong, G. (2015). A comprehensive security analysis of the TUAK algorithm set IEEE Transactions on Information Forensics and Security. (Original work published 2015)