Fan, X., & Gong, G. (2012). LPKM: A lightweight polynomial-based key management protocol for distributed wireless sensor networks (Original work published 2012)
Reference author: X. Fan
First name
X.
Last name
Fan
Gong, G., Aagaard, M., & Fan, X. (2012). Resilience to distinguishing attacks on WG-7 cipher and their generalizations Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences.
Fan, X., & Gong, G. (2012). On the security of Hummingbird-2 against side channel cube attacks Springer Verlag. (Original work published 2012)
Mandal, K., Fan, X., & Gong, G. (2012). Warbler: a lightweight pseudorandom number generator gor EPC C1 Gen2 RFID tags Amsterdam, Netherlands: IOS Press.
Gong, G., Aagaard, M., & Fan, X. (2013). Resilience to distinguishing attacks on WG-7 cipher and their generalizations Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences, 5, 277-289. (Original work published 2013)
Fan, X., & Gong, G. (2013). Securing NFC with Elliptic Curve Cryptography — Challenges and Solutions (Short Paper) Amsterdam, Netherlands: IOS Press. (Original work published 2013)
Fan, X., & Gong, G. (2013). Securing ZigBee Smart Energy Profile 1.x with OpenECC Library Berlin, Germany: ACM Press. (Original work published 2013)
Zhu, B., Fan, X., & Gong, G. (2015). Pleco and Plectron - Two Provably Secure Password Hashing Algorithms
Zhu, B., Fan, X., & Gong, G. (2014). Loxin — A Solution to Password-less Universal Login Toronto, Canada.
Mandal, K., Gong, G., Fan, X., & Aagaard, M. (2014). Optimal Parameters for the WG Stream Cipher Family Cryptography and Communications, 6, 117-135. (Original work published 2014)
- Previous page
- Currently on page 2 2
- Next page