Segui
Raullen Chai
Raullen Chai
Email verificata su engmail.uwaterloo.ca
Titolo
Citata da
Citata da
Anno
Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers
Q Chai, G Gong
2012 IEEE international conference on communications (ICC), 917-922, 2012
3282012
A lightweight stream cipher WG-7 for RFID encryption and authentication
Y Luo, Q Chai, G Gong, X Lai
GLOBECOM 2010, 2010 IEEE Global Telecommunications Conference, 1-6, 2010
872010
Physical layer assisted authentication for distributed ad hoc wireless sensor networks
H Wen, PH Ho, C Qi, G Gong
IET information security 4 (4), 390-396, 2010
482010
Differential cryptanalysis of two joint encryption and error correction schemes
Q Chai, G Gong
2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-6, 2011
172011
Tag impersonation attack on two RFID mutual authentication protocols
M Safkhani, N Bagheri, M Naderi, Y Luo, Q Chai
2011 Sixth International Conference on Availability, Reliability and …, 2011
172011
WG-7: a lightweight stream cipher with good cryptographic properties
Y Luo, Q Chai, G Gong, X Lai
IEEE Global Communications Conference–GLOBECOM, 1-6, 2010
172010
A cryptanalysis of HummingBird-2: The differential sequence analysis
Q Chai, G Gong
Cryptology ePrint Archive, 2012
152012
Design and analysis of security schemes for low-cost RFID systems
Q Chai
University of Waterloo, 2012
132012
On the (in) security of two Joint Encryption and Error Correction schemes
Q Chai, G Gong
International Journal of Security and Networks 6 (4), 191-200, 2011
132011
BUPLE: securing passive RFID communication through physical layer enhancements
Q Chai, G Gong
RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011 …, 2012
122012
How to develop clairaudience-active eavesdropping in passive RFID systems
Q Chai, G Gong, D Engels
2012 IEEE International Symposium on a World of Wireless, Mobile and …, 2012
112012
An ultra-efficient key recovery attack on the lightweight stream cipher A2U2
Q Chai, X Fan, G Gong
7*
Securing low-cost RFID systems: a research survey
Q Chai
International Journal of RFID Security and Cryptography 3 (1), 125-136, 2014
32014
Forgery Attack is a Piece of Cake on a Class of Mutual Authentication Protocols
N Bagheri, M Safkhani, M Naderi, Y Luo, Q Chai
International Journal of Information and Communication Technology Research 4 …, 2012
12012
Catfish–A Tunable Password Hashing Algorithm with Server-Specific Computational Shortcut (Version 1.0)
B Zhu, X Fan, Q Chai, G Gong
2014
A Lightweight Protocol to Robust TID-Based Anti-Counterfeiting
Q Chai, G Gong
2010
LOW-COMPLEXITY ATTACKS ON SELECTED LIGHTWEIGHT STREAM CIPHERS
Q Chai, X Fan
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–17