Xinxin Fan
Xinxin Fan
IoTeX, Internet of Trusted Things
Verified email at iotex.io - Homepage
Title
Cited by
Cited by
Year
Hummingbird: ultra-lightweight cryptography for resource-constrained devices
D Engels, X Fan, G Gong, H Hu, EM Smith
International Conference on Financial Cryptography and Data Security, 3-18, 2010
1432010
Wg-8: A lightweight stream cipher for resource-constrained smart devices
X Fan, K Mandal, G Gong
International Conference on Heterogeneous Networking for Quality …, 2013
582013
Accelerating signature-based broadcast authentication for wireless sensor networks
X Fan, G Gong
Ad Hoc Networks 10 (4), 723-736, 2012
542012
FPGA implementations of the Hummingbird cryptographic algorithm
X Fan, G Gong, K Lauffenburger, T Hicks
2010 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2010
492010
Ultra-lightweight cryptography for low-cost RFID tags: Hummingbird algorithm and protocol
D Engels, X Fan, G Gong, H Hu, EM Smith
Centre for Applied Cryptographic Research (CACR) Technical Reports 29, 2009
472009
Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers
X Fan, H Hu, G Gong, EM Smith, D Engels
2009 International Conference for Internet Technology and Secured …, 2009
432009
Security challenges in smart-grid metering and control systems
X Fan, G Gong
Technology Innovation Management Review 3 (7), 2013
362013
Design and implementation of Warbler family of lightweight pseudorandom number generators for smart devices
K Mandal, X Fan, G Gong
ACM Transactions on Embedded Computing Systems (TECS) 15 (1), 1-28, 2016
312016
RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks
L Yang, Q Zheng, X Fan
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
202017
Specification of the stream cipher WG-16 based confidentiality and integrity algorithms
X Fan, G Gong
University of Waterloo, Waterloo, ON, Canada, Tech. Rep. CACR 6, 2013, 2013
182013
Lpkm: A lightweight polynomial-based key management protocol for distributed wireless sensor networks
X Fan, G Gong
International Conference on Ad Hoc Networks, 180-195, 2012
182012
On the Security of Hummingbird-2 against Side Channel Cube Attacks
X Fan, G Gong
Western European Workshop on Research in Cryptology, 18-29, 2011
172011
Optimal parameters for the WG stream cipher family
K Mandal, G Gong, X Fan, M Aagaard
Cryptography and Communications 6 (2), 117-135, 2014
162014
Warbler: A lightweight pseudorandom number generator for EPC C1 Gen2 passive RFID tags
K Mandal, X Fan, G Gong
Int. J. RFID Secur. Cryptogr 2 (1), 82-91, 2013
152013
Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 Tags.
K Mandal, X Fan, G Gong
RFIDSec Asia, 73-84, 2012
152012
Efficient explicit formulae for genus 2 hyperelliptic curves over prime fields and their implementations
X Fan, G Gong
International Workshop on Selected Areas in Cryptography, 155-172, 2007
152007
Efficient hardware implementation of the stream cipher WG-16 with composite field arithmetic
X Fan, N Zidaric, M Aagaard, G Gong
Proceedings of the 3rd international workshop on Trustworthy embedded …, 2013
142013
Design space exploration of the lightweight stream cipher WG-8 for FPGAs and ASICs
G Yang, X Fan, M Aagaard, G Gong
Proceedings of the Workshop on Embedded Systems Security, 1-10, 2013
132013
Efficient pairing computation on genus 2 curves in projective coordinates
X Fan, G Gong, D Jao
International Workshop on Selected Areas in Cryptography, 18-34, 2008
132008
Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems over binary fields
X Fan, T Wollinger, G Gong
IET Information Security 1 (2), 65-81, 2007
112007
The system can't perform the operation now. Try again later.
Articles 1–20