Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers Q Chai, G Gong 2012 IEEE international conference on communications (ICC), 917-922, 2012 | 367 | 2012 |
A lightweight stream cipher WG-7 for RFID encryption and authentication Y Luo, Q Chai, G Gong, X Lai GLOBECOM 2010, 2010 IEEE Global Telecommunications Conference, 1-6, 2010 | 93 | 2010 |
Physical layer assisted authentication for distributed ad hoc wireless sensor networks H Wen, PH Ho, C Qi, G Gong IET information security 4 (4), 390-396, 2010 | 49 | 2010 |
Tag impersonation attack on two RFID mutual authentication protocols M Safkhani, N Bagheri, M Naderi, Y Luo, Q Chai 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 18 | 2011 |
Differential cryptanalysis of two joint encryption and error correction schemes Q Chai, G Gong 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-6, 2011 | 17 | 2011 |
WG-7: a lightweight stream cipher with good cryptographic properties Y Luo, Q Chai, G Gong, X Lai IEEE Global Communications Conference–GLOBECOM, 1-6, 2010 | 17 | 2010 |
A cryptanalysis of HummingBird-2: The differential sequence analysis Q Chai, G Gong Cryptology ePrint Archive, 2012 | 15 | 2012 |
Design and analysis of security schemes for low-cost RFID systems Q Chai University of Waterloo, 2012 | 14 | 2012 |
On the (in) security of two Joint Encryption and Error Correction schemes Q Chai, G Gong International Journal of Security and Networks 6 (4), 191-200, 2011 | 13 | 2011 |
How to develop clairaudience-active eavesdropping in passive RFID systems Q Chai, G Gong, D Engels 2012 IEEE International Symposium on a World of Wireless, Mobile and …, 2012 | 12 | 2012 |
BUPLE: securing passive RFID communication through physical layer enhancements Q Chai, G Gong RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011 …, 2012 | 12 | 2012 |
An ultra-efficient key recovery attack on the lightweight stream cipher A2U2 Q Chai, X Fan, G Gong | 7* | |
Securing low-cost RFID systems: a research survey Q Chai International Journal of RFID Security and Cryptography 3 (1), 125-136, 2014 | 3 | 2014 |
Forgery Attack is a Piece of Cake on a Class of Mutual Authentication Protocols N Bagheri, M Safkhani, M Naderi, Y Luo, Q Chai International Journal of Information and Communication Technology Research 4 …, 2012 | 1 | 2012 |
Catfish–A Tunable Password Hashing Algorithm with Server-Specific Computational Shortcut (Version 1.0) B Zhu, X Fan, Q Chai, G Gong | | 2014 |
A Lightweight Protocol to Robust TID-Based Anti-Counterfeiting Q Chai, G Gong | | 2010 |
LOW-COMPLEXITY ATTACKS ON SELECTED LIGHTWEIGHT STREAM CIPHERS Q Chai, X Fan | | |