The weakness of integrity protection for LTE T Wu, G Gong Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013 | 29 | 2013 |
An efficient stream cipher WG-16 and its application for securing 4G-LTE networks XX Fan, T Wu, G Gong Applied Mechanics and Materials 490, 1436-1450, 2014 | 7 | 2014 |
Security assessment of TUAK algorithm set G Gong, K Mandal, Y Tan, T Wu CACR Technical Report, University of Waterloo, 2014 | 5 | 2014 |
Two new message authentication codes based on APN functions and stream ciphers T Wu, G Gong Security and Communication Networks 9 (12), 1864-1871, 2016 | 2 | 2016 |
On message authentication in 4G LTE system T Wu University of Waterloo, 2015 | 1 | 2015 |
On the multi-output filtering model and its applications T Wu, Y Tan, K Mandal, G Gong International Conference on Codes, Cryptology, and Information Security, 265-281, 2017 | | 2017 |
New Message Authentication Code Based on APN Functions and Stream Ciphers T Wu, G Gong Network and System Security: 9th International Conference, NSS 2015, New …, 2015 | | 2015 |
On the Multi-output Filtering Model and Its Applications G Gong, K Mandal, Y Tan, T Wu Cryptology ePrint Archive, 2014 | | 2014 |