Xinxin Fan
Xinxin Fan
Home
Publications
Media Coverage
Industry Contributions
Talks
Light
Dark
Automatic
2
Supporting Blockchain based Cryptocurrency Mobile Payment with Smart Devices
The smart device owning rate such as smart phone and smart watch is higher than ever before and mobile payment has become one of the …
Lei Xu
,
Lin Chen
,
Zhimin Gao
,
Larry Carranco
,
Xinxin Fan
,
Nolan Shah
,
Nour Diallo
,
Weidong Shi
Cite
DOI
Best Paper Award
DIoTA: Decentralized Ledger Based Framework for Data Authenticity Protection in IoT Systems
It is predicted that more than 20 billion IoT devices will be deployed worldwide by 2020. These devices form the critical …
Lei Xu
,
Lin Chen
,
Zhimin Gao
,
Xinxin Fan
,
Taeweon Suh
,
Weidong Shi
PDF
Cite
DOI
Secure Simultaneous Bit Extraction from Koblitz Curves
Secure pseudo-random number generators (PRNGs) have a lot of important applications in cryptography. In this paper, we analyze a new …
Xinxin Fan
,
Guang Gong
,
Berry Schoenmakers
,
Francesco Sica
,
Andrey Sidorenko
Cite
DOI
Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
With recent studies in Searchable Symmetric Encryption (SSE), a client can efficiently perform keyword queries over its outsourced data …
Boyang Wang
,
Xinxin Fan
Cite
DOI
Secure Simultaneous Bit Extraction from Koblitz Curves
Point compression is an essential technique to save bandwidth and memory when deploying elliptic curve based security solutions in …
Xinxin Fan
,
Adilet Otemissov
,
Francesco Sica
,
Andrey Sidorenko
Cite
DOI
Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices
With the advent of ubiquitous computing and the Internet of Things (IoT), the security and privacy issues for various smart devices …
Kalikinkar Mandal
,
Xinxin Fan
,
Guang Gong
Cite
DOI
WG-8: A Lightweight Stream Cipher for Resource-Constrained Devices
Lightweight cryptographic primitives are essential for securing pervasive embedded devices like RFID tags, smart cards, and wireless …
Xinxin Fan
,
Kalikinkar Mandal
,
Guang Gong
Cite
DOI
On Selection of Optimal Parameters for the WG Stream Cipher Family
A general structure of the Welch-Gong (WG) stream cipher family is based on filtering an m-sequence of degree $l$ over a finite field …
Kalikinkar Mandal
,
Guang Gong
,
Xinxin Fan
,
Mark Aagaard
Cite
DOI
An Efficient Stream Cipher WG-16 and Its Application for Securing 4G-LTE Networks
The fourth generation of mobile telecommunications system (marketed as 4G-LTE) is being commercially and widely deployed. Security …
Xinxin Fan
,
Teng Wu
,
Guang Gong
Cite
DOI
Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations
The stream cipher WG-7 is a lightweight variant of the well-known Welch- Gong (WG) stream cipher family, targeted to …
Guang Gong
,
Mark Aagaard
,
Xinxin Fan
Cite
DOI
»
Cite
×