Journals

  1. B. Zhu, X. Fan, and G. Gong, Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms, Under Submission.
  2. K. Mandal, X. Fan, and G. Gong, Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices, Under Submission.
  3. X. Fan, K. Mandal, and G. Gong, WG-8: A Lightweight Stream Cipher for Resource-Constrained Devices, EAI Endorsed Transactions on Security and Safety, Vol.2, Issue 3, e4, January 2015.
  4. K. Mandal, G. Gong, X. Fan, and M. Aagaard, On Selection of Optimal Parameters for the WG Stream Cipher Family, Cryptography and Communications, Vol. 6, Issue 2, pp. 117-135, June 2014.
  5. G. Gong, M. Aagaard, and X. Fan, Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations, Cryptography and Communications, Vol. 5, Issue 4, pp. 277-289, December 2013.
  6. X. Fan and G. Gong, Security Challenges in Smart-Grid Metering and Control Systems, Technology Innovation Management (TIM) Review, pp. 42-49, July 2013.
  7. K. Mandal, X. Fan, and G. Gong, Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 Passive RFID Tags, International Journal of RFID Security and Cryptography (IJRFIDSC), Vol. 2, Issue 1-4, pp. 82-91, Mar-Dec 2013.
  8. X. Fan and G. Gong, Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks, Ad Hoc Networks, Vol. 10, No. 4, pp. 723-736, June 2012.
  9. X. Fan, T. Wollinger, and G. Gong, Efficient Explicit Formulae for Genus 3 Hyperelliptic Curve Cryptosystems over Binary Fields, IET Information Security, Vol. 1, Issue 2, pp. 65-81, 2007.

Edited Books

  1. X. Fan (Ed.), Radio-Frequency Identification (RFID): Emerging Technologies, Applications and Improvement Strategies, Nova Science Publishers, Inc., New York, USA, 2014.

Book Chapters

  1. K. Mandal and X. Fan, Lightweight Cryptography for Passive RFID Systems: A Research Survey, Chapter in Radio-Frequency Identification (RFID): Emerging Technologies, Applications and Improvement Strategies, X. Fan (Ed.), Nova Science Publishers, Inc., 2014.
  2. Q. Chai and X. Fan, Low-Complexity Attacks on Selected Lightweight Stream Ciphers, Chapter in Radio-Frequency Identification (RFID): Emerging Technologies, Applications and Improvement Strategies, X. Fan (Ed.), Nova Science Publishers, Inc., 2014.
  3. X. Fan, Side-Channel Attacks on RFID Systems -- State of the Art, Chapter in Radio-Frequency Identification (RFID): Emerging Technologies, Applications and Improvement Strategies, X. Fan (Ed.), Nova Science Publishers, Inc., 2014.
  4. X. Fan and G. Gong, A Survey of Key Revocation Schemes in Mobile Ad Hoc Networks, Chapter in Handbook on Security and Networks, Y. Xiao, F.H. Li, and H. Chen (Eds.), World Scientific Publishing Co., 2011.
  5. X. Fan, T. Wollinger, and Y. Wang, Improvement of Inversion-Free Group Operations for Genus 3 Hyperelliptic Curve Cryptosystems, Chapter in New Trends in Cryptographic Systems, N. Nedjah and L.M. Mourelle (Eds.), Nova Science Publishers, 2006.

International Conferences

  1. B. Zhu, X. Fan, and G. Gong, Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms (Poster), The 5th ACM Conference on Data and Application Security and Privacy (CODASPY'15), ACM Press, pp. 127-129, 2015.
  2. B. Zhu, X. Fan, and G. Gong, Loxin -- A Solution to Password-less Universal Login, The 2014 IEEE INFOCOM Workshop on Security and Privacy in Big Data (BigSecurity 2014), IEEE Communications Society, pp. 488-493, 2014.
  3. X. Fan and G. Gong, Securing NFC with Elliptic Curve Cryptography -- Challenges and Solutions (Short Paper), The 2013 Workshop on RFID and IoT Security (RFIDSec'13 Asia), Cryptology and Information Security Series, Vol. 11, C. Ma and J. Weng (Eds.), Amsterdam, Netherlands: IOS Press, pp. 97-106, 2013.
  4. X. Fan, T. Wu, and G. Gong, An Efficient Stream Cipher WG-16 and Its Application for Securing 4G-LTE Networks, presented the 3rd International Conference on Communication and Network Security (ICCNS'13), London, United Kingdom, November 16-17, 2013.
  5. X. Fan and G. Gong, Securing ZigBee Smart Energy Profile 1.x with OpenECC Library, The First ACM Workshop on Smart Energy Grid Security (SEGS'13), ACM Press, pp. 17-22, 2013.
  6. X. Fan, N. Zidaric, M. Aagaard, and G. Gong, Efficient Hardware Implementation of the Stream Cipher WG-16 with Composite Field Arithmetic, The 2013 ACM Workshop on Trustworthy Embedded Devices (TrustED'13), ACM Press, pp. 21-34, 2013.
  7. G. Yang, X. Fan, M. Aagaard, and G. Gong, Design Space Exploration of the Lightweight Stream Cipher WG-8 for FPGAs and ASICs, The 8th Workshop on Embedded Systems Security (WESS'13), ACM Press, Article No. 8, 2013.
  8. K. Mandal, G. Gong, X. Fan, and M. Aagaard, On Selection of Optimal Parameters for the WG Stream Cipher Family, The 13th Canadian Workshop on Information Theory (CWIT'13), IEEE Information Theory Society, pp. 17-21, 2013.
  9. X. Fan, K. Mandal, and G. Gong, WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices, The 9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (Qshine 2013), ser. LNICST 115, K. Singh, A.K. Awasthi, and R. Mishra (Eds.), Berlin, Germany: Springer-Verlag, pp. 617-632, 2013.
  10. X. Fan and G. Gong, LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks, The 4th International Conference on Ad Hoc Networks (AdHocNets 2012), ser. LNICST 111, J. Zheng et al. (Eds.), Berlin, Germany: Springer-Verlag, pp. 180-195, 2012.
  11. K. Mandal, X. Fan, and G. Gong, Warbler: A Lightweight Pseudorandom Number Generator For EPC C1 Gen2 Tags, The 2012 Workshop on RFID and IoT Security (RFIDsec'12 Asia), Cryptology and Information Security Series, Vol. 8, N-W. Lo and Y. Li (Eds.), Amsterdam, Netherlands: IOS Press, pp. 73-84, 2012.
  12. X. Fan and G. Gong, On the Security of Hummingbird-2 Against Side Channel Cube Attacks, The 4th Western European Workshop on Research in Cryptology (WEWoRC 2011), ser. LNCS 7242, F. Armknecht and S. Lucks (Eds.), Berlin, Germany: Springer-Verlag, pp. 18-29, 2012.
  13. X. Fan, G. Gong, D. Engels, and E. Smith, A Lightweight Privacy-Preserving Mutual Authentication Protocol for RFID Systems, The 2011 IEEE Global Telecommunications Conference (GLOBECOM 2011), IEEE Communication Society, pp. 1123-1127, 2011.
  14. X. Fan, G. Gong, and H. Hu, Remedying the Hummingbird Cryptographic Algorithm, The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (SPIoT 2011), Changsha, Hunan, China, November 16, 2011.
  15. X. Fan and G. Gong, Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks, The 2nd International Conference on Ad Hoc Networks (AdHocNets 2010), ser. LNICST 49, J. Zheng, D. Simplot-Ryl, V. C. M. Leung (Eds.), Berlin, Germany: Springer-Verlag, pp. 328-343, 2010.
  16. X. Fan, G. Gong, K. Lauffenburger, and T. Hicks, FPGA Implementations of the Hummingbird Cryptographic Algorithm, The 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), IEEE Computer Society, pp.48-51, 2010.
  17. D. Engels, X. Fan, G. Gong, H. Hu, and E. Smith, Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices, Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, ser. LNCS 6054, R. Sion et al. (Eds.), Berlin, Germany: Springer-Verlag, pp. 3-18, 2010.
  18. X. Fan, H. Hu, G. Gong, E. Smith, and D. Engels, Lightweight Implementation of Hummingbird Cryptographic Algorithm on 4-Bit Microcontrollers, The 4th International Conference for Internet Technology and Secured Transactions (ICITST 2009), pp. 838-844, 2009.
  19. X. Fan, G. Gong, and D. Jao, Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates, The 15th Annual Workshop on Selected Areas in Cryptography (SAC 2008), ser. LNCS 5381, R. Avanzi, L. Keliher, and F. Sica (Eds.), Berlin, Germany: Springer-Verlag, pp. 18-34, 2009.
  20. X. Fan and G. Gong, Key Revocation based on Dirichlet Multinomial Model for Mobile Ad Hoc Networks, The 33rd IEEE Conference on Local Computer Networks (LCN 2008), IEEE Computer Society, pp. 958-965, 2008.
  21. X. Fan, G. Gong, and D. Jao, Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms, The Second International Conference on Pairing-Based Cryptography (Pairing 2008), ser. LNCS 5209, S.D. Galbraith and K.G. Paterson (Eds.), Berlin, Germany: Springer-Verlag, pp. 243-264, 2008.
  22. X. Fan and G. Gong, Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations, The 14th Annual Workshop on Selected Areas in Cryptography (SAC 2007), ser. LNCS 4876, C. Adams, A. Miri, and M. Wiener (Eds.), Berlin, Germany: Springer-Verlag, pp. 155-172, 2007.
  23. X. Fan, T. Wollinger, and Y. Wang, Efficient Doubling on Genus 3 Curves over Binary Fields, The Cryptographer's Track at the RSA Conference (CT-RSA 2006), ser. LNCS 3860, D. Pointcheval (Ed.), Berlin, Germany: Springer-Verlag, pp. 64-81, 2006.
  24. X. Fan, T. Wollinger, and Y. Wang, Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations, International Conference on Information Technology: Coding and Computing (ITCC 2005), IEEE Computer Society, pp. 642-647, 2005.
  25. X. Fan and Y. Wang, Simultaneous Divisor Class Addition-Subtraction Algorithm and Its Applications to Hyperelliptic Curve Cryptosystem, The IEEE 19th International Conference on Advanced Information Networking and Applications (AINA 2005), IEEE Computer Society, pp. 978-983, 2005.