PrivFL: Practical privacy-preserving federated regressions on high-dimensional data over mobile networks K Mandal, G Gong Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security …, 2019 | 112 | 2019 |
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices X Fan, K Mandal, G Gong QSHINE 2013 115, 617 -- 632, 2013 | 90 | 2013 |
sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives R AlTawy, R Rohit, M He, K Mandal, G Yang, G Gong Selected Areas in Cryptography–SAC 2017: 24th International Conference …, 2018 | 51 | 2018 |
Design and implementation of warbler family of lightweight pseudorandom number generators for smart devices K Mandal, X Fan, G Gong ACM Transactions on Embedded Computing Systems (TECS) 15 (1), 1-28, 2016 | 46 | 2016 |
Nike-based fast privacy-preserving highdimensional data aggregation for mobile devices K Mandal, G Gong, C Liu IEEE T Depend Secure, 142-149, 2018 | 45 | 2018 |
Cryptographically strong de Bruijn sequences with large periods K Mandal, G Gong Selected Areas in Cryptography: 19th International Conference, SAC 2012 …, 2013 | 45 | 2013 |
ACE: An authenticated encryption and hash algorithm M Aagaard, R AlTawy, G Gong, K Mandal, R Rohit Submission to NIST-LWC (announced as round 2 candidate on August 30, 2019), 2019 | 39 | 2019 |
A new approach to fast near-optimal channel assignment in cellular mobile networks GK Audhya, K Sinha, K Mandal, R Dattagupta, SC Ghosh, BP Sinha IEEE Transactions on Mobile Computing 12 (9), 1814-1827, 2012 | 34 | 2012 |
SLISCP-light: Towards Hardware Optimized Sponge-specific Cryptographic Permutations R Altawy, R Rohit, M He, K Mandal, G Yang, G Gong ACM Transactions on Embedded Computing Systems (TECS) 17 (4), 1-26, 2018 | 33 | 2018 |
Feedback reconstruction and implementations of pseudorandom number generators from composited de Bruijn sequences K Mandal, G Gong IEEE Transactions on Computers 65 (9), 2725-2738, 2015 | 26 | 2015 |
WAGE: an authenticated encryption with a twist R AlTawy, G Gong, K Mandal, R Rohit IACR Transactions on Symmetric Cryptology, 132-159, 2020 | 23 | 2020 |
Optimal parameters for the WG stream cipher family K Mandal, G Gong, X Fan, M Aagaard Cryptography and Communications 6 (2), 117 - 135, 2014 | 21 | 2014 |
Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 Passive RFID Tags K Mandal, X Fan, G Gong International Journal of RFID Security and Cryptography 2 (1-4), 82 - 91, 2013 | 21 | 2013 |
Efficient composited de Bruijn sequence generators B Yang, K Mandal, MD Aagaard, G Gong IEEE Transactions on Computers 66 (8), 1354-1368, 2017 | 20 | 2017 |
Despicable me (ter): Anonymous and fine-grained metering data reporting with dishonest meters M Ambrosin, H Hosseini, K Mandal, M Conti, R Poovendran 2016 IEEE conference on communications and network security (CNS), 163-171, 2016 | 20 | 2016 |
Probabilistic Generation of Good Span n Sequences from Nonlinear Feedback Shift Registers K Mandal, G Gong University of Waterloo, preprint, 2012 | 19 | 2012 |
Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 Tags K Mandal, X Fan, G Gong Radio Frequency Identification System Security: RFIDsec'12 Asia Workshop …, 2013 | 18 | 2013 |
Spix: An authenticated cipher submission to the NIST LWC competition R AlTawy, G Gong, M He, K Mandal, R Rohit Submitted to NIST Lightweight Standardization Process, 2019 | 16 | 2019 |
WAGE: An authenticated cipher M Aagaard, R AlTawy, G Gong, K Mandal, R Rohit, N Zidaric Submission to NIST Lightweight Cryptography Standardization Project …, 2019 | 14 | 2019 |
Towards a cryptographic minimal design: The sLiSCP family of permutations R AlTawy, R Rohit, M He, K Mandal, G Yang, G Gong IEEE Transactions on Computers 67 (9), 1341-1358, 2018 | 12 | 2018 |