Follow
Gefei Li
Gefei Li
Keyfactor
Verified email at keyfactor.com
Title
Cited by
Cited by
Year
Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices
Y Gao, G Li, H Ma, SF Al-Sarawi, O Kavehei, D Abbott, DC Ranasinghe
2016 IEEE International Conference on Pervasive Computing and Communication …, 2016
952016
A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs
Y Gao, DC Ranasinghe, G Li, SF Al-Sarawi, O Kavehei, D Abbott
92015
Exploiting transformations of the Galois configuration to improve guess-and-determine attacks on NFSRs
G Li, Y Yarom, DC Ranasinghe
Cryptology ePrint Archive, 2015
42015
Exploiting PUF models for error free response generation
Y Gao, H Ma, G Li, S Zeitouni, SF Al-Sarawi, D Abbott, AR Sadeghi, ...
arXiv preprint arXiv:1701.08241, 2017
32017
FairMod-Making Predictive Models Discrimination Aware
J Liu, J Li, L Liu, TD Le, F Ye, G Li
arXiv preprint arXiv:1811.01480, 2018
22018
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher
Y Yarom, G Li, DC Ranasinghe
Applied Cryptography and Network Security (ACNS), 2015
12015
The system can't perform the operation now. Try again later.
Articles 1–6