Liwei Zhang
Liwei Zhang
Geverifieerd e-mailadres voor husky.neu.edu
Titel
Geciteerd door
Geciteerd door
Jaar
A Statistics-based Fundamental Model for Side-channel Attack Analysis.
Y Fei, AA Ding, J Lao, L Zhang
IACR Cryptology ePrint Archive 2014, 152, 2014
472014
A statistical model for higher order DPA on masked devices
AA Ding, L Zhang, Y Fei, P Luo
International Workshop on Cryptographic Hardware and Embedded Systems, 147-169, 2014
462014
Towards Sound and Optimal Leakage Detection Procedure
AA Ding, L Zhang, F Durvaux, FX Standaert, Y Fei
International Conference on Smart Card Research and Advanced Applications …, 2017
282017
Towards Sound and Optimal Leakage Detection Procedure.
L Zhang, AA Ding, F Durvaux, FX Standaert, Y Fei
IACR Cryptology ePrint Archive 2017, 287, 2017
28*2017
Differential Fault Analysis of SHA3-224 and SHA3-256
P Luo, Y Fei, L Zhang, AA Ding
Fault Diagnosis and Tolerance in Cryptography (FDTC), 2016 Workshop on, 4-15, 2016
202016
A statistics-based success rate model for DPA and CPA
Y Fei, AA Ding, J Lao, L Zhang
Journal of Cryptographic Engineering 5 (4), 227-243, 2015
202015
Side-channel power analysis of different protection schemes against fault attacks on AES
P Luo, Y Fei, L Zhang, AA Ding
ReConFigurable Computing and FPGAs (ReConFig), 2014 International Conference …, 2014
152014
Towards secure cryptographic software implementation against side-channel power analysis attacks
P Luo, L Zhang, Y Fei, AA Ding
Application-specific Systems, Architectures and Processors (ASAP), 2015 IEEE …, 2015
132015
Power Analysis Attack of an AES GPU Implementation
C Luo, Y Fei, L Zhang, AA Ding, P Luo, S Mukherjee, D Kaeli
Journal of Hardware and Systems Security, 1-14, 2018
122018
Differential Fault Analysis of SHA-3 Under Relaxed Fault Models
P Luo, Y Fei, L Zhang, AA Ding
Journal of Hardware and Systems Security 1 (2), 156-172, 2017
62017
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks
L Zhang, AA Ding, Y Fei, P Luo
International Conference on the Theory and Application of Cryptology and …, 2014
52014
Compiler-Assisted Threshold Implementation Against Power Analysis Attacks
P Luo, K Athanasiou, L Zhang, ZH Jiang, Y Fei, AA Ding, T Wahl
2017 IEEE 35th International Conference on Computer Design (ICCD), 541-544, 2017
42017
Statistical Analysis for Access-Driven Cache Attacks Against AES.
L Zhang, AA Ding, Y Fei, ZH Jiang
IACR Cryptology ePrint Archive 2016, 970, 2016
32016
An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card.
P Luo, L Zhang, Y Fei, AA Ding
IACR Cryptology ePrint Archive 2016, 214, 2016
32016
Efficient 2nd-order power analysis on masked devices utilizing multiple leakage
L Zhang, AA Ding, Y Fei, P Luo
Hardware Oriented Security and Trust (HOST), 2015 IEEE International …, 2015
32015
Efficient Nonprofiling 2nd-Order Power Analysis on Masked Devices Utilizing Multiple Leakage Points
L Zhang, AA Ding, Y Fei, P Luo
IEEE Transactions on Dependable and Secure Computing, 2017
12017
Towards Sound and Optimal Leakage Detection Procedure
A Adam Ding, L Zhang, F Durvaux, FX Standaert, Y Fei
Lecture Notes in Computer Science 10728, 105, 2017
2017
Statistics in Side Channel Analysis-Modeling, Metric, Leakage Detection Testing
L Zhang
Northeastern University, 2017
2017
An Efficient Scheme to Reduce Side-Channel Leakage of MAC-Keccak for Smart Card.
P Luo, L Zhang, Y Fei, AA Ding
IACR Cryptology ePrint Archive 2015, 994, 2015
2015
Total duration of negative surplus under absolute ruin
G Sun, X Pei, H Li, L Zhang
Journal of Tianjin Normal University(Natural Science Edition) 31 (1), 21--24, 2011
2011
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20