default search action
Yongbin Zhou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j45]Huaxin Wang, Yiwen Gao, Yuejun Liu, Qian Zhang, Yongbin Zhou:
In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium. Cybersecur. 7(1): 21 (2024) - [j44]Ziming Jiang, Yongbin Zhou, Yuejun Liu:
New partial key exposure attacks on RSA with additive exponent blinding. Cybersecur. 7(1): 26 (2024) - [j43]Ziming Jiang, Yongbin Zhou, Yuejun Liu:
Partial key exposure attacks on Prime Power RSA with non-consecutive blocks. Theor. Comput. Sci. 1019: 114845 (2024) - [j42]Jiangshan Long, Changhai Ou, Chenxu Wang, Zhu Wang, Yongbin Zhou:
What Is Now Possible? Security Evaluation on Univariate DPA Attacks With Inaccurate Leakage Models. IEEE Trans. Inf. Forensics Secur. 19: 8441-8456 (2024) - [c49]Mingyao Shao, Yuejun Liu, Yongbin Zhou:
Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond. AsiaCCS 2024 - [c48]Yong Liu, Yuejun Liu, Yongbin Zhou, Yiwen Gao, Zehua Qiao, Huaxin Wang:
A Novel Power Analysis Attack against CRYSTALS-Dilithium Implementation. ETS 2024: 1-6 - [c47]Haichen Wang, Shuchao Pang, Zhigang Lu, Yihang Rao, Yongbin Zhou, Minhui Xue:
dp-promise: Differentially Private Diffusion Probabilistic Models for Image Synthesis. USENIX Security Symposium 2024 - [c46]Xinkuan Qiu, Meina Kan, Yongbin Zhou, Yanchao Bi, Shiguang Shan:
Shape-biased CNNs are Not Always Superior in Out-of-Distribution Robustness. WACV 2024: 2315-2324 - [i27]Yong Liu, Yuejun Liu, Yongbin Zhou, Yiwen Gao, Zehua Qiao, Huaxin Wang:
A Novel Power Analysis Attack against CRYSTALS-Dilithium Implementation. IACR Cryptol. ePrint Arch. 2024: 111 (2024) - [i26]Zehua Qiao, Yuejun Liu, Yongbin Zhou, Yuhan Zhao, Shuyi Chen:
Single Trace is All It Takes: Efficient Side-channel Attack on Dilithium. IACR Cryptol. ePrint Arch. 2024: 512 (2024) - [i25]Debao Wang, Yiwen Gao, Yongbin Zhou, Xian Huang:
Revisiting a Realistic EM Side-Channel Attack on a Complex Modern SoC. IACR Cryptol. ePrint Arch. 2024: 1322 (2024) - 2023
- [j41]Ti Wang, Yongbin Zhou, Hui Ma, Rui Zhang:
Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud. Comput. J. 66(6): 1507-1524 (2023) - [j40]Chengbin Jin, Yongbin Zhou:
Enhancing Deep-Learning Based Side-Channel Analysis Through Simultaneously Multi-Byte Training. Comput. J. 66(11): 2674-2704 (2023) - [j39]Chengbin Jin, Yongbin Zhou:
Enhancing non-profiled side-channel attacks by time-frequency analysis. Cybersecur. 6(1): 15 (2023) - [j38]Zehua Qiao, Yuejun Liu, Yongbin Zhou, Jingdian Ming, Chengbin Jin, Huizhong Li:
Practical Public Template Attack Attacks on CRYSTALS-Dilithium With Randomness Leakages. IEEE Trans. Inf. Forensics Secur. 18: 1-14 (2023) - [c45]Zhongcheng Zhang, Yan Ou, Ying Liu, Chenxi Wang, Yongbin Zhou, Xiaoyu Wang, Yuyang Zhang, Yucheng Ouyang, Jiahao Shan, Ying Wang, Jingling Xue, Huimin Cui, Xiaobing Feng:
Occamy: Elastically Sharing a SIMD Co-processor across Multiple CPU Cores. ASPLOS (3) 2023: 483-497 - [c44]Jingdian Ming, Yongbin Zhou, Wei Cheng, Huizhong Li:
Table Re-Computation Based Low Entropy Inner Product Masking Scheme. DATE 2023: 1-6 - [c43]Ya-nan Chen, Yiwen Gao, Yuejun Liu, Yongbin Zhou:
Low Latency Implementations of CRYSTALS-Dilithium for Cloud Applications. HPCC/DSS/SmartCity/DependSys 2023: 679-686 - [c42]Guanghui Liu, Yuejun Liu, Yongbin Zhou, Yiwen Gao:
Recovering Multi-prime RSA Keys with Erasures and Errors. ISPEC 2023: 266-283 - [i24]Mingyao Shao, Yuejun Liu, Yongbin Zhou:
Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond. IACR Cryptol. ePrint Arch. 2023: 887 (2023) - [i23]Zehua Qiao, Yuejun Liu, Yongbin Zhou, Mingyao Shao, Shuo Sun:
When NTT Meets SIS: Efficient Side-channel Attacks on Dilithium and Kyber. IACR Cryptol. ePrint Arch. 2023: 1866 (2023) - [i22]Huaxin Wang, Yiwen Gao, Yuejun Liu, Qian Zhang, Yongbin Zhou:
In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium. IACR Cryptol. ePrint Arch. 2023: 1891 (2023) - 2022
- [j37]Chengbin Jin, Yongbin Zhou, Xinkuan Qiu, Qi Feng, Qian Zhang:
Breaking real-world COTS USIM cards with unknown side-channel countermeasures. Comput. Secur. 113: 102531 (2022) - [j36]Shuo Sun, Yongbin Zhou, Yunfeng Ji, Rui Zhang, Yang Tao:
Generic, efficient and isochronous Gaussian sampling over the integers. Cybersecur. 5(1): 10 (2022) - [j35]Yuejun Liu, Yongbin Zhou, Rui Zhang, Yang Tao:
(Full) Leakage resilience of Fiat-Shamir signatures over lattices. Frontiers Comput. Sci. 16(5) (2022) - [j34]Jingdian Ming, Yongbin Zhou, Wei Cheng, Huizhong Li:
Optimizing Higher-Order Correlation Analysis Against Inner Product Masking Scheme. IEEE Trans. Inf. Forensics Secur. 17: 3555-3568 (2022) - [c41]Yongbin Zhou, Xinyue Wang, Daozhong Zhang:
Forecasting of Extreme Weather Intensity Based on Grey Model. ICCIR 2022: 202-206 - [c40]Shuo Sun, Yongbin Zhou, Rui Zhang, Yang Tao, Zehua Qiao, Jingdian Ming:
Fast Fourier Orthogonalization over NTRU Lattices. ICICS 2022: 109-127 - [i21]Jiangshan Long, Chenxu Wang, Changhai Ou, Zhu Wang, Yongbin Zhou, Ming Tang:
One for All, All for One: A Unified Evaluation Framework for Univariate DPA Attacks. IACR Cryptol. ePrint Arch. 2022: 1360 (2022) - 2021
- [j33]Jingdian Ming, Yongbin Zhou, Huizhong Li, Qian Zhang:
A secure and highly efficient first-order masking scheme for AES linear operations. Cybersecur. 4(1): 14 (2021) - [j32]Huizhong Li, Guang Yang, Jingdian Ming, Yongbin Zhou, Chengbin Jin:
Transparency order versus confusion coefficient: a case study of NIST lightweight cryptography S-Boxes. Cybersecur. 4(1): 35 (2021) - [j31]Yuchen Cao, Yongbin Zhou, Hailong Zhang:
Multi-channel time-frequency fusion attacks. Int. J. Inf. Comput. Secur. 16(1/2): 84-102 (2021) - [j30]Ruixin Shi, Yongbin Zhou, Yong Li, Weili Han:
Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study. Secur. Commun. Networks 2021: 5563884:1-5563884:16 (2021) - [j29]Jingdian Ming, Huizhong Li, Yongbin Zhou, Wei Cheng, Zehua Qiao:
Revealing the Weakness of Addition Chain Based Masked SBox Implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 326-350 (2021) - [j28]Ti Wang, Hui Ma, Yongbin Zhou, Rui Zhang, Zishuai Song:
Fully Accountable Data Sharing for Pay-as-You-Go Cloud Scenes. IEEE Trans. Dependable Secur. Comput. 18(4): 2005-2016 (2021) - [j27]Yiwen Gao, Yongbin Zhou:
Side-Channel Attacks With Multi-Thread Mixed Leakage. IEEE Trans. Inf. Forensics Secur. 16: 770-785 (2021) - [j26]Yuejun Liu, Yongbin Zhou, Shuo Sun, Tianyu Wang, Rui Zhang, Jingdian Ming:
On the Security of Lattice-Based Fiat-Shamir Signatures in the Presence of Randomness Leakage. IEEE Trans. Inf. Forensics Secur. 16: 1868-1879 (2021) - [c39]Xiaoyan Yu, Qingbin Liu, Shizhu He, Kang Liu, Shengping Liu, Jun Zhao, Yongbin Zhou:
Multi-strategy Knowledge Distillation Based Teacher-Student Framework for Machine Reading Comprehension. CCL 2021: 209-225 - [c38]Jinwei Wang, Yong Li, Xi Chen, Yongbin Zhou:
Modeling Password Guessability via Variational Auto-Encoder. CSCWD 2021: 348-353 - [c37]Jingdian Ming, Wei Cheng, Yongbin Zhou, Huizhong Li:
APT: Efficient Side-Channel Analysis Framework against Inner Product Masking Scheme. ICCD 2021: 575-582 - [c36]Xuwei Lai, Yongbin Zhou, Lei Jiang, Guofu Ding:
A Review: Machine Tools Digital Twin Modeling And Application. ICAC 2021: 1-6 - [c35]Tianyu Wang, Yuejun Liu, Jun Xu, Lei Hu, Yang Tao, Yongbin Zhou:
Integer LWE with Non-subgaussian Error and Related Attacks. ISC 2021: 3-25 - [i20]Shuo Sun, Yongbin Zhou, Yunfeng Ji, Rui Zhang, Yang Tao:
Generic, Efficient and Isochronous Gaussian Sampling over the Integers. IACR Cryptol. ePrint Arch. 2021: 199 (2021) - 2020
- [j25]Huizhong Li, Yongbin Zhou, Jingdian Ming, Guang Yang, Chengbin Jin:
The Notion of Transparency Order, Revisited. Comput. J. 63(12): 1915-1938 (2020) - [j24]Yiwen Gao, Yongbin Zhou, Wei Cheng:
Efficient electro-magnetic analysis of a GPU bitsliced AES implementation. Cybersecur. 3(1): 3 (2020) - [j23]Jingdian Ming, Yongbin Zhou, Wei Cheng, Huizhong Li, Guang Yang, Qian Zhang:
Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes. IEEE Trans. Inf. Forensics Secur. 15: 3694-3708 (2020) - [c34]Ti Wang, Yongbin Zhou, Hui Ma, Yuejun Liu, Rui Zhang:
Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack. Inscrypt 2020: 83-103 - [i19]Yiwen Gao, Yongbin Zhou:
Side-channel Attacks with Multi-thread Mixed Leakage. IACR Cryptol. ePrint Arch. 2020: 1047 (2020)
2010 – 2019
- 2019
- [j22]Yuejun Liu, Rui Zhang, Yongbin Zhou:
Predicate encryption against master-key tampering attacks. Cybersecur. 2(1): 22 (2019) - [j21]Jun Lai, Yongbin Zhou, Jinmao Lin, Yirui Cong, Jun Yang:
Cooperative Localization Based on Efficient Covariance Intersection. IEEE Commun. Lett. 23(5): 871-874 (2019) - [j20]Hailong Zhang, Yongbin Zhou:
Template attack vs. stochastic model: An empirical study on the performances of profiling attacks in real scenarios. Microprocess. Microsystems 66: 43-54 (2019) - [c33]Guang Yang, Huizhong Li, Jingdian Ming, Yongbin Zhou:
CDAE: Towards Empowering Denoising in Side-Channel Analysis. ICICS 2019: 269-286 - [i18]Huizhong Li, Yongbin Zhou, Jingdian Ming, Guang Yang, Chengbin Jin:
The Notion of Transparency Order, Revisited. IACR Cryptol. ePrint Arch. 2019: 683 (2019) - [i17]Yuejun Liu, Yongbin Zhou, Shuo Sun, Tianyu Wang, Rui Zhang:
On Security of Fiat-Shamir Signatures over Lattice in the Presence of Randomness Leakage. IACR Cryptol. ePrint Arch. 2019: 715 (2019) - 2018
- [j19]Hailong Zhang, Yongbin Zhou:
On the exact relationship between the Mutual Information Metric and the Success Rate Metric. Inf. Sci. 435: 15-25 (2018) - [j18]Hailong Zhang, Yongbin Zhou:
Multiple leakage samples based higher order optimal distinguisher. Inf. Sci. 466: 92-108 (2018) - [c32]Guang Yang, Huizhong Li, Jingdian Ming, Yongbin Zhou:
Convolutional Neural Network Based Side-Channel Attacks in Time-Frequency Representations. CARDIS 2018: 1-17 - [c31]Yiwen Gao, Hailong Zhang, Wei Cheng, Yongbin Zhou, Yuchen Cao:
Electro-magnetic analysis of GPU-based AES implementation. DAC 2018: 121:1-121:6 - [c30]Xiong Liu, Dong Yin, Yongbin Zhou, Zhihong Liu, Yueke Wang:
Dispatching and management methods for communication of UAV swarm. HP3C 2018: 61-67 - [c29]Qian Zhang, Yongbin Zhou, Shuang Qiu, Wei Cheng, Jingdian Ming, Rui Zhang:
A Compact AES Hardware Implementation Secure Against 1st-Order Side-Channel Attacks. ICCD 2018: 545-552 - [c28]Yiwen Gao, Wei Cheng, Hailong Zhang, Yongbin Zhou:
Cache-Collision Attacks on GPU-Based AES Implementation with Electro-Magnetic Leakages. TrustCom/BigDataSE 2018: 300-306 - [i16]Jingdian Ming, Wei Cheng, Huizhong Li, Guang Yang, Yongbin Zhou, Qian Zhang:
Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure. IACR Cryptol. ePrint Arch. 2018: 745 (2018) - [i15]Yiwen Gao, Yongbin Zhou, Wei Cheng:
How Does Strict Parallelism Affect Security? A Case Study on the Side-Channel Attacks against GPU-based Bitsliced AES Implementation. IACR Cryptol. ePrint Arch. 2018: 1080 (2018) - 2017
- [j17]Hailong Zhang, Yongbin Zhou:
Mahalanobis Distance Similarity Measure Based Higher Order Optimal Distinguisher. Comput. J. 60(8): 1131-1144 (2017) - [j16]Zhijun Meng, Jun Yang, Xiye Guo, Yongbin Zhou:
Ranging Consistency Based on Ranging-Compensated Temperature-Sensing Sensor for Inter-Satellite Link of Navigation Constellation. Sensors 17(6): 1369 (2017) - [j15]Wei Yang, Yongbin Zhou, Yuchen Cao, Hailong Zhang, Qian Zhang, Huan Wang:
Multi-Channel Fusion Attacks. IEEE Trans. Inf. Forensics Secur. 12(8): 1757-1771 (2017) - [j14]Rui Zhang, Shuang Qiu, Yongbin Zhou:
Further Improving Efficiency of Higher Order Masking Schemes by Decreasing Randomness Complexity. IEEE Trans. Inf. Forensics Secur. 12(11): 2590-2598 (2017) - [c27]Shuang Qiu, Rui Zhang, Yongbin Zhou, Hailong Zhang:
Reducing Randomness Complexity of Mask Refreshing Algorithm. ICICS 2017: 88-101 - [c26]Yongbin Zhou, Jun Lai, Yifan Zhou, Jinmao Lin, Ninghu Yang, Jun Yang:
Cooperative simultaneous autonomous orbit determination and time synchronization: A distributed factor graph approach. SPAWC 2017: 1-6 - [i14]Wei Cheng, Chao Zheng, Yuchen Cao, Yongbin Zhou, Hailong Zhang, Sylvain Guilley, Laurent Sauvage:
How Far Can We Reach? Breaking RSM-Masked AES-128 Implementation Using Only One Trace. IACR Cryptol. ePrint Arch. 2017: 1144 (2017) - [i13]Shuang Qiu, Rui Zhang, Yongbin Zhou, Wei Cheng:
Corrections to "Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexity". IACR Cryptol. ePrint Arch. 2017: 1244 (2017) - 2016
- [j13]Hailong Zhang, Yongbin Zhou:
How many interesting points should be used in a template attack? J. Syst. Softw. 120: 105-113 (2016) - [j12]Chengyu Hu, Rupeng Yang, Pengtao Liu, Zuoxia Yu, Yongbin Zhou, Qiuliang Xu:
Public-key encryption with keyword search secure against continual memory attacks. Secur. Commun. Networks 9(11): 1613-1629 (2016) - [j11]Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
Towards optimal leakage exploitation rate in template attacks. Secur. Commun. Networks 9(16): 3116-3126 (2016) - [j10]Shuang Qiu, Rui Zhang, Yuchen Cao, Wei Yang, Yongbin Zhou, Tian Ding:
A statistical model for DPA when algorithmic noise is dependent on target. Secur. Commun. Networks 9(18): 4882-4896 (2016) - [j9]Hailong Zhang, Yongbin Zhou, Dengguo Feng:
Theoretical and practical aspects of multiple samples correlation power analysis. Secur. Commun. Networks 9(18): 5166-5177 (2016) - [j8]Chengyu Hu, Pengtao Liu, Yongbin Zhou, Shanqing Guo, Yilei Wang, Qiuliang Xu:
Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks. Soft Comput. 20(12): 4919-4932 (2016) - [j7]Wei Yang, Yuchen Cao, Yongbin Zhou, Hailong Zhang, Qian Zhang:
Distance Based Leakage Alignment for Side Channel Attacks. IEEE Signal Process. Lett. 23(4): 419-423 (2016) - [c25]Yuchen Cao, Yongbin Zhou, Hailong Zhang, Wei Yang:
Hilbert Transform Based Vertical Preprocessing for Side-Channel Analysis. ICCCN 2016: 1-7 - [c24]Wei Cheng, Yongbin Zhou, Laurent Sauvage:
Differential Fault Analysis on Midori. ICICS 2016: 307-317 - 2015
- [j6]Chengyu Hu, Zuoxia Yu, Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Qixia Yuan:
Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption. Int. J. Embed. Syst. 7(3/4): 216-229 (2015) - [j5]Hailong Zhang, Yongbin Zhou, Dengguo Feng:
Mahalanobis distance similarity measure based distinguisher for template attack. Secur. Commun. Networks 8(5): 769-777 (2015) - [c23]Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Rui Zhang, Chengyu Hu, Zuoxia Yu:
Updatable Hash Proof System and Its Applications. ESORICS (1) 2015: 266-285 - [c22]Chao Zheng, Yongbin Zhou, Yingxian Zheng:
A Fast Implementation of MPC-KSA Side-Channel Distinguisher. ICCCN 2015: 1-7 - [c21]Jiehui Tang, Yongbin Zhou, Hailong Zhang, Shuang Qiu:
Higher-Order Masking Schemes for Simon. ICICS 2015: 379-392 - [c20]Guangjun Fan, Yongbin Zhou, François-Xavier Standaert, Dengguo Feng:
On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes. ISPEC 2015: 469-484 - 2014
- [j4]Danyang Chen, Yongbin Zhou, Yang Han, Rui Xue, Qing He:
On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives. Inf. Sci. 271: 213-223 (2014) - [c19]Yingxian Zheng, Yongbin Zhou, Zhenmei Yu, Chengyu Hu, Hailong Zhang:
How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice? ICICS 2014: 200-214 - [c18]Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
How to Choose Interesting Points for Template Attacks More Effectively? INTRUST 2014: 168-183 - [c17]Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
Template Attacks Based on Priori Knowledge. INTRUST 2014: 346-363 - [i12]Zuoxia Yu, Qiuliang Xu, Yongbin Zhou, Chengyu Hu, Rupeng Yang, Guangjun Fan:
Weak-Key Leakage Resilient Cryptography. IACR Cryptol. ePrint Arch. 2014: 159 (2014) - [i11]Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
How to Choose Interesting Points for Template Attacks? IACR Cryptol. ePrint Arch. 2014: 332 (2014) - [i10]Guangjun Fan, Yongbin Zhou, Dengguo Feng:
Template Attacks Based On Priori Knowledge. IACR Cryptol. ePrint Arch. 2014: 583 (2014) - [i9]Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
How to Choose Interesting Points for Template Attack More Effectively? IACR Cryptol. ePrint Arch. 2014: 864 (2014) - 2013
- [c16]Mingliang Feng, Yongbin Zhou, Zhenmei Yu:
EMD-Based Denoising for Side-Channel Attacks and Relationships between the Noises Extracted with Different Denoising Methods. ICICS 2013: 259-274 - [c15]Hui Zhao, Yongbin Zhou, François-Xavier Standaert, Hailong Zhang:
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers. ISPEC 2013: 336-352 - [i8]Hui Zhao, Yongbin Zhou, François-Xavier Standaert, Hailong Zhang:
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers. IACR Cryptol. ePrint Arch. 2013: 91 (2013) - [i7]Yuchen Cao, Yongbin Zhou, Zhenmei Yu:
On the Negative Effects of Trend Noise and Its Applications in Side-Channel Cryptanalysis. IACR Cryptol. ePrint Arch. 2013: 102 (2013) - [i6]Guangjun Fan, Yongbin Zhou, François-Xavier Standaert, Dengguo Feng:
On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient ElGamal Encryption. IACR Cryptol. ePrint Arch. 2013: 213 (2013) - [i5]Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
Towards Leakage Exploitation Optimality in Profiled Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2013: 608 (2013) - [i4]Guangjun Fan, Yongbin Zhou, Chengyu Hu, Dengguo Feng:
Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function. IACR Cryptol. ePrint Arch. 2013: 802 (2013) - 2012
- [i3]Danyang Chen, Yongbin Zhou, Yang Han, Rui Xue, Qing He:
On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives. IACR Cryptol. ePrint Arch. 2012: 114 (2012) - 2011
- [c14]Feijiang Huang, Xiaochun Lu, Jun Yang, Qingxiao Shan, Jianyun Chen, Yongbin Zhou:
Analysis of GEO intersatellite laser time transfer and link performance. EMEIT 2011: 1814-1817 - [c13]Hailong Zhang, Yongbin Zhou, Dengguo Feng:
An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks. ICISC 2011: 61-73 - [c12]Shuguo Yang, Yongbin Zhou, Jiye Liu, Danyang Chen:
Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations. ICISC 2011: 169-185 - [c11]Jiye Liu, Yongbin Zhou, Yang Han, Jiantang Li, Shuguo Yang, Dengguo Feng:
How to Characterize Side-Channel Leakages More Accurately? ISPEC 2011: 196-207 - [i2]Jiye Liu, Yongbin Zhou, Shuguo Yang, Dengguo Feng:
Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation. IACR Cryptol. ePrint Arch. 2011: 694 (2011) - 2010
- [c10]Haining Chen, Yongbin Zhou, Wenling Wu, Na Wang:
Fault Propagation Pattern Based DFA on Feistel Ciphers, with Application to Camellia. CIT 2010: 1050-1057 - [c9]Ning Shang, Gabriel Ghinita, Yongbin Zhou, Elisa Bertino:
Controlling data disclosure in computational PIR protocols. AsiaCCS 2010: 310-313
2000 – 2009
- 2009
- [j3]Dongrui Fan, Nan Yuan, Junchao Zhang, Yongbin Zhou, Wei Lin, Fenglong Song, Xiaochun Ye, He Huang, Lei Yu, Guoping Long, Hao Zhang, Lei Liu:
Godson-T: An Efficient Many-Core Architecture for Parallel Program Executions. J. Comput. Sci. Technol. 24(6): 1061-1073 (2009) - [c8]Yongbin Zhou, Junchao Zhang, Dongrui Fan:
Software and Hardware Cooperate for 1-D FFT Algorithm Optimization on Multicore Processors. CIT (1) 2009: 86-91 - [c7]Nan Yuan, Yongbin Zhou, Guangming Tan, Junchao Zhang, Dongrui Fan:
High Performance Matrix Multiplication on Many Cores. Euro-Par 2009: 948-959 - [c6]Yongbin Zhou, Junchao Zhang, Shuai Zhang, Nan Yuan, Dongrui Fan:
Data Management: The Spirit to Pursuit Peak Performance on Many-Core Processor. ISPA 2009: 559-564 - 2008
- [c5]Limin Fan, Yongbin Zhou, Dengguo Feng:
A Fast Implementation of Computing the Transparency Order of S-Boxes. ICYCS 2008: 206-211 - [c4]Yongbin Zhou, Jun Yang, Yueke Wang:
A New Method for Measuring Single Event Effect Susceptibility of L1 Cache Unit. SSIRI 2008: 203-204 - 2007
- [c3]Xuehai Qian, He Huang, Zhenzhong Duan, Junchao Zhang, Nan Yuan, Yongbin Zhou, Hao Zhang, Huimin Cui, Dongrui Fan:
Optimized Register Renaming Scheme for Stack-Based x86 Operations. ARCS 2007: 43-56 - 2005
- [j2]Yongbin Zhou, Zhenfeng Zhang, Dengguo Feng:
Cryptanalysis of the end-to-end security for mobile communications with end-user identification/authentication. IEEE Commun. Lett. 9(4): 372-374 (2005) - [c2]Zhenfeng Zhang, Dengguo Feng, Jing Xu, Yongbin Zhou:
Efficient ID-Based Optimistic Fair Exchange with Provable Security. ICICS 2005: 14-26 - [i1]Yongbin Zhou, Dengguo Feng:
Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing. IACR Cryptol. ePrint Arch. 2005: 388 (2005) - 2004
- [c1]Yongbin Zhou, Zhenfeng Zhang, Sihan Qing, Juan Liu:
A New CEMBS Based on RSA Signatures and Its Application in Constructing Fair Exchange Protocol. EEE 2004: 560-564 - 2003
- [j1]Qingguang Ji, Sihan Qing, Yongbin Zhou, Dengguo Feng:
Study on Strand Space Model Theory. J. Comput. Sci. Technol. 18(5): 553-570 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint