Evolutionary ciphers against differential power analysis and differential fault analysis

M Tang, ZL Qiu, M Yang, PP Cheng, S Gao… - Science China …, 2012 - Springer
Side channel analysis(SCA) focuses on attacking cryptographic algorithm implementations
by collecting leaked information and analyzing the correlation between the leaked and key …

Polar differential power attacks and evaluation

M Tang, ZL Qiu, S Gao, M Yi, SB Liu, HG Zhang… - Science China …, 2012 - Springer
Side channel attacks (SCAs) on security software and hardware have become major concerns
on computer and system security. The existing SCAs generally require the knowledge of …

Toward reverse engineering on secret S-boxes in block ciphers

M Tang, ZL Qiu, HB Peng, XB Hu, M Yi… - Science China …, 2014 - Springer
It has been widely accepted that the security cryptosystems should be only dependent on
the security of their secret keys. However, there are still secret ciphers with unknown …

Differential power analysis on ZUC algorithm

T Ming, C PingPan, QIU ZhenLong - Cryptology ePrint Archive, 2012 - eprint.iacr.org
Stream cipher ZUC plays a crucial role in the next generation of mobile communication as it
has already been included by the 3GPP LTE-Advanced, which is a candidate standard for …

Power analysis based reverse engineering on the secret round function of block ciphers

M Tang, Z Qiu, W Li, W Sun, X Hu… - Concurrency and …, 2014 - Wiley Online Library
The recent cryptanalysis on block ciphers has two major trends. Side channel analysis (SCA)
has become a new threat to the hardware implementations of encryption algorithms. On …

Power analysis based reverse engineering on the secret round function of block ciphers

M Tang, Z Qiu, W Li, S Liu, H Zhang - Data and Knowledge Engineering …, 2012 - Springer
Side Channel Analysis (SCA) has become a new threat to the hardware implementations of
encryption algorithms. The reverse engineering has been adopted to explore the unknown …

A generic table recomputation-based higher-order masking

M Tang, Z Qiu, Z Guo, Y Mu, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Masking is a class of well-known countermeasure against side-channel attacks by employing
the idea of secret sharing. In this paper, we propose a generic table recomputation-based …

Geochronology and Geochemistry of the Early Paleozoic Ore‐host Volcanic Sequence in the Kalatag Area, East Tianshan, NW China: Implications for the Tectonic …

…, X Geng, Z Zhang, C Yang, Z Qiu - Acta Geologica …, 2023 - Wiley Online Library
The East Tianshan contains many late Paleozoic magmatic and polymetallic deposits. Recent
studies demonstrate that the early Paleozoic volcanic rocks discovered in the northern …

Comparison of Clinical Efficacy of Single-port and Double-port Video-assisted Thoracoscopic Lobectomy in the Treatment of Lung Cancer

H ZHANG, LI Zhenlong, LV Ying, Y ZHANG… - 昆明医科大学 …, 2024 - kyxuebao.kmmu.edu.cn
Objective To investigate the clinical efficacy of single-port and double port video-assisted
thoracoscopic lobectomy in the treatment of lung cancer. Methods Patients who underwent …

Alkaloid constituents from the fruits of Flueggea virosa

XIE Qiu-Jie, WY Zhang, WU Zhen-Long… - Chinese journal of …, 2020 - Elsevier
Three new indole alkaloids, flueindolines A–C (1–3), along with nine known alkaloids (4–12),
were isolated from the fruits of Flueggea virosa (Roxb. ex Willd.) Voigt. Compounds 1 and …