A Statistics-based Fundamental Model for Side-channel Attack Analysis. Y Fei, AA Ding, J Lao, L Zhang IACR Cryptology ePrint Archive 2014, 152, 2014 | 72 | 2014 |
Towards Sound and Optimal Leakage Detection Procedure AA Ding, L Zhang, F Durvaux, FX Standaert, Y Fei International Conference on Smart Card Research and Advanced Applications …, 2017 | 62 | 2017 |
A statistical model for higher order DPA on masked devices AA Ding, L Zhang, Y Fei, P Luo International Workshop on Cryptographic Hardware and Embedded Systems, 147-169, 2014 | 58 | 2014 |
A statistics-based success rate model for DPA and CPA Y Fei, AA Ding, J Lao, L Zhang Journal of Cryptographic Engineering 5 (4), 227-243, 2015 | 46 | 2015 |
Differential Fault Analysis of SHA3-224 and SHA3-256 P Luo, Y Fei, L Zhang, AA Ding Fault Diagnosis and Tolerance in Cryptography (FDTC), 2016 Workshop on, 4-15, 2016 | 31 | 2016 |
Power Analysis Attack of an AES GPU Implementation C Luo, Y Fei, L Zhang, AA Ding, P Luo, S Mukherjee, D Kaeli Journal of Hardware and Systems Security, 1-14, 2018 | 22 | 2018 |
Side-channel power analysis of different protection schemes against fault attacks on AES P Luo, Y Fei, L Zhang, AA Ding ReConFigurable Computing and FPGAs (ReConFig), 2014 International Conference …, 2014 | 20 | 2014 |
Towards secure cryptographic software implementation against side-channel power analysis attacks P Luo, L Zhang, Y Fei, AA Ding Application-specific Systems, Architectures and Processors (ASAP), 2015 IEEE …, 2015 | 18 | 2015 |
Towards Sound and Optimal Leakage Detection Procedure. L Zhang, AA Ding, F Durvaux, FX Standaert, Y Fei IACR Cryptology ePrint Archive 2017, 287, 2017 | 16 | 2017 |
Differential Fault Analysis of SHA-3 Under Relaxed Fault Models P Luo, Y Fei, L Zhang, AA Ding Journal of Hardware and Systems Security 1 (2), 156-172, 2017 | 12 | 2017 |
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks L Zhang, AA Ding, Y Fei, P Luo International Conference on the Theory and Application of Cryptology and …, 2014 | 11 | 2014 |
Statistical Analysis for Access-Driven Cache Attacks Against AES. L Zhang, AA Ding, Y Fei, ZH Jiang IACR Cryptology ePrint Archive 2016, 970, 2016 | 8 | 2016 |
Compiler-Assisted Threshold Implementation Against Power Analysis Attacks P Luo, K Athanasiou, L Zhang, ZH Jiang, Y Fei, AA Ding, T Wahl 2017 IEEE 35th International Conference on Computer Design (ICCD), 541-544, 2017 | 6 | 2017 |
An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card. P Luo, L Zhang, Y Fei, AA Ding IACR Cryptology ePrint Archive 2016, 214, 2016 | 6 | 2016 |
Efficient 2nd-order power analysis on masked devices utilizing multiple leakage L Zhang, AA Ding, Y Fei, P Luo Hardware Oriented Security and Trust (HOST), 2015 IEEE International …, 2015 | 4 | 2015 |
Efficient Nonprofiling 2nd-Order Power Analysis on Masked Devices Utilizing Multiple Leakage Points L Zhang, AA Ding, Y Fei, P Luo IEEE Transactions on Dependable and Secure Computing, 2017 | 3 | 2017 |
Statistics in Side Channel Analysis-Modeling, Metric, Leakage Detection Testing L Zhang Northeastern University, 2017 | 1 | 2017 |
Towards Sound and Optimal Leakage Detection Procedure A Adam Ding, L Zhang, F Durvaux, FX Standaert, Y Fei Lecture Notes in Computer Science 10728, 105, 2017 | | 2017 |
An Efficient Scheme to Reduce Side-Channel Leakage of MAC-Keccak for Smart Card. P Luo, L Zhang, Y Fei, AA Ding IACR Cryptology ePrint Archive 2015, 994, 2015 | | 2015 |
Total duration of negative surplus under absolute ruin G Sun, X Pei, H Li, L Zhang Journal of Tianjin Normal University(Natural Science Edition) 31 (1), 21--24, 2011 | | 2011 |