关注
Hailong Zhang
Hailong Zhang
Insititute of Information Engineering
在 iie.ac.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
How to compare selections of points of interest for side-channel distinguishers in practice?
Y Zheng, Y Zhou, Z Yu, C Hu, H Zhang
Information and Communications Security: 16th International Conference …, 2015
292015
Electro-magnetic analysis of GPU-based AES implementation
Y Gao, H Zhang, W Cheng, Y Zhou, Y Cao
Proceedings of the 55th Annual Design Automation Conference, 1-6, 2018
282018
How to choose interesting points for template attacks more effectively?
G Fan, Y Zhou, H Zhang, D Feng
Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China …, 2015
252015
A lightweight anonymous mutual authentication with key agreement protocol on ECC
W Zhang, D Lin, H Zhang, C Chen, X Zhou
2017 IEEE Trustcom/BigDataSE/ICESS, 170-176, 2017
212017
Multi-channel fusion attacks
W Yang, Y Zhou, Y Cao, H Zhang, Q Zhang, H Wang
IEEE Transactions on Information Forensics and Security 12 (8), 1757-1771, 2017
212017
Systematic construction and comprehensive evaluation of kolmogorov-smirnov test based side-channel distinguishers
H Zhao, Y Zhou, FX Standaert, H Zhang
Information Security Practice and Experience: 9th International Conference …, 2013
172013
How many interesting points should be used in a template attack?
H Zhang, Y Zhou
Journal of Systems and Software 120, 105-113, 2016
132016
Cache-collision attacks on GPU-based AES implementation with electro-magnetic leakages
Y Gao, W Cheng, H Zhang, Y Zhou
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
102018
Theoretical and practical aspects of multiple samples correlation power analysis
H Zhang, Y Zhou, D Feng
Security and Communication Networks 9 (18), 5166-5177, 2016
102016
On the exact relationship between the success rate of template attack and different parameters
H Zhang
IEEE Transactions on Information Forensics and Security 15, 681-694, 2019
92019
Distance based leakage alignment for side channel attacks
W Yang, Y Cao, Y Zhou, H Zhang, Q Zhang
IEEE Signal Processing Letters 23 (4), 419-423, 2016
92016
Mahalanobis distance similarity measure based distinguisher for template attack
H Zhang, Y Zhou, D Feng
Security and Communication Networks 8 (5), 769-777, 2015
82015
Template attack vs. stochastic model: An empirical study on the performances of profiling attacks in real scenarios
H Zhang, Y Zhou
Microprocessors and Microsystems 66, 43-54, 2019
72019
An efficient leakage characterization method for profiled power analysis attacks
H Zhang, Y Zhou, D Feng
Information Security and Cryptology-ICISC 2011: 14th International …, 2012
62012
A lightweight FourQ primitive on ARM cortex-M0
W Zhang, D Lin, H Zhang, X Zhou, Y Gao
2018 17th IEEE International Conference on Trust, Security and Privacy in …, 2018
52018
On the exact relationship between the mutual information metric and the success rate metric
H Zhang, Y Zhou
Information Sciences 435, 15-25, 2018
52018
How to Effectively Decrease the Resource Requirement in Template Attack?
H Zhang
Advances in Information and Computer Security: 9th International Workshop on …, 2014
52014
Verifiable public-key encryption with keyword search secure against continual memory attacks
C Hu, Z Li, P Liu, R Yang, S Guo, H Zhang
Mobile Networks and Applications, 1-11, 2021
42021
Side-channel leakage detection based on constant parameter channel model
W Yang, H Zhang, Y Gao, A Fu, S Wei
2020 IEEE 38th International Conference on Computer Design (ICCD), 553-560, 2020
42020
Template attack assisted linear cryptanalysis on outer rounds protected DES implementations
H Zhang, W Yang
The Computer Journal 66 (6), 1434-1451, 2023
32023
系统目前无法执行此操作,请稍后再试。
文章 1–20