How to compare selections of points of interest for side-channel distinguishers in practice? Y Zheng, Y Zhou, Z Yu, C Hu, H Zhang Information and Communications Security: 16th International Conference …, 2015 | 29 | 2015 |
Electro-magnetic analysis of GPU-based AES implementation Y Gao, H Zhang, W Cheng, Y Zhou, Y Cao Proceedings of the 55th Annual Design Automation Conference, 1-6, 2018 | 28 | 2018 |
How to choose interesting points for template attacks more effectively? G Fan, Y Zhou, H Zhang, D Feng Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China …, 2015 | 25 | 2015 |
A lightweight anonymous mutual authentication with key agreement protocol on ECC W Zhang, D Lin, H Zhang, C Chen, X Zhou 2017 IEEE Trustcom/BigDataSE/ICESS, 170-176, 2017 | 21 | 2017 |
Multi-channel fusion attacks W Yang, Y Zhou, Y Cao, H Zhang, Q Zhang, H Wang IEEE Transactions on Information Forensics and Security 12 (8), 1757-1771, 2017 | 21 | 2017 |
Systematic construction and comprehensive evaluation of kolmogorov-smirnov test based side-channel distinguishers H Zhao, Y Zhou, FX Standaert, H Zhang Information Security Practice and Experience: 9th International Conference …, 2013 | 17 | 2013 |
How many interesting points should be used in a template attack? H Zhang, Y Zhou Journal of Systems and Software 120, 105-113, 2016 | 13 | 2016 |
Cache-collision attacks on GPU-based AES implementation with electro-magnetic leakages Y Gao, W Cheng, H Zhang, Y Zhou 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 10 | 2018 |
Theoretical and practical aspects of multiple samples correlation power analysis H Zhang, Y Zhou, D Feng Security and Communication Networks 9 (18), 5166-5177, 2016 | 10 | 2016 |
On the exact relationship between the success rate of template attack and different parameters H Zhang IEEE Transactions on Information Forensics and Security 15, 681-694, 2019 | 9 | 2019 |
Distance based leakage alignment for side channel attacks W Yang, Y Cao, Y Zhou, H Zhang, Q Zhang IEEE Signal Processing Letters 23 (4), 419-423, 2016 | 9 | 2016 |
Mahalanobis distance similarity measure based distinguisher for template attack H Zhang, Y Zhou, D Feng Security and Communication Networks 8 (5), 769-777, 2015 | 8 | 2015 |
Template attack vs. stochastic model: An empirical study on the performances of profiling attacks in real scenarios H Zhang, Y Zhou Microprocessors and Microsystems 66, 43-54, 2019 | 7 | 2019 |
An efficient leakage characterization method for profiled power analysis attacks H Zhang, Y Zhou, D Feng Information Security and Cryptology-ICISC 2011: 14th International …, 2012 | 6 | 2012 |
A lightweight FourQ primitive on ARM cortex-M0 W Zhang, D Lin, H Zhang, X Zhou, Y Gao 2018 17th IEEE International Conference on Trust, Security and Privacy in …, 2018 | 5 | 2018 |
On the exact relationship between the mutual information metric and the success rate metric H Zhang, Y Zhou Information Sciences 435, 15-25, 2018 | 5 | 2018 |
How to Effectively Decrease the Resource Requirement in Template Attack? H Zhang Advances in Information and Computer Security: 9th International Workshop on …, 2014 | 5 | 2014 |
Verifiable public-key encryption with keyword search secure against continual memory attacks C Hu, Z Li, P Liu, R Yang, S Guo, H Zhang Mobile Networks and Applications, 1-11, 2021 | 4 | 2021 |
Side-channel leakage detection based on constant parameter channel model W Yang, H Zhang, Y Gao, A Fu, S Wei 2020 IEEE 38th International Conference on Computer Design (ICCD), 553-560, 2020 | 4 | 2020 |
Template attack assisted linear cryptanalysis on outer rounds protected DES implementations H Zhang, W Yang The Computer Journal 66 (6), 1434-1451, 2023 | 3 | 2023 |