中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 11)

Filters    
Items/Page:    Sort:
back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations [会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Yang Shuguo; Zhou Yongbin; Liu Jiye; Chen Danyang

 
an efficient leakage characterization method for profiled power analysis attacks [会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Zhang Hailong; Zhou Yongbin; Feng Dengguo

 
an new anti-spa algorithm of naf scalar multiplication used in ecc [期刊论文]
International Journal of Advancements in Computing Technology, 2012-01-01, 卷号: 4, 期号: 20, 页码: 692-700
Luo Peng; Feng Dengguo; Zhou Yongbin

 
generic side-channel distinguisher based on kolmogorov-smirnov test: explicit construction and practical evaluation [期刊论文]
Chinese Journal of Electronics, 2012-01-01, 卷号: 21, 期号: 3, 页码: 548-553
Liu Jiye; Zhou Yongbin; Yang Shuguo; Feng Dengguo

 
an instruction-level software simulation approach to resistance evaluation of cryptographic implementations against power analysis attacks [会议论文]
2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011, Shanghai, China, 10-Jun-02
Li Jiantang; Zhou Yongbin; Liu Jiye; Zhang Hailong
  |  
 
fault propagation pattern based relevant faulty ciphertexts filtering towards dfa on aes [会议论文]
2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011, Xi'an, China, 27-May-20
Wang Na; Zhou Yongbin
  |  
 
how to characterize side-channel leakages more accurately? [会议论文]
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Liu Jiye; Zhou Yongbin; Han Yang; Li Jiantang; Yang Shuguo; Feng Dengguo
  |  
 
fault propagation pattern based dfa on feistel ciphers, with application to camellia [会议论文]
10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, 10th IEEE Int. Conf. Scalable Computing and Communications, ScalCom-2010, Bradford, United kingdom, 37436
Chen Haining; Zhou Yongbin; Wu Wenling; Wang Na
  |  
 
controlling data disclosure in computational pir protocols [学位论文]
, 2010-01-01
Shang Ning; Ghinita Gabriel; Zhou Yongbin; Bertino Elisa
  |  
 
efficient id-based optimistic fair exchange with provable security [会议论文]
7th International Conference on Information and Communications Security, ICICS 2005, Beijing, China, 40878
Zhang Zhenfeng; Feng Dengguo; Xu Jing; Zhou Yongbin
  |  
 

1 2 next

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace