Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Xinjie Zhao 0001
@article{DBLP:journals/tches/ZhangHFGTRZG23, author = {Fan Zhang and Run Huang and Tianxiang Feng and Xue Gong and Yulong Tao and Kui Ren and Xinjie Zhao and Shize Guo}, title = {Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {519--542}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.519-542}, doi = {10.46586/TCHES.V2023.I2.519-542}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ZhangHFGTRZG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZhangFLRZ22, author = {Fan Zhang and Tianxiang Feng and Zhiqi Li and Kui Ren and Xinjie Zhao}, title = {Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {2}, pages = {289--311}, year = {2022}, url = {https://tches.iacr.org/index.php/TCHES/article/view/9489}, timestamp = {Thu, 02 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/ZhangFLRZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/XuZYZHR21, author = {Guorui Xu and Fan Zhang and Bolin Yang and Xinjie Zhao and Wei He and Kui Ren}, title = {Pushing the Limit of {PFA:} Enhanced Persistent Fault Analysis on Block Ciphers}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {40}, number = {6}, pages = {1102--1116}, year = {2021}, url = {https://doi.org/10.1109/TCAD.2020.3048280}, doi = {10.1109/TCAD.2020.3048280}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/XuZYZHR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZhangZJZBZLGR20, author = {Fan Zhang and Yiran Zhang and Huilong Jiang and Xiang Zhu and Shivam Bhasin and Xinjie Zhao and Zhe Liu and Dawu Gu and Kui Ren}, title = {Persistent Fault Attack in Practice}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {2}, pages = {172--195}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i2.172-195}, doi = {10.13154/TCHES.V2020.I2.172-195}, timestamp = {Mon, 30 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ZhangZJZBZLGR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Lou0XL0G019, author = {Xiaoxuan Lou and Fan Zhang and Guorui Xu and Ziyuan Liang and Xinjie Zhao and Shize Guo and Kui Ren}, editor = {Zhe Liu and Moti Yung}, title = {Enhanced Differential Cache Attacks on {SM4} with Algebraic Analysis and Error-Tolerance}, booktitle = {Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12020}, pages = {480--496}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42921-8\_29}, doi = {10.1007/978-3-030-42921-8\_29}, timestamp = {Mon, 06 Apr 2020 19:10:55 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Lou0XL0G019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Zhang0YXSZ019, author = {Yiran Zhang and Fan Zhang and Bolin Yang and Guorui Xu and Bin Shao and Xinjie Zhao and Kui Ren}, title = {Persistent Fault Injection in {FPGA} via {BRAM} Modification}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937558}, doi = {10.1109/DSC47296.2019.8937558}, timestamp = {Tue, 17 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/Zhang0YXSZ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhouWLZZG18, author = {Ping Zhou and Tao Wang and Xiaoxuan Lou and Xinjie Zhao and Fan Zhang and Shize Guo}, title = {Efficient flush-reload cache attack on scalar multiplication based signature algorithm}, journal = {Sci. China Inf. Sci.}, volume = {61}, number = {3}, pages = {039102:1--039102:3}, year = {2018}, url = {https://doi.org/10.1007/s11432-017-9108-3}, doi = {10.1007/S11432-017-9108-3}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ZhouWLZZG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhaoZGG18, author = {Xinjie Zhao and Fan Zhang and Shize Guo and Zheng Gong}, title = {Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers}, journal = {Sci. China Inf. Sci.}, volume = {61}, number = {3}, pages = {039106:1--039106:3}, year = {2018}, url = {https://doi.org/10.1007/s11432-017-9179-4}, doi = {10.1007/S11432-017-9179-4}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/ZhaoZGG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/ZhangLYZGR18, author = {Fan Zhang and Ziyuan Liang and Bolin Yang and Xinjie Zhao and Shize Guo and Kui Ren}, title = {Survey of design and security evaluation of authenticated encryption algorithms in the {CAESAR} competition}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {19}, number = {12}, pages = {1475--1499}, year = {2018}, url = {https://doi.org/10.1631/FITEE.1800576}, doi = {10.1631/FITEE.1800576}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jzusc/ZhangLYZGR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/0010L0BHDQR18, author = {Fan Zhang and Xiaoxuan Lou and Xinjie Zhao and Shivam Bhasin and Wei He and Ruyi Ding and Samiya Qureshi and Kui Ren}, title = {Persistent Fault Analysis on Block Ciphers}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {150--172}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.150-172}, doi = {10.13154/TCHES.V2018.I3.150-172}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/0010L0BHDQR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/ZhangZZGLQ18, author = {Fan Zhang and Yiran Zhang and Xinjie Zhao and Shize Guo and Ziyuan Liang and Samiya Qureshi}, title = {Improved Differential Fault Analysis on {LED} with Constraint Equations: Towards Reaching Its Limit}, booktitle = {24th {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2018, Singapore, December 11-13, 2018}, pages = {646--653}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/PADSW.2018.8645010}, doi = {10.1109/PADSW.2018.8645010}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/icpads/ZhangZZGLQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/ZhangDZWQZLT18, author = {Fan Zhang and Xiaofei Dong and Xinjie Zhao and Yidi Wang and Samiya Qureshi and Yiran Zhang and Xiaoxuan Lou and Yongkang Tang}, title = {Theoretical Round Modification Fault Analysis on {AEGIS-128} with Algebraic Techniques}, booktitle = {15th {IEEE} International Conference on Mobile Ad Hoc and Sensor Systems, {MASS} 2018, Chengdu, China, October 9-12, 2018}, pages = {335--343}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/MASS.2018.00056}, doi = {10.1109/MASS.2018.00056}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/ZhangDZWQZLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhangZHBG17, author = {Fan Zhang and Xinjie Zhao and Wei He and Shivam Bhasin and Shize Guo}, title = {Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers}, journal = {Sci. China Inf. Sci.}, volume = {60}, number = {4}, pages = {48102}, year = {2017}, url = {https://doi.org/10.1007/s11432-016-0233-0}, doi = {10.1007/S11432-016-0233-0}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/ZhangZHBG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/Geng0SHB0G17, author = {Liang Geng and Fan Zhang and Jizhong Shen and Wei He and Shivam Bhasin and Xinjie Zhao and Shize Guo}, title = {Transistor level SCA-resistant scheme based on fluctuating power logic}, journal = {Sci. China Inf. Sci.}, volume = {60}, number = {10}, pages = {109401:1--109401:3}, year = {2017}, url = {https://doi.org/10.1007/s11432-016-9046-4}, doi = {10.1007/S11432-016-9046-4}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/Geng0SHB0G17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ChenWGZZL17, author = {Hao Chen and Tao Wang and Shize Guo and Xinjie Zhao and Fan Zhang and Jian Liu}, title = {Improved Differential Fault Analysis of {SOSEMANUK} with Algebraic Techniques}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {3}, pages = {811--821}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.811}, doi = {10.1587/TRANSFUN.E100.A.811}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ChenWGZZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Chen0ZZHXM17, author = {Hao Chen and Tao Wang and Fan Zhang and Xinjie Zhao and Wei He and Lumin Xu and Yunfei Ma}, title = {Stealthy Hardware Trojan Based Algebraic Fault Analysis of {HIGHT} Block Cipher}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {8051728:1--8051728:15}, year = {2017}, url = {https://doi.org/10.1155/2017/8051728}, doi = {10.1155/2017/8051728}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Chen0ZZHXM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asianhost/0010GSBZG17, author = {Fan Zhang and Liang Geng and Jizhong Shen and Shivam Bhasin and Xinjie Zhao and Shize Guo}, title = {Improved low-entropy masking scheme for {LED} with mitigation against correlation-enhanced collision attacks}, booktitle = {2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2017, Beijing, China, October 19-20, 2017}, pages = {49--54}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/AsianHOST.2017.8353994}, doi = {10.1109/ASIANHOST.2017.8353994}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asianhost/0010GSBZG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/HuangXL0016, author = {Jing Huang and Bo Xi and Peng Li and Fan Zhang and Xinjie Zhao}, title = {{\unicode{19968}}{\unicode{31181}}{\unicode{22522}}{\unicode{20110}}{\unicode{37327}}{\unicode{23376}}{\unicode{23494}}{\unicode{30721}}{\unicode{30340}}{\unicode{21355}}{\unicode{26143}}{\unicode{32593}}{\unicode{32476}}{\unicode{31363}}{\unicode{21548}}{\unicode{25915}}{\unicode{20987}}{\unicode{26816}}{\unicode{27979}}{\unicode{26041}}{\unicode{27861}} (Method for Detecting Wiretapping Attack in Satellite Network Based on Quantum Cryptography)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {43}, number = {7}, pages = {157--161}, year = {2016}, url = {https://doi.org/10.11896/j.issn.1002-137X.2016.07.028}, doi = {10.11896/J.ISSN.1002-137X.2016.07.028}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/HuangXL0016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangGZWYSG16, author = {Fan Zhang and Shize Guo and Xinjie Zhao and Tao Wang and Jian Yang and Fran{\c{c}}ois{-}Xavier Standaert and Dawu Gu}, title = {A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {5}, pages = {1039--1054}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2516905}, doi = {10.1109/TIFS.2016.2516905}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangGZWYSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuoZZWSSM14, author = {Shize Guo and Xinjie Zhao and Fan Zhang and Tao Wang and Zhijie Jerry Shi and Fran{\c{c}}ois{-}Xavier Standaert and Chujiao Ma}, title = {Exploiting the Incomplete Diffusion Feature: {A} Specialized Analytical Side-Channel Attack Against the {AES} and Its Application to Microcontroller Implementations}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {6}, pages = {999--1014}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2014.2315534}, doi = {10.1109/TIFS.2014.2315534}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GuoZZWSSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/ZhaoGZWSMG14, author = {Xinjie Zhao and Shize Guo and Fan Zhang and Tao Wang and Zhijie Jerry Shi and Chujiao Ma and Dawu Gu}, editor = {Assia Tria and Dooho Choi}, title = {Algebraic Fault Analysis on {GOST} for Key Recovery and Reverse Engineering}, booktitle = {2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2014, Busan, South Korea, September 23, 2014}, pages = {29--39}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/FDTC.2014.13}, doi = {10.1109/FDTC.2014.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/ZhaoGZWSMG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhaoGZWSLG13, author = {Xinjie Zhao and Shize Guo and Fan Zhang and Tao Wang and Zhijie Shi and Zhe Liu and Jean{-}Fran{\c{c}}ois Gallais}, title = {A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on {AES}}, journal = {Comput. Secur.}, volume = {39}, pages = {173--189}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.07.002}, doi = {10.1016/J.COSE.2013.07.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhaoGZWSLG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhaoGZWSL13, author = {Xinjie Zhao and Shize Guo and Fan Zhang and Tao Wang and Zhijie Shi and Hao Luo}, title = {Enhanced Side-Channel Cube Attacks on {PRESENT}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {1}, pages = {332--339}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.332}, doi = {10.1587/TRANSFUN.E96.A.332}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZhaoGZWSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ZhaoGZWSLJH13, author = {Xinjie Zhao and Shize Guo and Fan Zhang and Tao Wang and Zhijie Shi and Huiying Liu and Keke Ji and Jing Huang}, title = {Efficient Hamming weight-based side-channel cube attacks on {PRESENT}}, journal = {J. Syst. Softw.}, volume = {86}, number = {3}, pages = {728--743}, year = {2013}, url = {https://doi.org/10.1016/j.jss.2012.11.007}, doi = {10.1016/J.JSS.2012.11.007}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/ZhaoGZWSLJH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cbd/ChenZLZ13, author = {Yasha Chen and Xinjie Zhao and Wen Li and Jianpeng Zhao}, title = {A New Architecture for Cloud Computing System Protection}, booktitle = {International Conference on Advanced Cloud and Big Data, {CBD} 2013, Nanjing, China, December 13-15, 2013}, pages = {46--50}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CBD.2013.6}, doi = {10.1109/CBD.2013.6}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cbd/ChenZLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/civts/ZhaoXS13, author = {Xinjie Zhao and Jianxin Xu and Dipti Srinivasan}, title = {Freeway ramp metering by macroscopic traffic scheduling with particle swarm optimization}, booktitle = {2013 {IEEE} Symposium on Computational Intelligence in Vehicles and Transportation Systems, {CIVTS} 2013, Singapore, April 16-19, 2013}, pages = {32--37}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CIVTS.2013.6612286}, doi = {10.1109/CIVTS.2013.6612286}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/civts/ZhaoXS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/ZhangZGWS13, author = {Fan Zhang and Xinjie Zhao and Shize Guo and Tao Wang and Zhijie Shi}, editor = {Emmanuel Prouff}, title = {Improved Algebraic Fault Analysis: {A} Case Study on Piccolo and Applications to Other Lightweight Block Ciphers}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7864}, pages = {62--79}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40026-1\_5}, doi = {10.1007/978-3-642-40026-1\_5}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/ZhangZGWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/ZhaoGZSMW13, author = {Xinjie Zhao and Shize Guo and Fan Zhang and Zhijie Shi and Chujiao Ma and Tao Wang}, editor = {Wieland Fischer and J{\"{o}}rn{-}Marc Schmidt}, title = {Improving and Evaluating Differential Fault Analysis on {LED} with Algebraic Techniques}, booktitle = {2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los Alamitos, CA, USA, August 20, 2013}, pages = {41--51}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/FDTC.2013.14}, doi = {10.1109/FDTC.2013.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/ZhaoGZSMW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/ZhaoZGWSLJ12, author = {Xin{-}jie Zhao and Fan Zhang and Shize Guo and Tao Wang and Zhijie Shi and Huiying Liu and Keke Ji}, editor = {Werner Schindler and Sorin A. Huss}, title = {{MDASCA:} An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation}, booktitle = {Constructive Side-Channel Analysis and Secure Design - Third International Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7275}, pages = {231--248}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29912-4\_17}, doi = {10.1007/978-3-642-29912-4\_17}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/ZhaoZGWSLJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoGZWSJ12, author = {Xin{-}jie Zhao and Shize Guo and Fan Zhang and Tao Wang and Zhijie Shi and Keke Ji}, title = {Algebraic Differential Fault Attacks on {LED} using a Single Fault Injection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {347}, year = {2012}, url = {http://eprint.iacr.org/2012/347}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoGZWSJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoWG11, author = {Xin{-}jie Zhao and Tao Wang and Shize Guo}, title = {Fault-propagation Pattern Based {DFA} on {SPN} Structure Block Ciphers using Bitwise Permutation, with Application to {PRESENT} and PRINTcipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2011}, url = {http://eprint.iacr.org/2011/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoWG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoWG11a, author = {Xin{-}jie Zhao and Tao Wang and Shize Guo}, title = {Improved Side Channel Cube Attacks on {PRESENT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2011}, url = {http://eprint.iacr.org/2011/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoWG11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fuzzIEEE/XuZS10, author = {Jianxin Xu and Xinjie Zhao and Dipti Srinivasan}, title = {Fuzzy logic controller for freeway ramp metering with particle swarm optimization and {PARAMICS} simulation}, booktitle = {{FUZZ-IEEE} 2010, {IEEE} International Conference on Fuzzy Systems, Barcelona, Spain, 18-23 July, 2010, Proceedings}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/FUZZY.2010.5584386}, doi = {10.1109/FUZZY.2010.5584386}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/fuzzIEEE/XuZS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoW10, author = {Xin{-}jie Zhao and Tao Wang}, title = {Further Improved Differential Fault Analysis on Camellia by Exploring Fault Width and Depth}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2010}, url = {http://eprint.iacr.org/2010/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoW10a, author = {Xin{-}jie Zhao and Tao Wang}, title = {Improved Cache Trace Attack on {AES} and {CLEFIA} by Considering Cache Miss and S-box Misalignment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2010}, url = {http://eprint.iacr.org/2010/056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoW10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoWG10, author = {Xin{-}jie Zhao and Tao Wang and Jing{-}zhe Gao}, title = {Multiple Bytes Differential Fault Analysis on {CLEFIA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2010}, url = {http://eprint.iacr.org/2010/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoWG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoWZ09, author = {Xin{-}jie Zhao and Tao Wang and Yuanyuan Zheng}, title = {Cache Timing Attacks on Camellia Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {354}, year = {2009}, url = {http://eprint.iacr.org/2009/354}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoWZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoW09, author = {Xin{-}jie Zhao and Tao Wang}, title = {An Improved Differential Fault Attack on Camellia}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {585}, year = {2009}, url = {http://eprint.iacr.org/2009/585}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csse/XinjieTDYZ08, author = {Xin{-}jie Zhao and Tao Wang and Dong Mi and Yuanyuan Zheng and Zhaoyang Lun}, title = {Robust First Two Rounds Access Driven Cache Timing Attack on {AES}}, booktitle = {International Conference on Computer Science and Software Engineering, {CSSE} 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China}, pages = {785--788}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSSE.2008.633}, doi = {10.1109/CSSE.2008.633}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csse/XinjieTDYZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.