BibTeX records: Xinjie Zhao 0001

download as .bib file

@article{DBLP:journals/tches/ZhangHFGTRZG23,
  author       = {Fan Zhang and
                  Run Huang and
                  Tianxiang Feng and
                  Xue Gong and
                  Yulong Tao and
                  Kui Ren and
                  Xinjie Zhao and
                  Shize Guo},
  title        = {Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {519--542},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.519-542},
  doi          = {10.46586/TCHES.V2023.I2.519-542},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ZhangHFGTRZG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZhangFLRZ22,
  author       = {Fan Zhang and
                  Tianxiang Feng and
                  Zhiqi Li and
                  Kui Ren and
                  Xinjie Zhao},
  title        = {Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault
                  Analysis on Lightweight Block Ciphers},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {2},
  pages        = {289--311},
  year         = {2022},
  url          = {https://tches.iacr.org/index.php/TCHES/article/view/9489},
  timestamp    = {Thu, 02 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/ZhangFLRZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/XuZYZHR21,
  author       = {Guorui Xu and
                  Fan Zhang and
                  Bolin Yang and
                  Xinjie Zhao and
                  Wei He and
                  Kui Ren},
  title        = {Pushing the Limit of {PFA:} Enhanced Persistent Fault Analysis on
                  Block Ciphers},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {40},
  number       = {6},
  pages        = {1102--1116},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCAD.2020.3048280},
  doi          = {10.1109/TCAD.2020.3048280},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/XuZYZHR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZhangZJZBZLGR20,
  author       = {Fan Zhang and
                  Yiran Zhang and
                  Huilong Jiang and
                  Xiang Zhu and
                  Shivam Bhasin and
                  Xinjie Zhao and
                  Zhe Liu and
                  Dawu Gu and
                  Kui Ren},
  title        = {Persistent Fault Attack in Practice},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {2},
  pages        = {172--195},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i2.172-195},
  doi          = {10.13154/TCHES.V2020.I2.172-195},
  timestamp    = {Mon, 30 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ZhangZJZBZLGR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/Lou0XL0G019,
  author       = {Xiaoxuan Lou and
                  Fan Zhang and
                  Guorui Xu and
                  Ziyuan Liang and
                  Xinjie Zhao and
                  Shize Guo and
                  Kui Ren},
  editor       = {Zhe Liu and
                  Moti Yung},
  title        = {Enhanced Differential Cache Attacks on {SM4} with Algebraic Analysis
                  and Error-Tolerance},
  booktitle    = {Information Security and Cryptology - 15th International Conference,
                  Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12020},
  pages        = {480--496},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42921-8\_29},
  doi          = {10.1007/978-3-030-42921-8\_29},
  timestamp    = {Mon, 06 Apr 2020 19:10:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/Lou0XL0G019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/Zhang0YXSZ019,
  author       = {Yiran Zhang and
                  Fan Zhang and
                  Bolin Yang and
                  Guorui Xu and
                  Bin Shao and
                  Xinjie Zhao and
                  Kui Ren},
  title        = {Persistent Fault Injection in {FPGA} via {BRAM} Modification},
  booktitle    = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019,
                  Hangzhou, China, November 18-20, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSC47296.2019.8937558},
  doi          = {10.1109/DSC47296.2019.8937558},
  timestamp    = {Tue, 17 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/Zhang0YXSZ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhouWLZZG18,
  author       = {Ping Zhou and
                  Tao Wang and
                  Xiaoxuan Lou and
                  Xinjie Zhao and
                  Fan Zhang and
                  Shize Guo},
  title        = {Efficient flush-reload cache attack on scalar multiplication based
                  signature algorithm},
  journal      = {Sci. China Inf. Sci.},
  volume       = {61},
  number       = {3},
  pages        = {039102:1--039102:3},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11432-017-9108-3},
  doi          = {10.1007/S11432-017-9108-3},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhouWLZZG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhaoZGG18,
  author       = {Xinjie Zhao and
                  Fan Zhang and
                  Shize Guo and
                  Zheng Gong},
  title        = {Optimal model search for hardware-trojan-based bit-level fault attacks
                  on block ciphers},
  journal      = {Sci. China Inf. Sci.},
  volume       = {61},
  number       = {3},
  pages        = {039106:1--039106:3},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11432-017-9179-4},
  doi          = {10.1007/S11432-017-9179-4},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhaoZGG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/ZhangLYZGR18,
  author       = {Fan Zhang and
                  Ziyuan Liang and
                  Bolin Yang and
                  Xinjie Zhao and
                  Shize Guo and
                  Kui Ren},
  title        = {Survey of design and security evaluation of authenticated encryption
                  algorithms in the {CAESAR} competition},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {19},
  number       = {12},
  pages        = {1475--1499},
  year         = {2018},
  url          = {https://doi.org/10.1631/FITEE.1800576},
  doi          = {10.1631/FITEE.1800576},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jzusc/ZhangLYZGR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/0010L0BHDQR18,
  author       = {Fan Zhang and
                  Xiaoxuan Lou and
                  Xinjie Zhao and
                  Shivam Bhasin and
                  Wei He and
                  Ruyi Ding and
                  Samiya Qureshi and
                  Kui Ren},
  title        = {Persistent Fault Analysis on Block Ciphers},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {150--172},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.150-172},
  doi          = {10.13154/TCHES.V2018.I3.150-172},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/0010L0BHDQR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/ZhangZZGLQ18,
  author       = {Fan Zhang and
                  Yiran Zhang and
                  Xinjie Zhao and
                  Shize Guo and
                  Ziyuan Liang and
                  Samiya Qureshi},
  title        = {Improved Differential Fault Analysis on {LED} with Constraint Equations:
                  Towards Reaching Its Limit},
  booktitle    = {24th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2018, Singapore, December 11-13, 2018},
  pages        = {646--653},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/PADSW.2018.8645010},
  doi          = {10.1109/PADSW.2018.8645010},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/icpads/ZhangZZGLQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/ZhangDZWQZLT18,
  author       = {Fan Zhang and
                  Xiaofei Dong and
                  Xinjie Zhao and
                  Yidi Wang and
                  Samiya Qureshi and
                  Yiran Zhang and
                  Xiaoxuan Lou and
                  Yongkang Tang},
  title        = {Theoretical Round Modification Fault Analysis on {AEGIS-128} with
                  Algebraic Techniques},
  booktitle    = {15th {IEEE} International Conference on Mobile Ad Hoc and Sensor Systems,
                  {MASS} 2018, Chengdu, China, October 9-12, 2018},
  pages        = {335--343},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/MASS.2018.00056},
  doi          = {10.1109/MASS.2018.00056},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/ZhangDZWQZLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhangZHBG17,
  author       = {Fan Zhang and
                  Xinjie Zhao and
                  Wei He and
                  Shivam Bhasin and
                  Shize Guo},
  title        = {Low-cost design of stealthy hardware trojan for bit-level fault attacks
                  on block ciphers},
  journal      = {Sci. China Inf. Sci.},
  volume       = {60},
  number       = {4},
  pages        = {48102},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11432-016-0233-0},
  doi          = {10.1007/S11432-016-0233-0},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhangZHBG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/Geng0SHB0G17,
  author       = {Liang Geng and
                  Fan Zhang and
                  Jizhong Shen and
                  Wei He and
                  Shivam Bhasin and
                  Xinjie Zhao and
                  Shize Guo},
  title        = {Transistor level SCA-resistant scheme based on fluctuating power logic},
  journal      = {Sci. China Inf. Sci.},
  volume       = {60},
  number       = {10},
  pages        = {109401:1--109401:3},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11432-016-9046-4},
  doi          = {10.1007/S11432-016-9046-4},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/Geng0SHB0G17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ChenWGZZL17,
  author       = {Hao Chen and
                  Tao Wang and
                  Shize Guo and
                  Xinjie Zhao and
                  Fan Zhang and
                  Jian Liu},
  title        = {Improved Differential Fault Analysis of {SOSEMANUK} with Algebraic
                  Techniques},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {3},
  pages        = {811--821},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.811},
  doi          = {10.1587/TRANSFUN.E100.A.811},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ChenWGZZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Chen0ZZHXM17,
  author       = {Hao Chen and
                  Tao Wang and
                  Fan Zhang and
                  Xinjie Zhao and
                  Wei He and
                  Lumin Xu and
                  Yunfei Ma},
  title        = {Stealthy Hardware Trojan Based Algebraic Fault Analysis of {HIGHT}
                  Block Cipher},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {8051728:1--8051728:15},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/8051728},
  doi          = {10.1155/2017/8051728},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Chen0ZZHXM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asianhost/0010GSBZG17,
  author       = {Fan Zhang and
                  Liang Geng and
                  Jizhong Shen and
                  Shivam Bhasin and
                  Xinjie Zhao and
                  Shize Guo},
  title        = {Improved low-entropy masking scheme for {LED} with mitigation against
                  correlation-enhanced collision attacks},
  booktitle    = {2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST
                  2017, Beijing, China, October 19-20, 2017},
  pages        = {49--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/AsianHOST.2017.8353994},
  doi          = {10.1109/ASIANHOST.2017.8353994},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asianhost/0010GSBZG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/HuangXL0016,
  author       = {Jing Huang and
                  Bo Xi and
                  Peng Li and
                  Fan Zhang and
                  Xinjie Zhao},
  title        = {{\unicode{19968}}{\unicode{31181}}{\unicode{22522}}{\unicode{20110}}{\unicode{37327}}{\unicode{23376}}{\unicode{23494}}{\unicode{30721}}{\unicode{30340}}{\unicode{21355}}{\unicode{26143}}{\unicode{32593}}{\unicode{32476}}{\unicode{31363}}{\unicode{21548}}{\unicode{25915}}{\unicode{20987}}{\unicode{26816}}{\unicode{27979}}{\unicode{26041}}{\unicode{27861}}
                  (Method for Detecting Wiretapping Attack in Satellite Network Based
                  on Quantum Cryptography)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {43},
  number       = {7},
  pages        = {157--161},
  year         = {2016},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2016.07.028},
  doi          = {10.11896/J.ISSN.1002-137X.2016.07.028},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/HuangXL0016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangGZWYSG16,
  author       = {Fan Zhang and
                  Shize Guo and
                  Xinjie Zhao and
                  Tao Wang and
                  Jian Yang and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Dawu Gu},
  title        = {A Framework for the Analysis and Evaluation of Algebraic Fault Attacks
                  on Lightweight Block Ciphers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {5},
  pages        = {1039--1054},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2516905},
  doi          = {10.1109/TIFS.2016.2516905},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangGZWYSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoZZWSSM14,
  author       = {Shize Guo and
                  Xinjie Zhao and
                  Fan Zhang and
                  Tao Wang and
                  Zhijie Jerry Shi and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Chujiao Ma},
  title        = {Exploiting the Incomplete Diffusion Feature: {A} Specialized Analytical
                  Side-Channel Attack Against the {AES} and Its Application to Microcontroller
                  Implementations},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {6},
  pages        = {999--1014},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2014.2315534},
  doi          = {10.1109/TIFS.2014.2315534},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GuoZZWSSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/ZhaoGZWSMG14,
  author       = {Xinjie Zhao and
                  Shize Guo and
                  Fan Zhang and
                  Tao Wang and
                  Zhijie Jerry Shi and
                  Chujiao Ma and
                  Dawu Gu},
  editor       = {Assia Tria and
                  Dooho Choi},
  title        = {Algebraic Fault Analysis on {GOST} for Key Recovery and Reverse Engineering},
  booktitle    = {2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2014, Busan, South Korea, September 23, 2014},
  pages        = {29--39},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/FDTC.2014.13},
  doi          = {10.1109/FDTC.2014.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/ZhaoGZWSMG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhaoGZWSLG13,
  author       = {Xinjie Zhao and
                  Shize Guo and
                  Fan Zhang and
                  Tao Wang and
                  Zhijie Shi and
                  Zhe Liu and
                  Jean{-}Fran{\c{c}}ois Gallais},
  title        = {A comprehensive study of multiple deductions-based algebraic trace
                  driven cache attacks on {AES}},
  journal      = {Comput. Secur.},
  volume       = {39},
  pages        = {173--189},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.07.002},
  doi          = {10.1016/J.COSE.2013.07.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhaoGZWSLG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhaoGZWSL13,
  author       = {Xinjie Zhao and
                  Shize Guo and
                  Fan Zhang and
                  Tao Wang and
                  Zhijie Shi and
                  Hao Luo},
  title        = {Enhanced Side-Channel Cube Attacks on {PRESENT}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {1},
  pages        = {332--339},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.332},
  doi          = {10.1587/TRANSFUN.E96.A.332},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhaoGZWSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ZhaoGZWSLJH13,
  author       = {Xinjie Zhao and
                  Shize Guo and
                  Fan Zhang and
                  Tao Wang and
                  Zhijie Shi and
                  Huiying Liu and
                  Keke Ji and
                  Jing Huang},
  title        = {Efficient Hamming weight-based side-channel cube attacks on {PRESENT}},
  journal      = {J. Syst. Softw.},
  volume       = {86},
  number       = {3},
  pages        = {728--743},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jss.2012.11.007},
  doi          = {10.1016/J.JSS.2012.11.007},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/ZhaoGZWSLJH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cbd/ChenZLZ13,
  author       = {Yasha Chen and
                  Xinjie Zhao and
                  Wen Li and
                  Jianpeng Zhao},
  title        = {A New Architecture for Cloud Computing System Protection},
  booktitle    = {International Conference on Advanced Cloud and Big Data, {CBD} 2013,
                  Nanjing, China, December 13-15, 2013},
  pages        = {46--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CBD.2013.6},
  doi          = {10.1109/CBD.2013.6},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cbd/ChenZLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/civts/ZhaoXS13,
  author       = {Xinjie Zhao and
                  Jianxin Xu and
                  Dipti Srinivasan},
  title        = {Freeway ramp metering by macroscopic traffic scheduling with particle
                  swarm optimization},
  booktitle    = {2013 {IEEE} Symposium on Computational Intelligence in Vehicles and
                  Transportation Systems, {CIVTS} 2013, Singapore, April 16-19, 2013},
  pages        = {32--37},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CIVTS.2013.6612286},
  doi          = {10.1109/CIVTS.2013.6612286},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/civts/ZhaoXS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/ZhangZGWS13,
  author       = {Fan Zhang and
                  Xinjie Zhao and
                  Shize Guo and
                  Tao Wang and
                  Zhijie Shi},
  editor       = {Emmanuel Prouff},
  title        = {Improved Algebraic Fault Analysis: {A} Case Study on Piccolo and Applications
                  to Other Lightweight Block Ciphers},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 4th International
                  Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7864},
  pages        = {62--79},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40026-1\_5},
  doi          = {10.1007/978-3-642-40026-1\_5},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/ZhangZGWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/ZhaoGZSMW13,
  author       = {Xinjie Zhao and
                  Shize Guo and
                  Fan Zhang and
                  Zhijie Shi and
                  Chujiao Ma and
                  Tao Wang},
  editor       = {Wieland Fischer and
                  J{\"{o}}rn{-}Marc Schmidt},
  title        = {Improving and Evaluating Differential Fault Analysis on {LED} with
                  Algebraic Techniques},
  booktitle    = {2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los
                  Alamitos, CA, USA, August 20, 2013},
  pages        = {41--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/FDTC.2013.14},
  doi          = {10.1109/FDTC.2013.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/ZhaoGZSMW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/ZhaoZGWSLJ12,
  author       = {Xin{-}jie Zhao and
                  Fan Zhang and
                  Shize Guo and
                  Tao Wang and
                  Zhijie Shi and
                  Huiying Liu and
                  Keke Ji},
  editor       = {Werner Schindler and
                  Sorin A. Huss},
  title        = {{MDASCA:} An Enhanced Algebraic Side-Channel Attack for Error Tolerance
                  and New Leakage Model Exploitation},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - Third International
                  Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7275},
  pages        = {231--248},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29912-4\_17},
  doi          = {10.1007/978-3-642-29912-4\_17},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/ZhaoZGWSLJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoGZWSJ12,
  author       = {Xin{-}jie Zhao and
                  Shize Guo and
                  Fan Zhang and
                  Tao Wang and
                  Zhijie Shi and
                  Keke Ji},
  title        = {Algebraic Differential Fault Attacks on {LED} using a Single Fault
                  Injection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {347},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/347},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoGZWSJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoWG11,
  author       = {Xin{-}jie Zhao and
                  Tao Wang and
                  Shize Guo},
  title        = {Fault-propagation Pattern Based {DFA} on {SPN} Structure Block Ciphers
                  using Bitwise Permutation, with Application to {PRESENT} and PRINTcipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoWG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoWG11a,
  author       = {Xin{-}jie Zhao and
                  Tao Wang and
                  Shize Guo},
  title        = {Improved Side Channel Cube Attacks on {PRESENT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/165},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoWG11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fuzzIEEE/XuZS10,
  author       = {Jianxin Xu and
                  Xinjie Zhao and
                  Dipti Srinivasan},
  title        = {Fuzzy logic controller for freeway ramp metering with particle swarm
                  optimization and {PARAMICS} simulation},
  booktitle    = {{FUZZ-IEEE} 2010, {IEEE} International Conference on Fuzzy Systems,
                  Barcelona, Spain, 18-23 July, 2010, Proceedings},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/FUZZY.2010.5584386},
  doi          = {10.1109/FUZZY.2010.5584386},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/fuzzIEEE/XuZS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoW10,
  author       = {Xin{-}jie Zhao and
                  Tao Wang},
  title        = {Further Improved Differential Fault Analysis on Camellia by Exploring
                  Fault Width and Depth},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoW10a,
  author       = {Xin{-}jie Zhao and
                  Tao Wang},
  title        = {Improved Cache Trace Attack on {AES} and {CLEFIA} by Considering Cache
                  Miss and S-box Misalignment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoW10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoWG10,
  author       = {Xin{-}jie Zhao and
                  Tao Wang and
                  Jing{-}zhe Gao},
  title        = {Multiple Bytes Differential Fault Analysis on {CLEFIA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoWG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoWZ09,
  author       = {Xin{-}jie Zhao and
                  Tao Wang and
                  Yuanyuan Zheng},
  title        = {Cache Timing Attacks on Camellia Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {354},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/354},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoWZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoW09,
  author       = {Xin{-}jie Zhao and
                  Tao Wang},
  title        = {An Improved Differential Fault Attack on Camellia},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {585},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/585},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csse/XinjieTDYZ08,
  author       = {Xin{-}jie Zhao and
                  Tao Wang and
                  Dong Mi and
                  Yuanyuan Zheng and
                  Zhaoyang Lun},
  title        = {Robust First Two Rounds Access Driven Cache Timing Attack on {AES}},
  booktitle    = {International Conference on Computer Science and Software Engineering,
                  {CSSE} 2008, Volume 3: Grid Computing / Distributed and Parallel Computing
                  / Information Security, December 12-14, 2008, Wuhan, China},
  pages        = {785--788},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSSE.2008.633},
  doi          = {10.1109/CSSE.2008.633},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csse/XinjieTDYZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics