Guoshuang Zhang

Orcid: 0000-0002-1077-9463

According to our database1, Guoshuang Zhang authored at least 17 papers between 2013 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Some properties of the cycle decomposition of WG-NLFSR.
Adv. Math. Commun., 2021

2020
A machine learning based golden-free detection method for command-activated hardware Trojan.
Inf. Sci., 2020

Block-oriented correlation power analysis with bitwise linear leakage: An artificial intelligence approach based on genetic algorithms.
Future Gener. Comput. Syst., 2020

2019
Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing.
IEEE Access, 2019

Power Analysis and Protection on SPECK and Its Application in IoT.
Proceedings of the Security and Privacy in Communication Networks, 2019

Power Attack and Evaluation on Elliptic Curve Cryptosystem in a Commercial Smart Card.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

2018
Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9.
Secur. Commun. Networks, 2018

Right or wrong collision rate analysis without profiling: full-automatic collision fault attack.
Sci. China Inf. Sci., 2018

Side-Channel Attack on a Protected RFID Card.
IEEE Access, 2018

2017
New Methods of Template Attack Based on Fault Sensitivity Analysis.
IEEE Trans. Multi Scale Comput. Syst., 2017

RFA: <i>R</i>-Squared Fitting Analysis Model for Power Attack.
Secur. Commun. Networks, 2017

Searching all truncated impossible differentials in SPN.
IET Inf. Secur., 2017

Practical two-dimensional correlation power analysis and its backward fault-tolerance.
Sci. China Inf. Sci., 2017

Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices.
Comput. Electr. Eng., 2017

2015
Efficient collision attacks on smart card implementations of masked AES.
Sci. China Inf. Sci., 2015

Template attack on masking AES based on fault sensitivity analysis.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

2013
Observations of Skipjack-like Structure with SP/SPS Round Function.
J. Univers. Comput. Sci., 2013


  Loading...