Junfeng Fan

According to our database1, Junfeng Fan authored at least 49 papers between 2006 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Analysis and Design of an Effective Light Interference Methane Sensor Based on Three-Dimensional Optical Path Model.
J. Sensors, 2018

2017
RAGuard: A Hardware Based Mechanism for Backward-Edge Control-Flow Integrity.
Proceedings of the Computing Frontiers Conference, 2017

2015
Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms.
IEEE Trans. VLSI Syst., 2015

A New Model for Error-Tolerant Side-Channel Cube Attacks.
IACR Cryptology ePrint Archive, 2015

Vulnerability analysis for crypto devices against probing attack.
Proceedings of the 20th Asia and South Pacific Design Automation Conference, 2015

2014
Novel RNS Parameter Selection for Fast Modular Multiplication.
IEEE Trans. Computers, 2014

Error-Tolerant Side-Channel Cube Attack Revisited.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

On the Use of Scan Chain to Improve Physical Attacks (Extended Abstract).
Proceedings of the 23rd IEEE Asian Test Symposium, 2014

2013
Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms.
IACR Cryptology ePrint Archive, 2013

IBIHOP: Proper Privacy Preserving Mutual RFID Authentication.
Proceedings of the Radio Frequency Identification System Security, 2013

Low-energy encryption for medical devices: security adds an extra design dimension.
Proceedings of the 50th Annual Design Automation Conference 2013, 2013

A New Model for Error-Tolerant Side-Channel Cube Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013

2012
Efficient Arithmetic for Embedded Cryptography and Cryptanalysis (Efficiënte aritmetica voor ingebedde cryptografie en cryptanalyse).
PhD thesis, 2012

Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates.
IEEE Trans. VLSI Syst., 2012

Efficient Hardware Implementation of Fp-Arithmetic for Pairing-Friendly Curves.
IEEE Trans. Computers, 2012

Somewhat Practical Fully Homomorphic Encryption.
IACR Cryptology ePrint Archive, 2012

Faster Pairing Coprocessor Architecture.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

A systematic M safe-error detection in hardware implementations of cryptographic algorithms.
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012

An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
An Easy Rake Receiver for TD-SCDMA Smart Antenna.
Wireless Personal Communications, 2011

Tripartite modular multiplication.
Integration, 2011

Design and design methods for unified multiplier and inverter and its application for HECC.
Integration, 2011

A High Speed Pairing Coprocessor Using RNS and Lazy Reduction.
IACR Cryptology ePrint Archive, 2011

Systematic security evaluation method against C safe-error attacks.
Proceedings of the HOST 2011, 2011

Low-cost fault detection method for ECC using Montgomery powering ladder.
Proceedings of the Design, Automation and Test in Europe, 2011

To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

FPGA Implementation of Pairings Using Residue Number System and Lazy Reduction.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
On the claimed privacy of EC-RAC III.
IACR Cryptology ePrint Archive, 2010

On the Claimed Privacy of EC-RAC III.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Prototyping Platform for Performance Evaluation of SHA-3 Candidates.
Proceedings of the HOST 2010, 2010

State-of-the-art of Secure ECC Implementations: A Survey on Known Side-channel Attacks and Countermeasures.
Proceedings of the HOST 2010, 2010

Breaking Elliptic Curve Cryptosystems Using Reconfigurable Hardware.
Proceedings of the International Conference on Field Programmable Logic and Applications, 2010

Implementation of binary edwards curves for very-constrained devices.
Proceedings of the 21st IEEE International Conference on Application-specific Systems Architectures and Processors, 2010

Signal Processing for Cryptography and Security Applications.
Proceedings of the Handbook of Signal Processing Systems, 2010

2009
Breaking ECC2K-130.
IACR Cryptology ePrint Archive, 2009

The Certicom Challenges ECC2-X.
IACR Cryptology ePrint Archive, 2009

FPGA-based testing strategy for cryptographic chips: A case study on Elliptic Curve Processor for RFID tags.
Proceedings of the 15th IEEE International On-Line Testing Symposium (IOLTS 2009), 2009

Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

Faster -Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

2008
Elliptic curve cryptography on embedded multicore systems.
Design Autom. for Emb. Sys., 2008

Modular Reduction in GF(2n) without Pre-computational Phase.
Proceedings of the Arithmetic of Finite Fields, 2nd International Workshop, 2008

A digit-serial architecture for inversion and multiplication in GF(2M).
Proceedings of the IEEE Workshop on Signal Processing Systems, 2008

HECC Goes Embedded: An Area-Efficient Implementation of HECC.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

Unified Digit-Serial Multiplier and Inverter in Finite Field GF(2m).
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008

FPGA Design for Algebraic Tori-Based Public-Key Cryptography.
Proceedings of the Design, Automation and Test in Europe, 2008

Low-cost implementations of NTRU for pervasive security.
Proceedings of the 19th IEEE International Conference on Application-Specific Systems, 2008

2007
Montgomery Modular Multiplication Algorithm on Multi-Core Systems.
Proceedings of the IEEE Workshop on Signal Processing Systems, 2007

2006
Efficient Frame Rate Control Algorithm and Its Implementation.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006


  Loading...