Yongbin Zhou

Orcid: 0000-0002-1337-0655

According to our database1, Yongbin Zhou authored at least 108 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Single Trace is All It Takes: Efficient Side-channel Attack on Dilithium.
IACR Cryptol. ePrint Arch., 2024

A Novel Power Analysis Attack against CRYSTALS-Dilithium Implementation.
IACR Cryptol. ePrint Arch., 2024

Shape-biased CNNs are Not Always Superior in Out-of-Distribution Robustness.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024

2023
Enhancing non-profiled side-channel attacks by time-frequency analysis.
Cybersecur., December, 2023

Enhancing Deep-Learning Based Side-Channel Analysis Through Simultaneously Multi-Byte Training.
Comput. J., November, 2023

Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud.
Comput. J., June, 2023

Practical Public Template Attack Attacks on CRYSTALS-Dilithium With Randomness Leakages.
IEEE Trans. Inf. Forensics Secur., 2023

In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium.
IACR Cryptol. ePrint Arch., 2023

Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond.
IACR Cryptol. ePrint Arch., 2023

When NTT Meets SIS: Efficient Side-channel Attacks on Dilithium and Kyber.
IACR Cryptol. ePrint Arch., 2023

Recovering Multi-prime RSA Keys with Erasures and Errors.
Proceedings of the Information Security Practice and Experience, 2023

Low Latency Implementations of CRYSTALS-Dilithium for Cloud Applications.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

Table Re-Computation Based Low Entropy Inner Product Masking Scheme.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

Occamy: Elastically Sharing a SIMD Co-processor across Multiple CPU Cores.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2022
(Full) Leakage resilience of Fiat-Shamir signatures over lattices.
Frontiers Comput. Sci., October, 2022

Optimizing Higher-Order Correlation Analysis Against Inner Product Masking Scheme.
IEEE Trans. Inf. Forensics Secur., 2022

One for All, All for One: A Unified Evaluation Framework for Univariate DPA Attacks.
IACR Cryptol. ePrint Arch., 2022

Breaking real-world COTS USIM cards with unknown side-channel countermeasures.
Comput. Secur., 2022

Fast Fourier Orthogonalization over NTRU Lattices.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

Forecasting of Extreme Weather Intensity Based on Grey Model.
Proceedings of the 2nd International Conference on Control and Intelligent Robotics, 2022

2021
On the Security of Lattice-Based Fiat-Shamir Signatures in the Presence of Randomness Leakage.
IEEE Trans. Inf. Forensics Secur., 2021

Side-Channel Attacks With Multi-Thread Mixed Leakage.
IEEE Trans. Inf. Forensics Secur., 2021

Fully Accountable Data Sharing for Pay-as-You-Go Cloud Scenes.
IEEE Trans. Dependable Secur. Comput., 2021

Revealing the Weakness of Addition Chain Based Masked SBox Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study.
Secur. Commun. Networks, 2021

Multi-channel time-frequency fusion attacks.
Int. J. Inf. Comput. Secur., 2021

Generic, Efficient and Isochronous Gaussian Sampling over the Integers.
IACR Cryptol. ePrint Arch., 2021

A secure and highly efficient first-order masking scheme for AES linear operations.
Cybersecur., 2021

Transparency order versus confusion coefficient: a case study of NIST lightweight cryptography S-Boxes.
Cybersecur., 2021

Integer LWE with Non-subgaussian Error and Related Attacks.
Proceedings of the Information Security - 24th International Conference, 2021

A Review: Machine Tools Digital Twin Modeling And Application.
Proceedings of the 26th International Conference on Automation and Computing, 2021

APT: Efficient Side-Channel Analysis Framework against Inner Product Masking Scheme.
Proceedings of the 39th IEEE International Conference on Computer Design, 2021

Modeling Password Guessability via Variational Auto-Encoder.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

Multi-strategy Knowledge Distillation Based Teacher-Student Framework for Machine Reading Comprehension.
Proceedings of the Chinese Computational Linguistics - 20th China National Conference, 2021

2020
Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes.
IEEE Trans. Inf. Forensics Secur., 2020

Efficient electro-magnetic analysis of a GPU bitsliced AES implementation.
Cybersecur., 2020

Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
Template attack vs. stochastic model: An empirical study on the performances of profiling attacks in real scenarios.
Microprocess. Microsystems, 2019

Cooperative Localization Based on Efficient Covariance Intersection.
IEEE Commun. Lett., 2019

On Security of Fiat-Shamir Signatures over Lattice in the Presence of Randomness Leakage.
IACR Cryptol. ePrint Arch., 2019

The Notion of Transparency Order, Revisited.
IACR Cryptol. ePrint Arch., 2019

Predicate encryption against master-key tampering attacks.
Cybersecur., 2019

CDAE: Towards Empowering Denoising in Side-Channel Analysis.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

2018
Multiple leakage samples based higher order optimal distinguisher.
Inf. Sci., 2018

On the exact relationship between the Mutual Information Metric and the Success Rate Metric.
Inf. Sci., 2018

Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure.
IACR Cryptol. ePrint Arch., 2018

How Does Strict Parallelism Affect Security? A Case Study on the Side-Channel Attacks against GPU-based Bitsliced AES Implementation.
IACR Cryptol. ePrint Arch., 2018

Cache-Collision Attacks on GPU-Based AES Implementation with Electro-Magnetic Leakages.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Compact AES Hardware Implementation Secure Against 1st-Order Side-Channel Attacks.
Proceedings of the 36th IEEE International Conference on Computer Design, 2018

Dispatching and management methods for communication of UAV swarm.
Proceedings of the 2nd International Conference on High Performance Compilation, 2018

Electro-magnetic analysis of GPU-based AES implementation.
Proceedings of the 55th Annual Design Automation Conference, 2018

Convolutional Neural Network Based Side-Channel Attacks in Time-Frequency Representations.
Proceedings of the Smart Card Research and Advanced Applications, 2018

2017
Further Improving Efficiency of Higher Order Masking Schemes by Decreasing Randomness Complexity.
IEEE Trans. Inf. Forensics Secur., 2017

Multi-Channel Fusion Attacks.
IEEE Trans. Inf. Forensics Secur., 2017

Ranging Consistency Based on Ranging-Compensated Temperature-Sensing Sensor for Inter-Satellite Link of Navigation Constellation.
Sensors, 2017

Corrections to "Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexity".
IACR Cryptol. ePrint Arch., 2017

How Far Can We Reach? Breaking RSM-Masked AES-128 Implementation Using Only One Trace.
IACR Cryptol. ePrint Arch., 2017

Mahalanobis Distance Similarity Measure Based Higher Order Optimal Distinguisher.
Comput. J., 2017

Cooperative simultaneous autonomous orbit determination and time synchronization: A distributed factor graph approach.
Proceedings of the 18th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2017

Reducing Randomness Complexity of Mask Refreshing Algorithm.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Distance Based Leakage Alignment for Side Channel Attacks.
IEEE Signal Process. Lett., 2016

Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks.
Soft Comput., 2016

Theoretical and practical aspects of multiple samples correlation power analysis.
Secur. Commun. Networks, 2016

A statistical model for DPA when algorithmic noise is dependent on target.
Secur. Commun. Networks, 2016

Public-key encryption with keyword search secure against continual memory attacks.
Secur. Commun. Networks, 2016

Towards optimal leakage exploitation rate in template attacks.
Secur. Commun. Networks, 2016

How many interesting points should be used in a template attack?
J. Syst. Softw., 2016

Differential Fault Analysis on Midori.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Hilbert Transform Based Vertical Preprocessing for Side-Channel Analysis.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
Mahalanobis distance similarity measure based distinguisher for template attack.
Secur. Commun. Networks, 2015

Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption.
Int. J. Embed. Syst., 2015

On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes.
Proceedings of the Information Security Practice and Experience, 2015

Higher-Order Masking Schemes for Simon.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

A Fast Implementation of MPC-KSA Side-Channel Distinguisher.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

Updatable Hash Proof System and Its Applications.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives.
Inf. Sci., 2014

Weak-Key Leakage Resilient Cryptography.
IACR Cryptol. ePrint Arch., 2014

How to Choose Interesting Points for Template Attack More Effectively?
IACR Cryptol. ePrint Arch., 2014

How to Choose Interesting Points for Template Attacks?
IACR Cryptol. ePrint Arch., 2014

Template Attacks Based On Priori Knowledge.
IACR Cryptol. ePrint Arch., 2014

Template Attacks Based on Priori Knowledge.
Proceedings of the Trusted Systems - 6th International Conference, 2014

How to Choose Interesting Points for Template Attacks More Effectively?
Proceedings of the Trusted Systems - 6th International Conference, 2014

How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice?
Proceedings of the Information and Communications Security - 16th International Conference, 2014

2013
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers.
IACR Cryptol. ePrint Arch., 2013

Towards Leakage Exploitation Optimality in Profiled Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2013

On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient ElGamal Encryption.
IACR Cryptol. ePrint Arch., 2013

Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function.
IACR Cryptol. ePrint Arch., 2013

On the Negative Effects of Trend Noise and Its Applications in Side-Channel Cryptanalysis.
IACR Cryptol. ePrint Arch., 2013

EMD-Based Denoising for Side-Channel Attacks and Relationships between the Noises Extracted with Different Denoising Methods.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

2011
Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation.
IACR Cryptol. ePrint Arch., 2011

How to Characterize Side-Channel Leakages More Accurately?
Proceedings of the Information Security Practice and Experience, 2011

An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Analysis of GEO intersatellite laser time transfer and link performance.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
Controlling data disclosure in computational PIR protocols.
Proceedings of the 5th ACM Symposium on Information, 2010

Fault Propagation Pattern Based DFA on Feistel Ciphers, with Application to Camellia.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Godson-T: An Efficient Many-Core Architecture for Parallel Program Executions.
J. Comput. Sci. Technol., 2009

Data Management: The Spirit to Pursuit Peak Performance on Many-Core Processor.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

High Performance Matrix Multiplication on Many Cores.
Proceedings of the Euro-Par 2009 Parallel Processing, 2009

Software and Hardware Cooperate for 1-D FFT Algorithm Optimization on Multicore Processors.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
A New Method for Measuring Single Event Effect Susceptibility of L1 Cache Unit.
Proceedings of the Second International Conference on Secure System Integration and Reliability Improvement, 2008

A Fast Implementation of Computing the Transparency Order of S-Boxes.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2007
Optimized Register Renaming Scheme for Stack-Based x86 Operations.
Proceedings of the Architecture of Computing Systems, 2007

2005
Cryptanalysis of the end-to-end security for mobile communications with end-user identification/authentication.
IEEE Commun. Lett., 2005

Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing.
IACR Cryptol. ePrint Arch., 2005

Efficient ID-Based Optimistic Fair Exchange with Provable Security.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

2004
A New CEMBS Based on RSA Signatures and Its Application in Constructing Fair Exchange Protocol.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

2003
Study on Strand Space Model Theory.
J. Comput. Sci. Technol., 2003


  Loading...