Zongbin Liu

According to our database1, Zongbin Liu authored at least 34 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An Intelligent Sorting Method of Film in Cotton Combining Hyperspectral Imaging and the AlexNet-PCA Algorithm.
Sensors, August, 2023

2020
Flush+Time: A High Accuracy and High Resolution Cache Attack On ARM-FPGA Embedded SoC.
Proceedings of the 38th IEEE VLSI Test Symposium, 2020

Boosting Entropy Extraction of PDL-based RO PUF by High-order Difference Method.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

2019
KPaM: A Key Protection Framework for Mobile Devices Based on Two-party Computation.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Android Control Flow Obfuscation Based on Dynamic Entry Points Modification.
Proceedings of the 22nd International Conference on Control Systems and Computer Science, 2019

A Low Overhead Error Correction Algorithm Using Random Permutation for SRAM PUFs.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Implementation of High Throughput XTS-SM4 Module for Data Storage Devices.
Proceedings of the Security and Privacy in Communication Networks, 2018

2017
A PUF and Software Collaborative Key Protection Scheme.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

A Plausibly Deniable Encryption Scheme Utilizing PUF's Thermo-Sensitivity.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs.
Proceedings of the Security and Privacy in Communication Networks, 2016

Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Novel MITM Attacks on Security Protocols in SDN: A Feasibility Study.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

HPAZ: A high-throughput pipeline architecture of ZUC in hardware.
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016

2015
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs.
IACR Cryptol. ePrint Arch., 2015

A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia.
IACR Cryptol. ePrint Arch., 2015

Bit Error Probability Evaluation of Ring Oscillator PUF (Short Paper).
Proceedings of the Advances in Information and Computer Security, 2015

Bit Error Probability Evaluation of RO PUFs.
Proceedings of the Information Security - 18th International Conference, 2015

QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2014
TST: A New Randomness Test Method Based on Coupon Collector's Problem.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

An Ultra-Compact Hardware Implementation of SMS4.
Proceedings of the IIAI 3rd International Conference on Advanced Applied Informatics, 2014

Entropy Evaluation for Oscillator-Based True Random Number Generators.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

A High-Throughput Unrolled ZUC Core for 100Gbps Data Transmission.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware.
IACR Cryptol. ePrint Arch., 2013

High Radix Montgomery Modular Multiplier on Modern FPGA.
Proceedings of the 12th IEEE International Conference on Trust, 2013

An Efficient Reconfigurable II-ONB Modular Multiplier.
Proceedings of the Security and Privacy in Communication Networks, 2013

A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over \mathrm p.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

2012
Evaluating the Optimized Implementations of SNOW3G and ZUC on FPGA.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
A Tiny RSA Coprocessor based on Optimized Systolic Montgomery Architecture.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Evaluating Optimized Implementations of Stream Cipher ZUC Algorithm on FPGA.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

An Efficient RSA Implementation without Precomputation.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

2010
Rate-Based Watermark Traceback: A New Approach.
Proceedings of the Information Security, 2010


  Loading...