Limin Fan

Orcid: 0009-0002-7390-0395

According to our database1, Limin Fan authored at least 21 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Error Analysis of NIST SP 800-22 Test Suite.
IEEE Trans. Inf. Forensics Secur., 2023

Optimizing AES Threshold Implementation under the Glitch-Extended Probing Model.
IACR Cryptol. ePrint Arch., 2023

2022
Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA.
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022

2021
Do multiple infections lead to better security? A new study on CHES 2014 infective countermeasure.
Sci. China Inf. Sci., 2021

2020
Lattice-based Fault Attacks against Deterministic Signatures ECDSA and EdDSA.
IACR Cryptol. ePrint Arch., 2020

2019
A new discrete Fourier transform randomness test.
Sci. China Inf. Sci., 2019

A Worst-Case Entropy Estimation of Oscillator-Based Entropy Sources: When the Adversaries Have Access to the History Outputs.
Proceedings of the 18th IEEE International Conference On Trust, 2019

2018
Jitter Estimation with High Accuracy for Oscillator-Based TRNGs.
IACR Cryptol. ePrint Arch., 2018

Lattice-Based Fault Attacks Against ECMQV.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018

2016
My traces learn what you did in the dark: recovering secret signals without key guesses.
IACR Cryptol. ePrint Arch., 2016

Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

Improved Fault Analysis on SIMON Block Cipher Family.
Proceedings of the 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2016

Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2013
A General Method to Evaluate the Correlation of Randomness Tests.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

Integral Based Fault Attack on LBlock.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter?
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

2012
Security management mechanism for composite applications based on hash chains.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2009
Web-based system for industry using information and communication technologies.
Kybernetes, 2009

The Research of Global Correction for C-Arm X-Ray Image Based on Pin-Hole Model.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2008
A Fast Implementation of Computing the Transparency Order of S-Boxes.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2007
Web-based Coordination for E-Commerce.
Proceedings of the Integration and Innovation Orient to E-Society, 2007


  Loading...