Chenglu Jin

Orcid: 0000-0001-6306-8019

According to our database1, Chenglu Jin authored at least 46 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy and Integrity Protection for IoT Multimodal Data Using Machine Learning and Blockchain.
ACM Trans. Multim. Comput. Commun. Appl., June, 2024

Dynamic Group Time-Based One-Time Passwords.
IEEE Trans. Inf. Forensics Secur., 2024

Optimizing Proof of Aliveness in Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput., 2024

Reading It like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks.
IACR Cryptol. ePrint Arch., 2024

Masked Memory Primitive for Key Insulated Schemes.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024

2023
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model.
J. Cryptol., October, 2023

HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023

Breaking XOR Arbiter PUFs without Reliability Information.
CoRR, 2023

2022
Programmable access-controlled and generic erasable PUF design and its applications.
J. Cryptogr. Eng., 2022

Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location.
IACR Cryptol. ePrint Arch., 2022

Secure Remote Attestation with Strong Key Insulation Guarantees.
CoRR, 2022

2021
PLCrypto: A Symmetric Cryptographic Library for Programmable Logic Controllers.
IACR Trans. Symmetric Cryptol., 2021

A Survey of Cybersecurity of Digital Manufacturing.
Proc. IEEE, 2021

Bilinear Map Based One-Time Signature Scheme with Secret Key Exposure.
IACR Cryptol. ePrint Arch., 2021

Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak.
IACR Cryptol. ePrint Arch., 2021

Hack3D: Crowdsourcing the Assessment of Cybersecurity in Digital Manufacturing.
Computer, 2021

Lightweight Delegated Authentication with Identity Fraud Detection for Cyber-physical Systems.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021

Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
A Survey of Cybersecurity and Resilience of Digital Manufacturing.
CoRR, 2020

Security of Cloud FPGAs: A Survey.
CoRR, 2020

HACK3D: Evaluating Cybersecurity of Additive Manufacturing by Crowdsourcing.
CoRR, 2020

Erasable PUFs: Formal Treatment and Generic Design.
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, 2020

LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Secure and Efficient Initialization and Authentication Protocols for SHIELD.
IEEE Trans. Dependable Secur. Comput., 2019

Advancing the State-of-the-Art in Hardware Trojans Detection.
IEEE Trans. Dependable Secur. Comput., 2019

The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data.
IACR Cryptol. ePrint Arch., 2019

Proof of aliveness.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion.
IACR Cryptol. ePrint Arch., 2018

Efficient Erasable PUFs from Programmable Logic and Memristors.
IACR Cryptol. ePrint Arch., 2018

Comments on "Defeating HaTCh: Building Malicious IP Cores".
CoRR, 2018

Snapshotter: Lightweight intrusion detection and prevention system for industrial control systems.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018

2017
MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks.
IACR Cryptol. ePrint Arch., 2017

Weak-Unforgeable Tags for Secure Supply Chain Management.
IACR Cryptol. ePrint Arch., 2017

FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise.
Cryptogr., 2017

Intrinsically Reliable and Lightweight Physical Obfuscated Keys.
CoRR, 2017

Advancing the state-of-the-art in hardware Trojans design.
Proceedings of the IEEE 60th International Midwest Symposium on Circuits and Systems, 2017

New clone-detection approach for RFID-based supply chains.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

Phase calibrated ring oscillator PUF design and implementation on FPGAs.
Proceedings of the 27th International Conference on Field Programmable Logic and Applications, 2017

Mitigating Synchronized Hardware Trojan Attacks in Smart Grids.
Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, 2017

2016
Can Algorithm Diversity in Stream Cipher Implementation Thwart (Natural and) Malicious Faults?
IEEE Trans. Emerg. Top. Comput., 2016

2015
Security analysis of concurrent error detection against differential fault analysis.
J. Cryptogr. Eng., 2015

PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management.
IACR Cryptol. ePrint Arch., 2015

Simulation and analysis of negative-bias temperature instability aging on power analysis attacks.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

2014
HaTCh: Hardware Trojan Catcher.
IACR Cryptol. ePrint Arch., 2014

NREPO: Normal Basis Recomputing with Permuted Operands.
IACR Cryptol. ePrint Arch., 2014


  Loading...