Hailong Zhang

Orcid: 0000-0002-8401-9838

Affiliations:
  • CAS, Institute of Information Engineering, Beijing, China


According to our database1, Hailong Zhang authored at least 46 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Screening Least Square Technique Assisted Multivariate Template Attack Against the Random Polynomial Generation of Dilithium.
IEEE Trans. Inf. Forensics Secur., 2024

Differential Cryptanalysis Against SIMECK Implementation in a Leakage Profiling Scenario.
Proceedings of the Information Security Practice and Experience, 2024

2023
Efficient Exploitation of Noise Leakage for Template Attack.
IEEE Embed. Syst. Lett., September, 2023

Template Attack Assisted Linear Cryptanalysis on Outer Rounds Protected DES Implementations.
Comput. J., June, 2023

Building Efficient Parallel Endorsement Node on Blockchain Systems.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
Higher-Order Masking Scheme for Trivium Hardware Implementation.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

Variance analysis based distinguisher for template attack.
Proceedings of the 18th International Conference on Computational Intelligence and Security, 2022

2021
On the Modified Transparency Order of n , m -Functions.
Secur. Commun. Networks, 2021

Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks.
Mob. Networks Appl., 2021

Multi-channel time-frequency fusion attacks.
Int. J. Inf. Comput. Secur., 2021

Theoretical Estimation on the Success Rate of the Asymptotic Higher Order Optimal Distinguisher.
Comput. J., 2021

Transparency Order of (n, m)-Functions - Its Further Characterization and Applications.
Proceedings of the Information Security - 24th International Conference, 2021

On Characterization of Transparency Order for (n, m)-functions.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

2020
On the Exact Relationship Between the Success Rate of Template Attack and Different Parameters.
IEEE Trans. Inf. Forensics Secur., 2020

Improving Efficiency of Key Enumeration Based on Side-Channel Analysis.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Side-Channel Leakage Detection Based on Constant Parameter Channel Model.
Proceedings of the 38th IEEE International Conference on Computer Design, 2020

2019
Template attack vs. stochastic model: An empirical study on the performances of profiling attacks in real scenarios.
Microprocess. Microsystems, 2019

Side-Channel Leakage Amount Estimation Based on Communication Theory.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Multiple leakage samples based higher order optimal distinguisher.
Inf. Sci., 2018

On the exact relationship between the Mutual Information Metric and the Success Rate Metric.
Inf. Sci., 2018

A Lightweight Multi-precision Squaring on Embedded Processors for ECC.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Lightweight FourQ Primitive on ARM Cortex-M0.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Cache-Collision Attacks on GPU-Based AES Implementation with Electro-Magnetic Leakages.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Electro-magnetic analysis of GPU-based AES implementation.
Proceedings of the 55th Annual Design Automation Conference, 2018

2017
Multi-Channel Fusion Attacks.
IEEE Trans. Inf. Forensics Secur., 2017

How Far Can We Reach? Breaking RSM-Masked AES-128 Implementation Using Only One Trace.
IACR Cryptol. ePrint Arch., 2017

Mahalanobis Distance Similarity Measure Based Higher Order Optimal Distinguisher.
Comput. J., 2017

A Lightweight Anonymous Mutual Authentication with Key Agreement Protocol on ECC.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Reducing Randomness Complexity of Mask Refreshing Algorithm.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Distance Based Leakage Alignment for Side Channel Attacks.
IEEE Signal Process. Lett., 2016

Theoretical and practical aspects of multiple samples correlation power analysis.
Secur. Commun. Networks, 2016

Towards optimal leakage exploitation rate in template attacks.
Secur. Commun. Networks, 2016

How many interesting points should be used in a template attack?
J. Syst. Softw., 2016

Hilbert Transform Based Vertical Preprocessing for Side-Channel Analysis.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
Mahalanobis distance similarity measure based distinguisher for template attack.
Secur. Commun. Networks, 2015

Estimating Differential-Linear Distinguishers and Applications to CTC2.
Proceedings of the Information Security Practice and Experience, 2015

Higher-Order Masking Schemes for Simon.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2014
How to Choose Interesting Points for Template Attack More Effectively?
IACR Cryptol. ePrint Arch., 2014

How to Choose Interesting Points for Template Attacks?
IACR Cryptol. ePrint Arch., 2014

How to Effectively Decrease the Resource Requirement in Template Attack?
Proceedings of the Advances in Information and Computer Security, 2014

Template Attacks Based on Priori Knowledge.
Proceedings of the Trusted Systems - 6th International Conference, 2014

How to Choose Interesting Points for Template Attacks More Effectively?
Proceedings of the Trusted Systems - 6th International Conference, 2014

How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice?
Proceedings of the Information and Communications Security - 16th International Conference, 2014

2013
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers.
IACR Cryptol. ePrint Arch., 2013

Towards Leakage Exploitation Optimality in Profiled Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2013

2011
An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011


  Loading...