Yang Li
Affiliations:- University of Electro-Communications, Department of Informatics, Tokyo, Japan
According to our database1,
Yang Li
authored at least 47 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
2023
J. Inf. Process., 2023
Exploring Leakage Characteristics and Attacks Through Profiles of Screaming Channels.
Proceedings of the Mobile Internet Security - 7th International Conference, 2023
Proceedings of the 2023 ACM/SIGDA International Symposium on Field Programmable Gate Arrays, 2023
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
2022
Mixture-Based 5-Round Physical Attack against AES: Attack Proposal and Noise Evaluation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022
Examining Vulnerability of HLS-designed Chaskey-12 Circuits to Power Side-Channel Attacks.
Proceedings of the 23rd International Symposium on Quality Electronic Design, 2022
Optimized Software Implementations of Ascon, Grain-128AEAD, and TinyJambu on ARM Cortex-M0.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022
2021
Revisiting System Noise in Side-Channel Attacks: Mutual Assistant SCA vs. Genetic Algorithm.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2021
2020
A Framework for Evaluation and Analysis on Infection Countermeasures Against Fault Attacks.
IEEE Trans. Inf. Forensics Secur., 2020
Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function.
IACR Cryptol. ePrint Arch., 2020
(Short Paper) Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function.
Proceedings of the Advances in Information and Computer Security, 2020
Proceedings of the International Symposium on Information Theory and Its Applications, 2020
An Optimized Implementation of AES-GCM for FPGA Acceleration Using High-Level Synthesis.
Proceedings of the 9th IEEE Global Conference on Consumer Electronics, 2020
Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2015
A Silicon-Level Countermeasure Against Fault Sensitivity Analysis and Its Evaluation.
IEEE Trans. Very Large Scale Integr. Syst., 2015
Wiley, ISBN: 978-1-118-66001-0, 2015
2014
J. Inf. Process., 2014
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest.
J. Cryptogr. Eng., 2014
Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication.
Proceedings of the Radio Frequency Identification System Security, 2014
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Coupon Collector's Problem for Fault Analysis against AES - High Tolerance for Noisy Fault Injections.
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013
Proceedings of the American Control Conference, 2013
2012
Proceedings of the Fault Analysis in Cryptography, 2012
IEEE Trans. Inf. Forensics Secur., 2012
IEEE Trans. Inf. Forensics Secur., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks.
Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
2011
Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Clockwise Collision Analysis - Overlooked Side-Channel Leakage Inside Your Measurements.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2011
On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis.
Proceedings of the Information Security Applications - 11th International Workshop, 2010
Proceedings of the Design, Automation and Test in Europe, 2010
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009