Yongbin Zhou
Orcid: 0000-0002-1337-0655
According to our database1,
Yongbin Zhou
authored at least 115 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Cybersecur., December, 2024
What Is Now Possible? Security Evaluation on Univariate DPA Attacks With Inaccurate Leakage Models.
IEEE Trans. Inf. Forensics Secur., 2024
Theor. Comput. Sci., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Reconstruction of Differentially Private Text Sanitization via Large Language Models.
CoRR, 2024
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024
dp-promise: Differentially Private Diffusion Probabilistic Models for Image Synthesis.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Computer Vision - ECCV 2024, 2024
2023
Cybersecur., December, 2023
Enhancing Deep-Learning Based Side-Channel Analysis Through Simultaneously Multi-Byte Training.
Comput. J., November, 2023
Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud.
Comput. J., June, 2023
Practical Public Template Attack Attacks on CRYSTALS-Dilithium With Randomness Leakages.
IEEE Trans. Inf. Forensics Secur., 2023
In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Information Security Practice and Experience, 2023
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023
2022
Frontiers Comput. Sci., October, 2022
IEEE Trans. Inf. Forensics Secur., 2022
IACR Cryptol. ePrint Arch., 2022
Comput. Secur., 2022
Proceedings of the Information and Communications Security - 24th International Conference, 2022
Proceedings of the 2nd International Conference on Control and Intelligent Robotics, 2022
2021
On the Security of Lattice-Based Fiat-Shamir Signatures in the Presence of Randomness Leakage.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
Secur. Commun. Networks, 2021
IACR Cryptol. ePrint Arch., 2021
Cybersecur., 2021
Transparency order versus confusion coefficient: a case study of NIST lightweight cryptography S-Boxes.
Cybersecur., 2021
Proceedings of the Information Security - 24th International Conference, 2021
Proceedings of the 26th International Conference on Automation and Computing, 2021
Proceedings of the 39th IEEE International Conference on Computer Design, 2021
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
Multi-strategy Knowledge Distillation Based Teacher-Student Framework for Machine Reading Comprehension.
Proceedings of the Chinese Computational Linguistics - 20th China National Conference, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Cybersecur., 2020
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
Template attack vs. stochastic model: An empirical study on the performances of profiling attacks in real scenarios.
Microprocess. Microsystems, 2019
IEEE Commun. Lett., 2019
On Security of Fiat-Shamir Signatures over Lattice in the Presence of Randomness Leakage.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
2018
On the exact relationship between the Mutual Information Metric and the Success Rate Metric.
Inf. Sci., 2018
IACR Cryptol. ePrint Arch., 2018
How Does Strict Parallelism Affect Security? A Case Study on the Side-Channel Attacks against GPU-based Bitsliced AES Implementation.
IACR Cryptol. ePrint Arch., 2018
Cache-Collision Attacks on GPU-Based AES Implementation with Electro-Magnetic Leakages.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 36th IEEE International Conference on Computer Design, 2018
Proceedings of the 2nd International Conference on High Performance Compilation, 2018
Proceedings of the 55th Annual Design Automation Conference, 2018
Convolutional Neural Network Based Side-Channel Attacks in Time-Frequency Representations.
Proceedings of the Smart Card Research and Advanced Applications, 2018
2017
Further Improving Efficiency of Higher Order Masking Schemes by Decreasing Randomness Complexity.
IEEE Trans. Inf. Forensics Secur., 2017
Ranging Consistency Based on Ranging-Compensated Temperature-Sensing Sensor for Inter-Satellite Link of Navigation Constellation.
Sensors, 2017
Corrections to "Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexity".
IACR Cryptol. ePrint Arch., 2017
How Far Can We Reach? Breaking RSM-Masked AES-128 Implementation Using Only One Trace.
IACR Cryptol. ePrint Arch., 2017
Comput. J., 2017
Cooperative simultaneous autonomous orbit determination and time synchronization: A distributed factor graph approach.
Proceedings of the 18th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
2016
IEEE Signal Process. Lett., 2016
Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks.
Soft Comput., 2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
J. Syst. Softw., 2016
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
2015
Secur. Commun. Networks, 2015
Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption.
Int. J. Embed. Syst., 2015
On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes.
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
2014
On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives.
Inf. Sci., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Trusted Systems - 6th International Conference, 2014
Proceedings of the Trusted Systems - 6th International Conference, 2014
How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice?
Proceedings of the Information and Communications Security - 16th International Conference, 2014
2013
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient ElGamal Encryption.
IACR Cryptol. ePrint Arch., 2013
Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function.
IACR Cryptol. ePrint Arch., 2013
On the Negative Effects of Trend Noise and Its Applications in Side-Channel Cryptanalysis.
IACR Cryptol. ePrint Arch., 2013
EMD-Based Denoising for Side-Channel Attacks and Relationships between the Noises Extracted with Different Denoising Methods.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
2011
Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011
2010
Proceedings of the 5th ACM Symposium on Information, 2010
Fault Propagation Pattern Based DFA on Feistel Ciphers, with Application to Camellia.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
J. Comput. Sci. Technol., 2009
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
Proceedings of the Euro-Par 2009 Parallel Processing, 2009
Software and Hardware Cooperate for 1-D FFT Algorithm Optimization on Multicore Processors.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009
2008
Proceedings of the Second International Conference on Secure System Integration and Reliability Improvement, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
2007
Proceedings of the Architecture of Computing Systems, 2007
2005
Cryptanalysis of the end-to-end security for mobile communications with end-user identification/authentication.
IEEE Commun. Lett., 2005
Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing.
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
2004
A New CEMBS Based on RSA Signatures and Its Application in Constructing Fair Exchange Protocol.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004
2003