Zongbin Liu
According to our database1,
Zongbin Liu
authored at least 34 papers
between 2010 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
An Intelligent Sorting Method of Film in Cotton Combining Hyperspectral Imaging and the AlexNet-PCA Algorithm.
Sensors, August, 2023
2020
Flush+Time: A High Accuracy and High Resolution Cache Attack On ARM-FPGA Embedded SoC.
Proceedings of the 38th IEEE VLSI Test Symposium, 2020
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020
2019
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks.
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the 22nd International Conference on Control Systems and Computer Science, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
Proceedings of the Security and Privacy in Communication Networks, 2018
2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields.
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016
2015
IACR Cryptol. ePrint Arch., 2015
A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Advances in Information and Computer Security, 2015
Proceedings of the Information Security - 18th International Conference, 2015
QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations.
Proceedings of the Information and Communications Security - 17th International Conference, 2015
2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the IIAI 3rd International Conference on Advanced Applied Informatics, 2014
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over \mathrm p.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
2011
A Tiny RSA Coprocessor based on Optimized Systolic Montgomery Architecture.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
2010
Proceedings of the Information Security, 2010