Search Results - "Ding, Yaoling"
-
1
SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning
Published in IACR transactions on cryptographic hardware and embedded systems (05-09-2024)“…In side-channel analysis of public-key algorithms, we usually classify operations based on the differences in power traces produced by different basic…”
Get full text
Journal Article -
2
Improved automatic search of impossible differentials for camellia with FL/FL-1 layers
Published in Science China. Information sciences (01-03-2018)“…Camellia is an inte.rnational standard adopted by ISO/IEC and is recommended by CRYPTREC and NESSIE project. Wu et al. [1] presented an effective tool to…”
Get full text
Journal Article -
3
Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing
Published in IEEE access (2019)“…Edge computing handles delay-sensitive data and provides real-time feedback, while it brings data security issues to edge devices (such as IoT devices and edge…”
Get full text
Journal Article -
4
Secure Semantic Communications: Challenges, Approaches, and Opportunities
Published in IEEE network (01-07-2024)“…Semantic communication has emerged as a promising technique that can integrate the meaning and context of information into a communication process. It goes…”
Get full text
Journal Article -
5
An efficient heuristic power analysis framework based on hill-climbing algorithm
Published in Information sciences (01-03-2024)“…Traditional nonprofiling side-channel analysis frequently adopts divide-and-conquer strategy to recover the secret key of a cryptographic algorithm. Only a…”
Get full text
Journal Article -
6
Block-oriented correlation power analysis with bitwise linear leakage: An artificial intelligence approach based on genetic algorithms
Published in Future generation computer systems (01-05-2020)“…Correlation power analysis (CPA) is known as a powerful method used to launch side-channel attacks on cryptographic devices. In the classic approach, the key…”
Get full text
Journal Article -
7
Efficient Framework for Genetic Algorithm-Based Correlation Power Analysis
Published in IEEE transactions on information forensics and security (2021)“…Various Artificial Intelligence (AI) techniques are combined with classic side-channel methods to improve the efficiency of attacks. Among them,…”
Get full text
Journal Article -
8
Dual-Path Hybrid Residual Network for Profiled Side-Channel Analysis
Published in IEEE transactions on circuits and systems. II, Express briefs (01-08-2024)“…Side-channel analysis poses a significant security threat to cryptographic chips in embedded devices. The use of deep learning in side-channel analysis makes…”
Get full text
Journal Article -
9
A machine learning based golden-free detection method for command-activated hardware Trojan
Published in Information sciences (01-11-2020)“…Hardware Trojan detection has been becoming an attentive research subject since the first Trojan in real-world hardware was found. A common way to activate a…”
Get full text
Journal Article -
10
Time Is Not Enough: Timing Leakage Analysis on Cryptographic Chips via Plaintext-Ciphertext Correlation in Non-Timing Channel
Published in IEEE transactions on information forensics and security (2024)“…In side-channel testing, the standard timing analysis works when the vendor can provide a measurement to indicate the execution time of cryptographic…”
Get full text
Journal Article -
11
An Intelligent Framework for Cluster-Based Side-Channel Analysis on Public-Key Cryptosystems
Published in IEEE internet of things journal (25-09-2024)“…Classical cluster-based side-channel analysis (SCA) uses clustering algorithms to analyze power traces and often, principal component analysis to reduce the…”
Get full text
Journal Article -
12
SCARE and power attack on AES-like block ciphers with secret S-box
Published in Frontiers of Computer Science (01-08-2022)“…Despite Kerckhoff's principle, there are secret ciphers with unknown components for diplomatic or military usages. The side-channel analysis of reverse…”
Get full text
Journal Article -
13
Attacking the Edge-of-Things: A Physical Attack Perspective
Published in IEEE internet of things journal (01-04-2022)“…The concepts between Internet of Things (IoT) and edge computing are increasingly intertwined, as an edge-computing architecture generally comprises a (large)…”
Get full text
Journal Article -
14
Two Dimensional SOST: Extract Multi-Dimensional Leakage for Side-Channel Analysis on Cryptosystems
Published in 2023 7th International Conference on Cryptography, Security and Privacy (CSP) (01-04-2023)“…In 2021, Perin et al. proposed a horizontal attack framework against elliptic curve scalar multiplication (ECSM) operation based on the work of Nascimento et…”
Get full text
Conference Proceeding -
15
Correlation Power Analysis and Protected Implementation on Lightweight Block Cipher FESH
Published in 2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS) (01-05-2022)“…With the development of the Internet of Things (IoT), the demand for lightweight cipher came into being. At the same time, the security of lightweight cipher…”
Get full text
Conference Proceeding