Search Results - "Ding, Yaoling"

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning by Wang, Ziyu, Ding, Yaoling, Wang, An, Zhang, Yuwei, Wei, Congming, Sun, Shaofei, Zhu, Liehuang

    “…In side-channel analysis of public-key algorithms, we usually classify operations based on the differences in power traces produced by different basic…”
    Get full text
    Journal Article
  2. 2

    Improved automatic search of impossible differentials for camellia with FL/FL-1 layers by Ding, Yaoling, Wang, Xiaoyun, Wang, Ning, Wang, Wei

    Published in Science China. Information sciences (01-03-2018)
    “…Camellia is an inte.rnational standard adopted by ISO/IEC and is recommended by CRYPTREC and NESSIE project. Wu et al. [1] presented an effective tool to…”
    Get full text
    Journal Article
  3. 3

    Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing by Ding, Yaoling, Shi, Ying, Wang, An, Zheng, Xuexin, Wang, Zongyue, Zhang, Guoshuang

    Published in IEEE access (2019)
    “…Edge computing handles delay-sensitive data and provides real-time feedback, while it brings data security issues to edge devices (such as IoT devices and edge…”
    Get full text
    Journal Article
  4. 4

    Secure Semantic Communications: Challenges, Approaches, and Opportunities by Shen, Meng, Wang, Jing, Du, Hongyang, Niyato, Dusit, Tang, Xiangyun, Kang, Jiawen, Ding, Yaoling, Zhu, Liehuang

    Published in IEEE network (01-07-2024)
    “…Semantic communication has emerged as a promising technique that can integrate the meaning and context of information into a communication process. It goes…”
    Get full text
    Journal Article
  5. 5

    An efficient heuristic power analysis framework based on hill-climbing algorithm by Sun, Shaofei, Ding, Shijun, Wang, An, Ding, Yaoling, Wei, Congming, Zhu, Liehuang, Wang, Yongjuan

    Published in Information sciences (01-03-2024)
    “…Traditional nonprofiling side-channel analysis frequently adopts divide-and-conquer strategy to recover the secret key of a cryptographic algorithm. Only a…”
    Get full text
    Journal Article
  6. 6

    Block-oriented correlation power analysis with bitwise linear leakage: An artificial intelligence approach based on genetic algorithms by Ding, Yaoling, Shi, Ying, Wang, An, Wang, Yongjuan, Zhang, Guoshuang

    Published in Future generation computer systems (01-05-2020)
    “…Correlation power analysis (CPA) is known as a powerful method used to launch side-channel attacks on cryptographic devices. In the classic approach, the key…”
    Get full text
    Journal Article
  7. 7

    Efficient Framework for Genetic Algorithm-Based Correlation Power Analysis by Wang, An, Li, Yuan, Ding, Yaoling, Zhu, Liehuang, Wang, Yongjuan

    “…Various Artificial Intelligence (AI) techniques are combined with classic side-channel methods to improve the efficiency of attacks. Among them,…”
    Get full text
    Journal Article
  8. 8

    Dual-Path Hybrid Residual Network for Profiled Side-Channel Analysis by Sun, Shaofei, Yu, Hongwei, Wang, An, Wei, Congming, Ding, Yaoling, Zhu, Liehuang, Chen, Jiazhe

    “…Side-channel analysis poses a significant security threat to cryptographic chips in embedded devices. The use of deep learning in side-channel analysis makes…”
    Get full text
    Journal Article
  9. 9

    A machine learning based golden-free detection method for command-activated hardware Trojan by Shang, Ning, Wang, An, Ding, Yaoling, Gai, Keke, Zhu, Liehuang, Zhang, Guoshuang

    Published in Information sciences (01-11-2020)
    “…Hardware Trojan detection has been becoming an attentive research subject since the first Trojan in real-world hardware was found. A common way to activate a…”
    Get full text
    Journal Article
  10. 10

    Time Is Not Enough: Timing Leakage Analysis on Cryptographic Chips via Plaintext-Ciphertext Correlation in Non-Timing Channel by Wei, Congming, Hong, Guangze, Wang, An, Wang, Jing, Sun, Shaofei, Ding, Yaoling, Zhu, Liehuang, Ma, Wenrui

    “…In side-channel testing, the standard timing analysis works when the vendor can provide a measurement to indicate the execution time of cryptographic…”
    Get full text
    Journal Article
  11. 11

    An Intelligent Framework for Cluster-Based Side-Channel Analysis on Public-Key Cryptosystems by Wei, Congming, He, Shulin, Wang, An, Sun, Shaofei, Ding, Yaoling, Zhang, Jingqi, Zhu, Liehuang

    Published in IEEE internet of things journal (25-09-2024)
    “…Classical cluster-based side-channel analysis (SCA) uses clustering algorithms to analyze power traces and often, principal component analysis to reduce the…”
    Get full text
    Journal Article
  12. 12

    SCARE and power attack on AES-like block ciphers with secret S-box by LIU, Xin, WANG, An, ZHU, Liehuang, DING, Yaoling, LYU, Zeyuan, WANG, Zongyue

    Published in Frontiers of Computer Science (01-08-2022)
    “…Despite Kerckhoff's principle, there are secret ciphers with unknown components for diplomatic or military usages. The side-channel analysis of reverse…”
    Get full text
    Journal Article
  13. 13

    Attacking the Edge-of-Things: A Physical Attack Perspective by Gai, Keke, Ding, Yaoling, Wang, An, Zhu, Liehuang, Choo, Kim-Kwang Raymond, Zhang, Qi, Wang, Zhuping

    Published in IEEE internet of things journal (01-04-2022)
    “…The concepts between Internet of Things (IoT) and edge computing are increasingly intertwined, as an edge-computing architecture generally comprises a (large)…”
    Get full text
    Journal Article
  14. 14

    Two Dimensional SOST: Extract Multi-Dimensional Leakage for Side-Channel Analysis on Cryptosystems by Liu, Zheng, Wei, Congming, Wen, Shengjun, Sun, Shaofei, Ding, Yaoling, Wang, An

    “…In 2021, Perin et al. proposed a horizontal attack framework against elliptic curve scalar multiplication (ECSM) operation based on the work of Nascimento et…”
    Get full text
    Conference Proceeding
  15. 15