发表论文
[1] Qiao, Zehua, Liu, Yuejun, Zhou, Yongbin, Ming, Jingdian, Jin, Chengbin, Li, Huizhong. Practical Public Template Attack Attacks on CRYSTALS-Dilithium With Randomness Leakages. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2023, 18: 1-14, [2] Jin, Chengbin, Zhou, Yongbin, Qiu, Xinkuan, Feng, Qi, Zhang, Qian. Breaking real-world COTS USIM cards with unknown side-channel countermeasures. COMPUTERS & SECURITY[J]. 2022, 113: http://dx.doi.org/10.1016/j.cose.2021.102531.[3] Ming, Jingdian, Zhou, Yongbin, Cheng, Wei, Li, Huizhong. Optimizing Higher-Order Correlation Analysis Against Inner Product Masking Scheme. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2022, 17: 3555-3568, [4] Shuo Sun, Yongbin Zhou, Yunfeng Ji, Rui Zhang, Yang Tao. Generic, efficient and isochronous Gaussian sampling over the integers. CYBERSECURITY[J]. 2022, 5(1): 1-22, http://dx.doi.org/10.1186/s42400-022-00113-0.[5] Huizhong Li, Jingdian Ming, Yongbin Zhou. Assessment of Addition-Chain-Based Masked S-Box Using Deep-Learning-Based Side-Channel Attacks. SECURITY AND COMMUNICATION NETWORKS[J]. 2022, [6] Wang, Ti, Zhou, Yongbin, Ma, Hui, Zhang, Rui. Enhanced Dual-Policy Attribute-Based Encryption for Secure Data Sharing in the Cloud. SECURITY AND COMMUNICATION NETWORKS[J]. 2022, 2022: [7] Jin, Chengbin, Zhou, Yongbin. Enhancing Deep-Learning Based Side-Channel Analysis Through Simultaneously Multi-Byte Training. COMPUTER JOURNAL. 2022, [8] Jingdian Ming, Huizhong Li, Yongbin Zhou, Wei Cheng, Zehua Qiao. Revealing the Weakness of Addition Chain Based Masked SBox Implementations. TRANSACTIONS ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS[J]. 2021, https://doaj.org/article/ccc1f50203d34f878208fb534a4fe11b.[9] Wang, Jinwei, Li, Yong, Chen, Xi, Zhou, Yongbin, Shen, W, Barthes, JP, Luo, J, Shi, Y, Zhang, J. Modeling Password Guessability via Variational Auto-Encoder. PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD)[J]. 2021, 348-353, [10] Shi, Ruixin, Zhou, Yongbin, Li, Yong, Han, Weili. Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study. SECURITY AND COMMUNICATION NETWORKS[J]. 2021, 2021: http://dx.doi.org/10.1155/2021/5563884.[11] Gao, Yiwen, Zhou, Yongbin. Side-Channel Attacks With Multi-Thread Mixed Leakage. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2021, 16: 770-785, https://www.webofscience.com/wos/woscc/full-record/WOS:000576264500006.[12] Huizhong Li, Guang Yang, Jingdian Ming, Yongbin Zhou, Chengbin Jin. Transparency order versus confusion coefficient: a case study of NIST lightweight cryptography S-Boxes. CYBERSECURITY[J]. 2021, 4(1): 1-20, [13] Li, Huizhong, Zhou, Yongbin, Ming, Jingdian, Yang, Guang, Jin, Chengbin. The Notion of Transparency Order, Revisited. COMPUTER JOURNAL[J]. 2020, 63(12): 1915-1938, http://dx.doi.org/10.1093/comjnl/bxaa069.[14] Zhou Yongbin. Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack. The 16th International Conference on Information Security and Cryptology (Inscrypt 2020). 2020, [15] Yang, Guang, Li, Huizhong, Ming, Jingdian, Zhou, Yongbin, Zhou, J, Luo, X, Shen, Q, Xu, Z. CDAE: Towards Empowering Denoising in Side-Channel Analysis. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019)null. 2020, 11999: 269-286, [16] Ming, Jingdian, Zhou, Yongbin, Cheng, Wei, Li, Huizhong, Yang, Guang, Zhang, Qian. Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2020, 15: 3694-3708, https://www.webofscience.com/wos/woscc/full-record/WOS:000548753800003.[17] Zhou Yongbin. Convolutional Neural Network Based Side-Channel Attacks in Time-Frequency Representations. CARDIS 2018. 2019, [18] Yuejun Liu, Rui Zhang, Yongbin Zhou. Predicate encryption against master-key tampering attacks. CYBERSECURITY[J]. 2019, 2(1): 1-20, http://lib.cqvip.com/Qikan/Article/Detail?id=7103850252.[19] Zhang Qian, Zhou Yongbin, Qiu Shuang, Cheng Wei, Ming Jingdian, Zhang Rui, IEEE. A Compact AES Hardware Implementation Secure against 1st-Order Side-Channel Attacks. 2018 IEEE 36TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD)null. 2018, 545-552, [20] Qiu Shuang, Zhang Rui, Zhou Yongbin, Zhang Hailong, Qing S, Mitchell C, Chen L, Liu D. Reducing Randomness Complexity of Mask Refreshing Algorithm. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017null. 2018, 10631: 88-101, [21] Zhang, Hailong, Zhou, Yongbin. On the exact relationship between the Mutual Information Metric and the Success Rate Metric. INFORMATION SCIENCES[J]. 2018, 435: 15-25, http://dx.doi.org/10.1016/j.ins.2017.12.053.[22] Gao Yiwen, Zhang Hailong, Cheng Wei, Zhou Yongbin, Cao Yuchen, IEEE. Electro-Magnetic Analysis of GPU-based AES Implementation. 2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC)null. 2018, http://dx.doi.org/10.1145/3195970.3196042.[23] Zhang, Hailong, Zhou, Yongbin. Multiple leakage samples based higher order optimal distinguisher. INFORMATION SCIENCES[J]. 2018, 466: 92-108, http://dx.doi.org/10.1016/j.ins.2018.07.042.[24] Gao Yiwen, Cheng Wei, Zhang Hailong, Zhou Yongbin, IEEE. Cache-Collision Attacks on GPU-based AES Implementation with Electro-Magnetic Leakages. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE)null. 2018, 300-306, [25] Fan Guangjun, Zhou Yongbin, Zhang Hailong, Feng Dengguo. The Cognition Is Not Enough: Another Look on Existing Interesting Points Chosen Methods. CHINESE JOURNAL OF ELECTRONICS[J]. 2017, 26(2): 416-423, https://www.webofscience.com/wos/woscc/full-record/WOS:000397351700029.[26] Yang, Wei, Zhou, Yongbin, Cao, Yuchen, Zhang, Hailong, Zhang, Qian, Wang, Huan. Multi-Channel Fusion Attacks. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2017, 12(8): 1757-1771, https://www.webofscience.com/wos/woscc/full-record/WOS:000401340500001.[27] Zhang, Hailong, Zhou, Yongbin. Mahalanobis Distance Similarity Measure Based Higher Order Optimal Distinguisher. COMPUTER JOURNAL[J]. 2017, 60(8): 1131-1144, https://www.webofscience.com/wos/woscc/full-record/WOS:000407592100002.[28] Zhang, Rui, Qiu, Shuang, Zhou, Yongbin. Further Improving Efficiency of Higher Order Masking Schemes by Decreasing Randomness Complexity. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2017, 12(11): 2590-2598, https://www.webofscience.com/wos/woscc/full-record/WOS:000406290600007.[29] Cheng Wei, Zhou Yongbin, Sauvage Laurent, Lam KY, Chi CH, Qing S. Differential Fault Analysis on Midori. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016null. 2016, 9977: 307-317, [30] Hu, Chengyu, Yang, Rupeng, Liu, Pengtao, Yu, Zuoxia, Zhou, Yongbin, Xu, Qiuliang. Public-key encryption with keyword search secure against continual memory attacks. SECURITY AND COMMUNICATION NETWORKS[J]. 2016, 9(11): 1613-1629, https://www.webofscience.com/wos/woscc/full-record/WOS:000379053800027.[31] Yang, Wei, Cao, Yuchen, Zhou, Yongbin, Zhang, Hailong, Zhang, Qian. Distance Based Leakage Alignment for Side Channel Attacks. IEEE SIGNAL PROCESSING LETTERS[J]. 2016, 23(4): 419-423, https://www.webofscience.com/wos/woscc/full-record/WOS:000393311700001.[32] Fan, Guangjun, Zhou, Yongbin, Zhang, Hailong, Feng, Dengguo. Towards optimal leakage exploitation rate in template attacks. SECURITY AND COMMUNICATION NETWORKS[J]. 2016, 9(16): 3116-3126, https://www.webofscience.com/wos/woscc/full-record/WOS:000389250100007.[33] Cao Yuchen, Zhou Yongbin, Zhang Hailong, Yang Wei, IEEE. Hilbert Transform based Vertical Preprocessing for Side-Channel Analysis. 2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN)null. 2016, [34] Zhang, Hailong, Zhou, Yongbin, Feng, Dengguo. Theoretical and practical aspects of multiple samples correlation power analysis. SECURITY AND COMMUNICATION NETWORKS[J]. 2016, 9(18): 5166-5177, [35] Zhang, Hailong, Zhou, Yongbin. How many interesting points should be used in a template attack?. JOURNAL OF SYSTEMS AND SOFTWARE[J]. 2016, 120: 105-113, http://dx.doi.org/10.1016/j.jss.2016.07.028.[36] Zhang, Hailong, Zhou, Yongbin, Feng, Dengguo. Mahalanobis distance similarity measure based distinguisher for template attack. SECURITY AND COMMUNICATION NETWORKS[J]. 2015, 8(5): 769-777, https://www.webofscience.com/wos/woscc/full-record/WOS:000350273000006.[37] Zheng Chao, Zhou Yongbin, Zheng Yingxian, IEEE. A Fast Implementation of MPC-KSA Side-Channel Distinguisher. 24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015null. 2015, [38] Zheng Yingxian, Zhou Yongbin, Yu Zhenmei, Hu Chengyu, Zhang Hailong, Hui LCK, Qing SH, Shi E, Yiu SM. How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice?. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014null. 2015, 8958: 200-214, [39] Zhou Yongbin. Higher-Order Masking Schemes for Simon. ICICS 2015. 2015, [40] Yang Rupeng, Xu Qiuliang, Zhou Yongbin, Zhang Rui, Hu Chengyu, Yu Zuoxia, Pernul G, Ryan PYA, Weippl E. Updatable Hash Proof System and Its Applications. COMPUTER SECURITY - ESORICS 2015, PT Inull. 2015, 9326: 266-285, [41] Chen, Danyang, Zhou, Yongbin, Han, Yang, Xue, Rui, He, Qing. On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives. INFORMATION SCIENCES[J]. 2014, 271: 213-223, http://dx.doi.org/10.1016/j.ins.2014.02.149.[42] Zhou Yongbin. Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers. ISPEC 2013. 2013, [43] Zhou Yongbin. EMD-Based Denoising for Side-Channel Attacks and Relationships between the Noises Extracted with Different Denoising Methods. ICICS 2013. 2013, [44] Zhang Hailong, Zhou Yongbin, Feng Dengguo. An efficient leakage characterization method for profiled power analysis attacks. LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS)null. 2012, 61-73, http://ir.iscas.ac.cn/handle/311060/15760.[45] Liu Jiye, Zhou Yongbin, Yang Shuguo, Feng Dengguo. Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation. CHINESE JOURNAL OF ELECTRONICS[J]. 2012, 21(3): 547-553, http://lib.cqvip.com/Qikan/Article/Detail?id=44611578.[46] Yang Shuguo, Zhou Yongbin, Liu Jiye, Chen Danyang. Back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations. LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS)null. 2012, 169-185, http://ir.iscas.ac.cn/handle/311060/15743.