基本信息
周永彬  男  博导  其他
电子邮件: zhouyongbin@njust.edu.cn
通信地址: 南京市玄武区孝陵卫街200号
邮政编码: 210094

研究领域

1. 密码学与密码工程学
2. 网络与系统安全
3. 云计算安全


招生信息

   
招生专业
083900-网络空间安全
招生方向
密码学与密码工程
网络与系统安全
云计算安全

教育背景

2000-09--2004-02 中国科学院软件研究所 工学博士学位
1997-09--2000-06 山东大学计算机科学系 工学硕士学位
学历
中国科学院软件研究所 -- 研究生
学位
中国科学院软件研究所 -- 博士
出国学习工作
2008-2009: Visiting Reseach at CERIAS (http://www.cerias.purdue.edu) and at Department of Computer Science(http://www.cs.purdue.edu),  Purude University, West Lafayette
 

教授课程

侧信道密码分析学、 现代密码学导引

专利与奖励

   
奖励信息
(1) 密码科技进步奖,三等奖,部委级,2013
(2) 国家科学技术进步奖,二等奖,国家级,2011
(3) 密码科技进步奖,一等奖,部委级,2006
专利成果
[1] 周永彬, 王提, 马晖, 张锐. 一种支持双重访问控制的数据共享方法及系统. CN: CN113810368A, 2021-12-17.

[2] 周永彬, 姜子铭, 张锐. 一种后量子密码构造中环上舍入学习的通用软件实现方法. CN: CN113179151A, 2021-07-27.

[3] 周永彬, 王提, 马晖, 张锐. 一种云计算环境下的安全可控高效的数据共享方法及系统. CN: CN109831430A, 2019-05-31.

[4] 周永彬, 明经典, 张倩, 李慧中. 一种针对AES算法线性部分的高效掩码防护方法. CN: CN109617667A, 2019-04-12.

[5] 张锐, 张倩, 周永彬, 邱爽. 一种AES算法的快速安全硬件结构. CN: CN107070630A, 2017-08-18.

[6] 张锐, 张倩, 周永彬, 丁天. 一种DES加解密密钥生成器及密钥生成方法. CN: CN106877999A, 2017-06-20.

[7] 周永彬, 高旭, 张倩. 一种侧信道分析评估基准板. CN: CN204697071U, 2015-10-07.

[8] 周永彬, 张倩, 高旭. 一种可传输多种算法参数的数据传输方法. CN: CN104836639A, 2015-08-12.

[9] 周永彬, 郑超, 郑英显, 高旭, 李大为, 罗鹏. 一种密码实现侧信道安全性快速检测方法. CN: CN104717054A, 2015-06-17.

出版信息

   
发表论文
[1] Qiao, Zehua, Liu, Yuejun, Zhou, Yongbin, Ming, Jingdian, Jin, Chengbin, Li, Huizhong. Practical Public Template Attack Attacks on CRYSTALS-Dilithium With Randomness Leakages. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2023, 18: 1-14, [2] Jin, Chengbin, Zhou, Yongbin, Qiu, Xinkuan, Feng, Qi, Zhang, Qian. Breaking real-world COTS USIM cards with unknown side-channel countermeasures. COMPUTERS & SECURITY[J]. 2022, 113: http://dx.doi.org/10.1016/j.cose.2021.102531.
[3] Ming, Jingdian, Zhou, Yongbin, Cheng, Wei, Li, Huizhong. Optimizing Higher-Order Correlation Analysis Against Inner Product Masking Scheme. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2022, 17: 3555-3568, [4] Shuo Sun, Yongbin Zhou, Yunfeng Ji, Rui Zhang, Yang Tao. Generic, efficient and isochronous Gaussian sampling over the integers. CYBERSECURITY[J]. 2022, 5(1): 1-22, http://dx.doi.org/10.1186/s42400-022-00113-0.
[5] Huizhong Li, Jingdian Ming, Yongbin Zhou. Assessment of Addition-Chain-Based Masked S-Box Using Deep-Learning-Based Side-Channel Attacks. SECURITY AND COMMUNICATION NETWORKS[J]. 2022, [6] Wang, Ti, Zhou, Yongbin, Ma, Hui, Zhang, Rui. Enhanced Dual-Policy Attribute-Based Encryption for Secure Data Sharing in the Cloud. SECURITY AND COMMUNICATION NETWORKS[J]. 2022, 2022: [7] Jin, Chengbin, Zhou, Yongbin. Enhancing Deep-Learning Based Side-Channel Analysis Through Simultaneously Multi-Byte Training. COMPUTER JOURNAL. 2022, [8] Jingdian Ming, Huizhong Li, Yongbin Zhou, Wei Cheng, Zehua Qiao. Revealing the Weakness of Addition Chain Based Masked SBox Implementations. TRANSACTIONS ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS[J]. 2021, https://doaj.org/article/ccc1f50203d34f878208fb534a4fe11b.
[9] Wang, Jinwei, Li, Yong, Chen, Xi, Zhou, Yongbin, Shen, W, Barthes, JP, Luo, J, Shi, Y, Zhang, J. Modeling Password Guessability via Variational Auto-Encoder. PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD)[J]. 2021, 348-353, [10] Shi, Ruixin, Zhou, Yongbin, Li, Yong, Han, Weili. Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study. SECURITY AND COMMUNICATION NETWORKS[J]. 2021, 2021: http://dx.doi.org/10.1155/2021/5563884.
[11] Gao, Yiwen, Zhou, Yongbin. Side-Channel Attacks With Multi-Thread Mixed Leakage. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2021, 16: 770-785, https://www.webofscience.com/wos/woscc/full-record/WOS:000576264500006.
[12] Huizhong Li, Guang Yang, Jingdian Ming, Yongbin Zhou, Chengbin Jin. Transparency order versus confusion coefficient: a case study of NIST lightweight cryptography S-Boxes. CYBERSECURITY[J]. 2021, 4(1): 1-20, [13] Li, Huizhong, Zhou, Yongbin, Ming, Jingdian, Yang, Guang, Jin, Chengbin. The Notion of Transparency Order, Revisited. COMPUTER JOURNAL[J]. 2020, 63(12): 1915-1938, http://dx.doi.org/10.1093/comjnl/bxaa069.
[14] Zhou Yongbin. Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack. The 16th International Conference on Information Security and Cryptology (Inscrypt 2020). 2020, [15] Yang, Guang, Li, Huizhong, Ming, Jingdian, Zhou, Yongbin, Zhou, J, Luo, X, Shen, Q, Xu, Z. CDAE: Towards Empowering Denoising in Side-Channel Analysis. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019)null. 2020, 11999: 269-286, [16] Ming, Jingdian, Zhou, Yongbin, Cheng, Wei, Li, Huizhong, Yang, Guang, Zhang, Qian. Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2020, 15: 3694-3708, https://www.webofscience.com/wos/woscc/full-record/WOS:000548753800003.
[17] Zhou Yongbin. Convolutional Neural Network Based Side-Channel Attacks in Time-Frequency Representations. CARDIS 2018. 2019, [18] Yuejun Liu, Rui Zhang, Yongbin Zhou. Predicate encryption against master-key tampering attacks. CYBERSECURITY[J]. 2019, 2(1): 1-20, http://lib.cqvip.com/Qikan/Article/Detail?id=7103850252.
[19] Zhang Qian, Zhou Yongbin, Qiu Shuang, Cheng Wei, Ming Jingdian, Zhang Rui, IEEE. A Compact AES Hardware Implementation Secure against 1st-Order Side-Channel Attacks. 2018 IEEE 36TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD)null. 2018, 545-552, [20] Qiu Shuang, Zhang Rui, Zhou Yongbin, Zhang Hailong, Qing S, Mitchell C, Chen L, Liu D. Reducing Randomness Complexity of Mask Refreshing Algorithm. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017null. 2018, 10631: 88-101, [21] Zhang, Hailong, Zhou, Yongbin. On the exact relationship between the Mutual Information Metric and the Success Rate Metric. INFORMATION SCIENCES[J]. 2018, 435: 15-25, http://dx.doi.org/10.1016/j.ins.2017.12.053.
[22] Gao Yiwen, Zhang Hailong, Cheng Wei, Zhou Yongbin, Cao Yuchen, IEEE. Electro-Magnetic Analysis of GPU-based AES Implementation. 2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC)null. 2018, http://dx.doi.org/10.1145/3195970.3196042.
[23] Zhang, Hailong, Zhou, Yongbin. Multiple leakage samples based higher order optimal distinguisher. INFORMATION SCIENCES[J]. 2018, 466: 92-108, http://dx.doi.org/10.1016/j.ins.2018.07.042.
[24] Gao Yiwen, Cheng Wei, Zhang Hailong, Zhou Yongbin, IEEE. Cache-Collision Attacks on GPU-based AES Implementation with Electro-Magnetic Leakages. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE)null. 2018, 300-306, [25] Fan Guangjun, Zhou Yongbin, Zhang Hailong, Feng Dengguo. The Cognition Is Not Enough: Another Look on Existing Interesting Points Chosen Methods. CHINESE JOURNAL OF ELECTRONICS[J]. 2017, 26(2): 416-423, https://www.webofscience.com/wos/woscc/full-record/WOS:000397351700029.
[26] Yang, Wei, Zhou, Yongbin, Cao, Yuchen, Zhang, Hailong, Zhang, Qian, Wang, Huan. Multi-Channel Fusion Attacks. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2017, 12(8): 1757-1771, https://www.webofscience.com/wos/woscc/full-record/WOS:000401340500001.
[27] Zhang, Hailong, Zhou, Yongbin. Mahalanobis Distance Similarity Measure Based Higher Order Optimal Distinguisher. COMPUTER JOURNAL[J]. 2017, 60(8): 1131-1144, https://www.webofscience.com/wos/woscc/full-record/WOS:000407592100002.
[28] Zhang, Rui, Qiu, Shuang, Zhou, Yongbin. Further Improving Efficiency of Higher Order Masking Schemes by Decreasing Randomness Complexity. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2017, 12(11): 2590-2598, https://www.webofscience.com/wos/woscc/full-record/WOS:000406290600007.
[29] Cheng Wei, Zhou Yongbin, Sauvage Laurent, Lam KY, Chi CH, Qing S. Differential Fault Analysis on Midori. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016null. 2016, 9977: 307-317, [30] Hu, Chengyu, Yang, Rupeng, Liu, Pengtao, Yu, Zuoxia, Zhou, Yongbin, Xu, Qiuliang. Public-key encryption with keyword search secure against continual memory attacks. SECURITY AND COMMUNICATION NETWORKS[J]. 2016, 9(11): 1613-1629, https://www.webofscience.com/wos/woscc/full-record/WOS:000379053800027.
[31] Yang, Wei, Cao, Yuchen, Zhou, Yongbin, Zhang, Hailong, Zhang, Qian. Distance Based Leakage Alignment for Side Channel Attacks. IEEE SIGNAL PROCESSING LETTERS[J]. 2016, 23(4): 419-423, https://www.webofscience.com/wos/woscc/full-record/WOS:000393311700001.
[32] Fan, Guangjun, Zhou, Yongbin, Zhang, Hailong, Feng, Dengguo. Towards optimal leakage exploitation rate in template attacks. SECURITY AND COMMUNICATION NETWORKS[J]. 2016, 9(16): 3116-3126, https://www.webofscience.com/wos/woscc/full-record/WOS:000389250100007.
[33] Cao Yuchen, Zhou Yongbin, Zhang Hailong, Yang Wei, IEEE. Hilbert Transform based Vertical Preprocessing for Side-Channel Analysis. 2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN)null. 2016, [34] Zhang, Hailong, Zhou, Yongbin, Feng, Dengguo. Theoretical and practical aspects of multiple samples correlation power analysis. SECURITY AND COMMUNICATION NETWORKS[J]. 2016, 9(18): 5166-5177, [35] Zhang, Hailong, Zhou, Yongbin. How many interesting points should be used in a template attack?. JOURNAL OF SYSTEMS AND SOFTWARE[J]. 2016, 120: 105-113, http://dx.doi.org/10.1016/j.jss.2016.07.028.
[36] Zhang, Hailong, Zhou, Yongbin, Feng, Dengguo. Mahalanobis distance similarity measure based distinguisher for template attack. SECURITY AND COMMUNICATION NETWORKS[J]. 2015, 8(5): 769-777, https://www.webofscience.com/wos/woscc/full-record/WOS:000350273000006.
[37] Zheng Chao, Zhou Yongbin, Zheng Yingxian, IEEE. A Fast Implementation of MPC-KSA Side-Channel Distinguisher. 24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015null. 2015, [38] Zheng Yingxian, Zhou Yongbin, Yu Zhenmei, Hu Chengyu, Zhang Hailong, Hui LCK, Qing SH, Shi E, Yiu SM. How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice?. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014null. 2015, 8958: 200-214, [39] Zhou Yongbin. Higher-Order Masking Schemes for Simon. ICICS 2015. 2015, [40] Yang Rupeng, Xu Qiuliang, Zhou Yongbin, Zhang Rui, Hu Chengyu, Yu Zuoxia, Pernul G, Ryan PYA, Weippl E. Updatable Hash Proof System and Its Applications. COMPUTER SECURITY - ESORICS 2015, PT Inull. 2015, 9326: 266-285, [41] Chen, Danyang, Zhou, Yongbin, Han, Yang, Xue, Rui, He, Qing. On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives. INFORMATION SCIENCES[J]. 2014, 271: 213-223, http://dx.doi.org/10.1016/j.ins.2014.02.149.
[42] Zhou Yongbin. Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers. ISPEC 2013. 2013, [43] Zhou Yongbin. EMD-Based Denoising for Side-Channel Attacks and Relationships between the Noises Extracted with Different Denoising Methods. ICICS 2013. 2013, [44] Zhang Hailong, Zhou Yongbin, Feng Dengguo. An efficient leakage characterization method for profiled power analysis attacks. LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS)null. 2012, 61-73, http://ir.iscas.ac.cn/handle/311060/15760.
[45] Liu Jiye, Zhou Yongbin, Yang Shuguo, Feng Dengguo. Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation. CHINESE JOURNAL OF ELECTRONICS[J]. 2012, 21(3): 547-553, http://lib.cqvip.com/Qikan/Article/Detail?id=44611578.
[46] Yang Shuguo, Zhou Yongbin, Liu Jiye, Chen Danyang. Back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations. LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS)null. 2012, 169-185, http://ir.iscas.ac.cn/handle/311060/15743.

科研活动

   
科研项目
( 1 ) 弹性泄漏基础密码方案的构造与分析, 负责人, 国家任务, 2013-01--2016-12
( 2 ) 面向高安全等级密码芯片的侧信道分析方法与测评技术研究, 负责人, 国家任务, 2015-01--2018-12
( 3 ) 密码系统的信息泄露分析方法与防护机制研究, 负责人, 国家任务, 2017-01--2021-12
( 4 ) 高性能密码服务关键技术及系统, 负责人, 国家任务, 2017-07--2020-12
( 5 ) 侧信道分析方法研究, 负责人, 其他任务, 2019-01--2019-12
( 6 ) 第四批国家“万人计划”科技创新领军人才, 负责人, 国家任务, 2019-07--2022-06
( 7 ) 融合信息泄漏的新型密码分析方法研究, 负责人, 国家任务, 2020-01--2023-12
( 8 ) XXX应用研究, 负责人, 其他任务, 2017-01--2020-12
( 9 ) XXX签名方案设计与分析, 负责人, 其他任务, 2017-01--2020-12
( 10 ) 密码芯片信息泄漏深度分析与可靠防护关键技术, 负责人, 国家任务, 2022-12--2025-11
( 11 ) XXX零信任安全防护防护关键技术, 负责人, 国家任务, 2023-01--2025-12

指导学生

已指导学生

陈海宁  硕士研究生  081220-信息安全  

黄金刚  硕士研究生  081220-信息安全  

李建堂  硕士研究生  081220-信息安全  

王娜  硕士研究生  081220-信息安全  

曹雨晨  硕士研究生  081220-信息安全  

赵辉  硕士研究生  081220-信息安全  

韩阳  硕士研究生  081220-信息安全  

杨树果  硕士研究生  081220-信息安全  

冯明亮  硕士研究生  081220-信息安全  

孟林  硕士研究生  085211-计算机技术  

张海龙  博士研究生  081220-信息安全  

郑英显  硕士研究生  081220-信息安全  

唐杰辉  硕士研究生  0812Z1-信息安全  

郑超  硕士研究生  085211-计算机技术  

曹雨晨  博士研究生  0812Z1-信息安全  

高宜文  博士研究生  0812Z1-信息安全  

成玮  硕士研究生  085211-计算机技术  

刘月君  博士研究生  083900-网络空间安全  

杨光  硕士研究生  083900-网络空间安全  

高飞  硕士研究生  085211-计算机技术  

孙硕  博士研究生  083900-网络空间安全  

王金伟  硕士研究生  083900-网络空间安全  

冯祺  硕士研究生  081203-计算机应用技术  

郗志红  硕士研究生  085212-软件工程  

于达  硕士研究生  085211-计算机技术  

余笑岩  硕士研究生  085400-电子信息  

现指导学生

姜子铭  博士研究生  083900-网络空间安全  

石瑞鑫  博士研究生  083900-网络空间安全  

张倩  博士研究生  083900-网络空间安全  

乔泽华  博士研究生  083900-网络空间安全  

金诚斌  博士研究生  083900-网络空间安全  

王鹏举  博士研究生  083900-网络空间安全  

周沁仪  硕士研究生  085211-计算机技术  

方磊磊  硕士研究生  083900-网络空间安全  

赵竟霖  硕士研究生  083900-网络空间安全  

邵明尧  博士研究生  083900-网络空间安全  

邱心宽  博士研究生  083900-网络空间安全