基本信息
周永彬  男  博导  其他
电子邮件: zhouyongbin@njust.edu.cn
通信地址: 南京市玄武区孝陵卫街200号
邮政编码: 210094

研究领域

1. 密码学与密码工程学
2. 网络与系统安全
3. 云计算安全


招生信息

   
招生专业
083900-网络空间安全
招生方向
密码学与密码工程
网络与系统安全
云计算安全

教育背景

2000-09--2004-02 中国科学院软件研究所 工学博士学位
1997-09--2000-06 山东大学计算机科学系 工学硕士学位
学历
中国科学院软件研究所 -- 研究生
学位
中国科学院软件研究所 -- 博士
出国学习工作
2008-2009: Visiting Reseach at CERIAS (http://www.cerias.purdue.edu) and at Department of Computer Science(http://www.cs.purdue.edu),  Purude University, West Lafayette
 

教授课程

侧信道密码分析学、 现代密码学导引

专利与奖励

   
奖励信息
(1) 密码科技进步奖,三等奖,部委级,2013
(2) 国家科学技术进步奖,二等奖,国家级,2011
(3) 密码科技进步奖,一等奖,部委级,2006
专利成果
[1] 周永彬, 王提, 马晖, 张锐. 一种云计算环境下的安全可控高效的数据共享方法及系统. CN: CN109831430A, 2019-05-31.

[2] 周永彬, 明经典, 张倩, 李慧中. 一种针对AES算法线性部分的高效掩码防护方法. CN: CN109617667A, 2019-04-12.

[3] 张锐, 张倩, 周永彬, 邱爽. 一种AES算法的快速安全硬件结构. CN: CN107070630A, 2017-08-18.

[4] 张锐, 张倩, 周永彬, 丁天. 一种DES加解密密钥生成器及密钥生成方法. CN: CN106877999A, 2017-06-20.

[5] 周永彬, 高旭, 张倩. 一种侧信道分析评估基准板. CN: CN204697071U, 2015-10-07.

[6] 周永彬, 张倩, 高旭. 一种可传输多种算法参数的数据传输方法. CN: CN104836639A, 2015-08-12.

[7] 周永彬, 郑超, 郑英显, 高旭, 李大为, 罗鹏. 一种密码实现侧信道安全性快速检测方法. CN: CN104717054A, 2015-06-17.

出版信息

   
发表论文
[1] Jin, Chengbin, Zhou, Yongbin, Qiu, Xinkuan, Feng, Qi, Zhang, Qian. Breaking real-world COTS USIM cards with unknown side-channel countermeasures. COMPUTERS & SECURITY[J]. 2022, 113: http://dx.doi.org/10.1016/j.cose.2021.102531.
[2] Huizhong Li, Jingdian Ming, Yongbin Zhou. Assessment of Addition-Chain-Based Masked S-Box Using Deep-Learning-Based Side-Channel Attacks. Security and Communication Networks[J]. 2022, [3] Jingdian Ming, Huizhong Li, Yongbin Zhou, Wei Cheng, Zehua Qiao. Revealing the Weakness of Addition Chain Based Masked SBox Implementations. Transactions on Cryptographic Hardware and Embedded Systems[J]. 2021, https://doaj.org/article/ccc1f50203d34f878208fb534a4fe11b.
[4] Wang, Jinwei, Li, Yong, Chen, Xi, Zhou, Yongbin, Shen, W, Barthes, JP, Luo, J, Shi, Y, Zhang, J. Modeling Password Guessability via Variational Auto-Encoder. PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD)[J]. 2021, 348-353, [5] Ruixin Shi, Yongbin Zhou, Yong Li, Weili Han. Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study. SECURITY AND COMMUNICATION NETWORKS[J]. 2021, 2021: http://dx.doi.org/10.1155/2021/5563884.
[6] Gao, Yiwen, Zhou, Yongbin. Side-Channel Attacks With Multi-Thread Mixed Leakage. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2021, 16: 770-785, https://www.webofscience.com/wos/woscc/full-record/WOS:000576264500006.
[7] Huizhong Li, Guang Yang, Jingdian Ming, Yongbin Zhou, Chengbin Jin. Transparency order versus confusion coefficient: a case study of NIST lightweight cryptography S-Boxes. Cybersecurity[J]. 2021, 4(1): 1-20, [8] Li, Huizhong, Zhou, Yongbin, Ming, Jingdian, Yang, Guang, Jin, Chengbin. The Notion of Transparency Order, Revisited. COMPUTER JOURNAL[J]. 2020, 63(12): 1915-1938, https://www.webofscience.com/wos/woscc/full-record/WOS:000606839100010.
[9] Zhou Yongbin. Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack. The 16th International Conference on Information Security and Cryptology (Inscrypt 2020). 2020, [10] Yang, Guang, Li, Huizhong, Ming, Jingdian, Zhou, Yongbin, Zhou, J, Luo, X, Shen, Q, Xu, Z. CDAE: Towards Empowering Denoising in Side-Channel Analysis. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019)null. 2020, 11999: 269-286, [11] Ming, Jingdian, Zhou, Yongbin, Cheng, Wei, Li, Huizhong, Yang, Guang, Zhang, Qian. Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2020, 15: 3694-3708, https://www.webofscience.com/wos/woscc/full-record/WOS:000548753800003.
[12] Zhou Yongbin. Convolutional Neural Network Based Side-Channel Attacks in Time-Frequency Representations. CARDIS 2018. 2019, [13] Liu, Yuejun, Zhang, Rui, Zhou, Yongbin. Predicate encryption against master-key tampering attacks. CYBERSECURITY[J]. 2019, 2(1): 1-20, http://dx.doi.org/10.1186/s42400-019-0039-6.
[14] Qiu Shuang, Zhang Rui, Zhou Yongbin, Zhang Hailong, Qing S, Mitchell C, Chen L, Liu D. Reducing Randomness Complexity of Mask Refreshing Algorithm. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017null. 2018, 10631: 88-101, [15] Zhang Qian, Zhou Yongbin, Qiu Shuang, Cheng Wei, Ming Jingdian, Zhang Rui, IEEE. A Compact AES Hardware Implementation Secure against 1st-Order Side-Channel Attacks. 2018 IEEE 36TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD)null. 2018, 545-552, [16] Zhang, Hailong, Zhou, Yongbin. On the exact relationship between the Mutual Information Metric and the Success Rate Metric. INFORMATION SCIENCES[J]. 2018, 435: 15-25, http://dx.doi.org/10.1016/j.ins.2017.12.053.
[17] Gao Yiwen, Zhang Hailong, Cheng Wei, Zhou Yongbin, Cao Yuchen, IEEE. Electro-Magnetic Analysis of GPU-based AES Implementation. 2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC)null. 2018, http://dx.doi.org/10.1145/3195970.3196042.
[18] Zhang, Hailong, Zhou, Yongbin. Multiple leakage samples based higher order optimal distinguisher. INFORMATION SCIENCES[J]. 2018, 466: 92-108, http://dx.doi.org/10.1016/j.ins.2018.07.042.
[19] Gao Yiwen, Cheng Wei, Zhang Hailong, Zhou Yongbin, IEEE. Cache-Collision Attacks on GPU-based AES Implementation with Electro-Magnetic Leakages. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE)null. 2018, 300-306, [20] Fan Guangjun, Zhou Yongbin, Zhang Hailong, Feng Dengguo. The Cognition Is Not Enough: Another Look on Existing Interesting Points Chosen Methods. CHINESE JOURNAL OF ELECTRONICS[J]. 2017, 26(2): 416-423, https://www.webofscience.com/wos/woscc/full-record/WOS:000397351700029.
[21] Zhang, Hailong, Zhou, Yongbin. Mahalanobis Distance Similarity Measure Based Higher Order Optimal Distinguisher. COMPUTER JOURNAL[J]. 2017, 60(8): 1131-1144, https://www.webofscience.com/wos/woscc/full-record/WOS:000407592100002.
[22] Yang, Wei, Zhou, Yongbin, Cao, Yuchen, Zhang, Hailong, Zhang, Qian, Wang, Huan. Multi-Channel Fusion Attacks. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2017, 12(8): 1757-1771, https://www.webofscience.com/wos/woscc/full-record/WOS:000401340500001.
[23] Zhang, Rui, Qiu, Shuang, Zhou, Yongbin. Further Improving Efficiency of Higher Order Masking Schemes by Decreasing Randomness Complexity. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2017, 12(11): 2590-2598, https://www.webofscience.com/wos/woscc/full-record/WOS:000406290600007.
[24] Zhang, Hailong, Zhou, Yongbin. How many interesting points should be used in a template attack?. JOURNAL OF SYSTEMS AND SOFTWARE[J]. 2016, 120: 105-113, http://dx.doi.org/10.1016/j.jss.2016.07.028.
[25] Hu, Chengyu, Yang, Rupeng, Liu, Pengtao, Yu, Zuoxia, Zhou, Yongbin, Xu, Qiuliang. Public-key encryption with keyword search secure against continual memory attacks. SECURITY AND COMMUNICATION NETWORKS[J]. 2016, 9(11): 1613-1629, https://www.webofscience.com/wos/woscc/full-record/WOS:000379053800027.
[26] Cheng Wei, Zhou Yongbin, Sauvage Laurent, Lam KY, Chi CH, Qing S. Differential Fault Analysis on Midori. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016null. 2016, 9977: 307-317, [27] Yang, Wei, Cao, Yuchen, Zhou, Yongbin, Zhang, Hailong, Zhang, Qian. Distance Based Leakage Alignment for Side Channel Attacks. IEEE SIGNAL PROCESSING LETTERS[J]. 2016, 23(4): 419-423, https://www.webofscience.com/wos/woscc/full-record/WOS:000393311700001.
[28] Fan, Guangjun, Zhou, Yongbin, Zhang, Hailong, Feng, Dengguo. Towards optimal leakage exploitation rate in template attacks. SECURITY AND COMMUNICATION NETWORKS[J]. 2016, 9(16): 3116-3126, https://www.webofscience.com/wos/woscc/full-record/WOS:000389250100007.
[29] Cao Yuchen, Zhou Yongbin, Zhang Hailong, Yang Wei, IEEE. Hilbert Transform based Vertical Preprocessing for Side-Channel Analysis. 2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN)null. 2016, [30] Zhang, Hailong, Zhou, Yongbin, Feng, Dengguo. Theoretical and practical aspects of multiple samples correlation power analysis. SECURITY AND COMMUNICATION NETWORKS[J]. 2016, 9(18): 5166-5177, [31] Zhang, Hailong, Zhou, Yongbin, Feng, Dengguo. Mahalanobis distance similarity measure based distinguisher for template attack. SECURITY AND COMMUNICATION NETWORKS[J]. 2015, 8(5): 769-777, https://www.webofscience.com/wos/woscc/full-record/WOS:000350273000006.
[32] Zheng Chao, Zhou Yongbin, Zheng Yingxian, IEEE. A Fast Implementation of MPC-KSA Side-Channel Distinguisher. 24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015null. 2015, [33] Zheng Yingxian, Zhou Yongbin, Yu Zhenmei, Hu Chengyu, Zhang Hailong, Hui LCK, Qing SH, Shi E, Yiu SM. How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice?. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014null. 2015, 8958: 200-214, [34] Zhou Yongbin. Higher-Order Masking Schemes for Simon. ICICS 2015. 2015, [35] Yang Rupeng, Xu Qiuliang, Zhou Yongbin, Zhang Rui, Hu Chengyu, Yu Zuoxia, Pernul G, Ryan PYA, Weippl E. Updatable Hash Proof System and Its Applications. COMPUTER SECURITY - ESORICS 2015, PT Inull. 2015, 9326: 266-285, [36] Chen, Danyang, Zhou, Yongbin, Han, Yang, Xue, Rui, He, Qing. On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives. INFORMATION SCIENCES[J]. 2014, 271: 213-223, http://dx.doi.org/10.1016/j.ins.2014.02.149.
[37] Zhou Yongbin. Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers. ISPEC 2013. 2013, [38] Zhou Yongbin. EMD-Based Denoising for Side-Channel Attacks and Relationships between the Noises Extracted with Different Denoising Methods. ICICS 2013. 2013, [39] Zhang Hailong, Zhou Yongbin, Feng Dengguo. An efficient leakage characterization method for profiled power analysis attacks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)null. 2012, 61-73, http://ir.iscas.ac.cn/handle/311060/15760.
[40] Liu Jiye, Zhou Yongbin, Yang Shuguo, Feng Dengguo. Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation. CHINESE JOURNAL OF ELECTRONICS[J]. 2012, 21(3): 547-553, http://lib.cqvip.com/Qikan/Article/Detail?id=44611578.
[41] Yang Shuguo, Zhou Yongbin, Liu Jiye, Chen Danyang. Back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)null. 2012, 169-185, http://ir.iscas.ac.cn/handle/311060/15743.

科研活动

   
科研项目
(1) 面向高安全等级密码芯片的侧信道分析方法与测评技术研究,主持,国家级,2015-01--2018-12
(2) 弹性泄漏基础密码方案的构造与分析,主持,国家级,2013-01--2016-12

指导学生

已指导学生

陈海宁  硕士研究生  081220-信息安全  

黄金刚  硕士研究生  081220-信息安全  

李建堂  硕士研究生  081220-信息安全  

王娜  硕士研究生  081220-信息安全  

韩阳  硕士研究生  081220-信息安全  

杨树果  硕士研究生  081220-信息安全  

曹雨晨  硕士研究生  081220-信息安全  

赵辉  硕士研究生  081220-信息安全  

张海龙  博士研究生  081220-信息安全  

冯明亮  硕士研究生  081220-信息安全  

孟林  硕士研究生  085211-计算机技术  

现指导学生

郑英显  硕士研究生  081220-信息安全  

郑超  硕士研究生  085211-计算机技术  

唐杰辉  硕士研究生  0812Z1-信息安全  

杨威  博士研究生  0812Z1-信息安全  

成玮  硕士研究生  085211-计算机技术  

刘月君  硕士研究生  0812Z1-信息安全  

曹雨晨  博士研究生  0812Z1-信息安全  

高宜文  博士研究生  0812Z1-信息安全