Follow
Yang LI
Yang LI
Nanjing University of Aeronautics and Astronautics
Verified email at uec.ac.jp - Homepage
Title
Cited by
Cited by
Year
Fault sensitivity analysis
Y Li, K Sakiyama, S Gomisawa, T Fukunaga, J Takahashi, K Ohta
Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International …, 2010
2892010
Information-theoretic approach to optimal differential fault analysis
K Sakiyama, Y Li, M Iwamoto, K Ohta
IEEE Transactions on Information Forensics and Security 7 (1), 109-120, 2011
892011
On the power of fault sensitivity analysis and collision side-channel attacks in a combined setting
A Moradi, O Mischke, C Paar, Y Li, K Ohta, K Sakiyama
Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International …, 2011
882011
New fault-based side-channel attack using fault sensitivity
Y Li, K Ohta, K Sakiyama
IEEE Transactions on Information Forensics and Security 7 (1), 88-97, 2011
542011
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
C Clavier, JL Danger, G Duc, MA Elaabid, B Gérard, S Guilley, A Heuser, ...
Journal of Cryptographic Engineering 4, 259-274, 2014
462014
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl
Y Sasaki, Y Li, L Wang, K Sakiyama, K Ohta
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010
452010
An information theoretic perspective on the differential fault analysis against aes
Y Li, S Gomisawa, K Sakiyama, K Ohta
Cryptology ePrint Archive, 2010
272010
Revisit fault sensitivity analysis on WDDL-AES
Y Li, K Ohta, K Sakiyama
2011 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2011
202011
Yet another fault-based leakage in non-uniform faulty ciphertexts
Y Li, Y Hayashi, A Matsubara, N Homma, T Aoki, K Ohta, K Sakiyama
Foundations and Practice of Security: 6th International Symposium, FPS 2013 …, 2014
192014
Power Variance Analysis breaks a masked ASIC implementation of AES
Y Li, K Sakiyama, L Batina, D Nakatsu, K Ohta
2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010 …, 2010
162010
Toward Effective Countermeasures against an Improved Fault Sensitivity Analysis
LI Yang, K SAKIYAMA
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2012
142012
Fault sensitivity analysis against elliptic curve cryptosystems
H Sakamoto, Y Li, K Ohta, K Sakiyama
2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 11-20, 2011
142011
Clockwise Collision Analysis--Overlooked Side-Channel Leakage Inside Your Measurements
Y Li, D Nakatsu, Q Li, K Ohta, K Sakiyama
Cryptology EPrint Archive, 2011
142011
Exploring the relations between fault sensitivity and power consumption
Y Li, S Endo, N Debande, N Homma, T Aoki, TH Le, JL Danger, K Ohta, ...
Constructive Side-Channel Analysis and Secure Design: 4th International …, 2013
112013
Key-dependent weakness of AES-based ciphers under clockwise collision distinguisher
T Nakasone, Y Li, Y Sasaki, M Iwamoto, K Ohta, K Sakiyama
Information Security and Cryptology–ICISC 2012: 15th International …, 2013
112013
An extension of fault sensitivity analysis based on clockwise collision
Y Li, K Ohta, K Sakiyama
Information Security and Cryptology: 8th International Conference, Inscrypt …, 2013
112013
Combination of SW countermeasure and CPU modification on FPGA against power analysis
D Nakatsu, Y Li, K Sakiyama, K Ohta
International Workshop on Information Security Applications, 258-272, 2010
92010
Security evaluation of a DPA-resistant S-Box based on the Fourier transform
Y Li, K Sakiyama, S Kawamura, Y Komano, K Ohta
Information and Communications Security: 11th International Conference …, 2009
92009
Fully integrated passive UHF RFID tag for hash-based mutual authentication protocol
S Mikami, D Watanabe, Y Li, K Sakiyama
The Scientific World Journal 2015, 2015
82015
Intentional electromagnetic interference for fault analysis on AES block cipher IC
Y Hayashi, S Gomisawa, Y Li, N Homma, K Sakiyama, T Aoki, K Ohta
2011 8th Workshop on Electromagnetic Compatibility of Integrated Circuits …, 2011
82011
The system can't perform the operation now. Try again later.
Articles 1–20