Yang LI
Yang LI
Nanjing University of Aeronautics and Astronautics
Dirección de correo verificada de uec.ac.jp - Página principal
Título
Citado por
Citado por
Año
Fault sensitivity analysis
Y Li, K Sakiyama, S Gomisawa, T Fukunaga, J Takahashi, K Ohta
International Workshop on Cryptographic Hardware and Embedded Systems, 320-334, 2010
1912010
On the power of fault sensitivity analysis and collision side-channel attacks in a combined setting
A Moradi, O Mischke, C Paar, Y Li, K Ohta, K Sakiyama
International Workshop on Cryptographic Hardware and Embedded Systems, 292-311, 2011
672011
Information-theoretic approach to optimal differential fault analysis
K Sakiyama, Y Li, M Iwamoto, K Ohta
IEEE Transactions on Information Forensics and Security 7 (1), 109-120, 2011
612011
New fault-based side-channel attack using fault sensitivity
Y Li, K Ohta, K Sakiyama
IEEE Transactions on Information Forensics and Security 7 (1), 88-97, 2011
412011
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl
Y Sasaki, Y Li, L Wang, K Sakiyama, K Ohta
International Conference on the Theory and Application of Cryptology and …, 2010
362010
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
C Clavier, JL Danger, G Duc, MA Elaabid, B Gérard, S Guilley, A Heuser, ...
Journal of Cryptographic Engineering 4 (4), 259-274, 2014
262014
An Information Theoretic Perspective on the Differential Fault Analysis against AES.
Y Li, S Gomisawa, K Sakiyama, K Ohta
IACR Cryptol. ePrint Arch. 2010, 32, 2010
192010
Yet another fault-based leakage in non-uniform faulty ciphertexts
Y Li, YI Hayashi, A Matsubara, N Homma, T Aoki, K Ohta, K Sakiyama
International Symposium on Foundations and Practice of Security, 272-287, 2013
162013
Revisit fault sensitivity analysis on WDDL-AES
Y Li, K Ohta, K Sakiyama
2011 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2011
162011
Power Variance Analysis breaks a masked ASIC implementation of AES
Y Li, K Sakiyama, L Batina, D Nakatsu, K Ohta
2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010 …, 2010
152010
Clockwise Collision Analysis-Overlooked Side-Channel Leakage Inside Your Measurements.
Y Li, D Nakatsu, Q Li, K Ohta, K Sakiyama
IACR Cryptol. ePrint Arch. 2011, 579, 2011
132011
Toward Effective Countermeasures against an Improved Fault Sensitivity Analysis
LI Yang, K SAKIYAMA
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2012
102012
An extension of fault sensitivity analysis based on clockwise collision
Y Li, K Ohta, K Sakiyama
International Conference on Information Security and Cryptology, 46-59, 2012
92012
Fault sensitivity analysis against elliptic curve cryptosystems
H Sakamoto, Y Li, K Ohta, K Sakiyama
2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 11-20, 2011
92011
Intentional electromagnetic interference for fault analysis on AES block cipher IC
Y Hayashi, S Gomisawa, Y Li, N Homma, K Sakiyama, T Aoki, K Ohta
2011 8th Workshop on Electromagnetic Compatibility of Integrated Circuits …, 2011
82011
Security evaluation of a DPA-resistant S-Box based on the Fourier transform
Y Li, K Sakiyama, S Kawamura, Y Komano, K Ohta
International Conference on Information and Communications Security, 3-16, 2009
82009
Key-dependent weakness of AES-based ciphers under clockwise collision distinguisher
T Nakasone, Y Li, Y Sasaki, M Iwamoto, K Ohta, K Sakiyama
International Conference on Information Security and Cryptology, 395-409, 2012
72012
Exploring the relations between fault sensitivity and power consumption
Y Li, S Endo, N Debande, N Homma, T Aoki, TH Le, JL Danger, K Ohta, ...
International Workshop on Constructive Side-Channel Analysis and Secure …, 2013
52013
Combination of SW countermeasure and CPU modification on FPGA against power analysis
D Nakatsu, Y Li, K Sakiyama, K Ohta
International Workshop on Information Security Applications, 258-272, 2010
52010
A new type of fault-based attack: fault behavior analysis
Y Li, K Ohta, K Sakiyama
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013
42013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20