What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yongbin Zhou
Google Scholar
28
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/acisp
Breaking the Shield: Novel Fault Attacks on CRYSTALS-Dilithium.
Dixiao Du
Yuejun Liu
Yiwen Gao
Jingdian Ming
Hao Yuan
Yongbin Zhou
2025
conf/ndss
GAP-Diff: Protecting JPEG-Compressed Images from Diffusion-based Facial Customization.
Haotian Zhu
Shuchao Pang
Zhigang Lu
Yongbin Zhou
Minhui Xue
2025
conf/esorics
Enhanced Key Mismatch Attacks on Lattice-Based KEMs: Multi-bit Inference and Ciphertext Generalization.
Yan Shao
Yuejun Liu
Yongbin Zhou
Mingyao Shao
2025
conf/icics
A Versatile Decentralized Attribute Based Signature Scheme for IoT.
Dazhi Xu
Yuejun Liu
Jiabei Wang
Yiwen Gao
Yongbin Zhou
2024
journals/tifs
What Is Now Possible? Security Evaluation on Univariate DPA Attacks With Inaccurate Leakage Models.
Jiangshan Long
Changhai Ou
Chenxu Wang
Zhu Wang
Yongbin Zhou
2024
conf/uss
dp-promise: Differentially Private Diffusion Probabilistic Models for Image Synthesis.
Haichen Wang
Shuchao Pang
Zhigang Lu
Yihang Rao
Yongbin Zhou
Minhui Xue
2024
conf/asiaccs
Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond.
Mingyao Shao
Yuejun Liu
Yongbin Zhou
2023
journals/tifs
Practical Public Template Attack Attacks on CRYSTALS-Dilithium With Randomness Leakages.
Zehua Qiao
Yuejun Liu
Yongbin Zhou
Jingdian Ming
Chengbin Jin
Huizhong Li
2022
journals/compsec
Breaking real-world COTS USIM cards with unknown side-channel countermeasures.
Chengbin Jin
Yongbin Zhou
Xinkuan Qiu
Qi Feng
Qian Zhang
2022
journals/tifs
Optimizing Higher-Order Correlation Analysis Against Inner Product Masking Scheme.
Jingdian Ming
Yongbin Zhou
Wei Cheng
Huizhong Li
2022
conf/icics
Fast Fourier Orthogonalization over NTRU Lattices.
Shuo Sun
Yongbin Zhou
Rui Zhang
Yang Tao
Zehua Qiao
Jingdian Ming
2021
journals/tches
Revealing the Weakness of Addition Chain Based Masked SBox Implementations.
Jingdian Ming
Huizhong Li
Yongbin Zhou
Wei Cheng
Zehua Qiao
2021
journals/tifs
Side-Channel Attacks With Multi-Thread Mixed Leakage.
Yiwen Gao
Yongbin Zhou
2021
journals/tifs
On the Security of Lattice-Based Fiat-Shamir Signatures in the Presence of Randomness Leakage.
Yuejun Liu
Yongbin Zhou
Shuo Sun
Tianyu Wang
Rui Zhang
Jingdian Ming
2020
journals/tifs
Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes.
Jingdian Ming
Yongbin Zhou
Wei Cheng
Huizhong Li
Guang Yang
Qian Zhang
2019
conf/icics
CDAE: Towards Empowering Denoising in Side-Channel Analysis.
Guang Yang
Huizhong Li
Jingdian Ming
Yongbin Zhou
2017
journals/tifs
Multi-Channel Fusion Attacks.
Wei Yang
Yongbin Zhou
Yuchen Cao
Hailong Zhang
Qian Zhang
Huan Wang
2017
journals/tifs
Further Improving Efficiency of Higher Order Masking Schemes by Decreasing Randomness Complexity.
Rui Zhang
Shuang Qiu
Yongbin Zhou
2017
conf/icics
Reducing Randomness Complexity of Mask Refreshing Algorithm.
Shuang Qiu
Rui Zhang
Yongbin Zhou
Hailong Zhang
2016
conf/icics
Differential Fault Analysis on Midori.
Wei Cheng
Yongbin Zhou
Laurent Sauvage
2015
conf/esorics
Updatable Hash Proof System and Its Applications.
Rupeng Yang
Qiuliang Xu
Yongbin Zhou
Rui Zhang
Chengyu Hu
Zuoxia Yu
2015
conf/icics
Higher-Order Masking Schemes for Simon.
Jiehui Tang
Yongbin Zhou
Hailong Zhang
Shuang Qiu
2014
conf/icics
How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice?
Yingxian Zheng
Yongbin Zhou
Zhenmei Yu
Chengyu Hu
Hailong Zhang
2013
conf/icics
EMD-Based Denoising for Side-Channel Attacks and Relationships between the Noises Extracted with Different Denoising Methods.
Mingliang Feng
Yongbin Zhou
Zhenmei Yu
2011
conf/icisc
Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations.
Shuguo Yang
Yongbin Zhou
Jiye Liu
Danyang Chen
2011
conf/icisc
An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks.
Hailong Zhang
Yongbin Zhou
Dengguo Feng
2010
conf/ccs
Controlling data disclosure in computational PIR protocols.
Ning Shang
Gabriel Ghinita
Yongbin Zhou
Elisa Bertino
2005
conf/icics
Efficient ID-Based Optimistic Fair Exchange with Provable Security.
Zhenfeng Zhang
Dengguo Feng
Jing Xu
Yongbin Zhou
Coauthors
Changhai Ou
(1)
Chengbin Jin
(2)
Chengyu Hu
(2)
Chenxu Wang
(1)
Danyang Chen
(1)
Dazhi Xu
(1)
Dengguo Feng
(2)
Dixiao Du
(1)
Elisa Bertino
(1)
Gabriel Ghinita
(1)
Guang Yang
(2)
Haichen Wang
(1)
Hailong Zhang
(5)
Hao Yuan
(1)
Haotian Zhu
(1)
Huan Wang
(1)
Huizhong Li
(5)
Jiabei Wang
(1)
Jiangshan Long
(1)
Jiehui Tang
(1)
Jing Xu
(1)
Jingdian Ming
(8)
Jiye Liu
(1)
Laurent Sauvage
(1)
Mingliang Feng
(1)
Mingyao Shao
(2)
Minhui Xue
(2)
Ning Shang
(1)
Qi Feng
(1)
Qian Zhang
(3)
Qiuliang Xu
(1)
Rui Zhang
(5)
Rupeng Yang
(1)
Shuang Qiu
(3)
Shuchao Pang
(2)
Shuguo Yang
(1)
Shuo Sun
(2)
Tianyu Wang
(1)
Wei Cheng
(4)
Wei Yang
(1)
Xinkuan Qiu
(1)
Yan Shao
(1)
Yang Tao
(1)
Yihang Rao
(1)
Yingxian Zheng
(1)
Yiwen Gao
(3)
Yongbin Zhou
(28)
Yuchen Cao
(1)
Yuejun Liu
(6)
Zehua Qiao
(3)
Zhenfeng Zhang
(1)
Zhenmei Yu
(2)
Zhigang Lu
(2)
Zhu Wang
(1)
Zuoxia Yu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to