default search action
Hailong Zhang 0001
Person information
- affiliation: CAS, Institute of Information Engineering, Beijing, China
- unicode name: 张海龙
Other persons with the same name
- Hailong Zhang — disambiguation page
- Hailong Zhang 0002 — Chinese Academy of Sciences, Xinjiang Astronomical Observatory, Urumqi, China
- Hailong Zhang 0003 — Huazhong University of Science and Technology, Wuhan, China
- Hailong Zhang 0004 — Xuji Group Corporation, State Grid Corporation of China, Xuchang, China
- Hailong Zhang 0005 — Wuhan University, China
- Hailong Zhang 0006 — Fordham University, Department of Computer and Information Science, New York, NY, USA (and 1 more)
- Hailong Zhang 0007 — CAS, Institute of Remote Sensing and Digital Earth, Beijing, China
- Hailong Zhang 0008 — Communication University of China, Beijing, China
- Hailong Zhang 0009 — PLA University of Science and Technology, Nanjing, China
- Hailong Zhang 0010 — Northeastern University, Shenyang, China
- Hailong Zhang 0011 — China Electric Power Research Institute, Beijing, China (and 1 more)
- Hailong Zhang 0012 — Nanjing University of Information Science and Technology, Nanjing, China
- Hailong Zhang 0013 — National Unviersity of Defense Technology, Changsha, China
- Hailong Zhang 0014 — Nanjing Normal University, School of Electric and Automation Engineering, Nanjing, China
- Hailong Zhang 0015 — Qingdao University of Technology, Department of Information and Control Engineering, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Haopeng Fan, Hailong Zhang, Yongjuan Wang, Wenhao Wang, Yanbei Zhu, Haojin Zhang, Qingjun Yuan:
Screening Least Square Technique Assisted Multivariate Template Attack Against the Random Polynomial Generation of Dilithium. IEEE Trans. Inf. Forensics Secur. 19: 7118-7132 (2024) - [c24]Hailong Zhang:
Differential Cryptanalysis Against SIMECK Implementation in a Leakage Profiling Scenario. ISPEC 2024: 55-74 - 2023
- [j17]Hailong Zhang, Wei Yang:
Template Attack Assisted Linear Cryptanalysis on Outer Rounds Protected DES Implementations. Comput. J. 66(6): 1434-1451 (2023) - [j16]Song Cheng, Hailong Zhang, Xiaobo Hu, Shunxian Gao, Huizhi Liu:
Efficient Exploitation of Noise Leakage for Template Attack. IEEE Embed. Syst. Lett. 15(3): 161-164 (2023) - [c23]Yaoyi Deng, Mingxuan Li, Hailong Zhang, Dongdong Huo, Yanqiu Zhang, Shuai Yun, Yu Wang, Zhen Xu:
Building Efficient Parallel Endorsement Node on Blockchain Systems. CSCWD 2023: 941-946 - 2022
- [c22]Song Cheng, Hailong Zhang, Xiaobo Hu, Shunxian Gao, Huizhi Liu:
Variance analysis based distinguisher for template attack. CIS 2022: 381-385 - [c21]Bohan Li, Hailong Zhang, Dongdai Lin:
Higher-Order Masking Scheme for Trivium Hardware Implementation. Inscrypt 2022: 337-356 - 2021
- [j15]Hailong Zhang, Wei Yang:
Theoretical Estimation on the Success Rate of the Asymptotic Higher Order Optimal Distinguisher. Comput. J. 64(8): 1277-1292 (2021) - [j14]Yuchen Cao, Yongbin Zhou, Hailong Zhang:
Multi-channel time-frequency fusion attacks. Int. J. Inf. Comput. Secur. 16(1/2): 84-102 (2021) - [j13]Chengyu Hu, Zhen Li, Pengtao Liu, Rupeng Yang, Shanqing Guo, Hailong Zhang:
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks. Mob. Networks Appl. 26(6): 2490-2500 (2021) - [j12]Yu Zhou, Yongzhuang Wei, Hailong Zhang, Wenzheng Zhang:
On the Modified Transparency Order of n , m -Functions. Secur. Commun. Networks 2021: 6640099:1-6640099:14 (2021) - [c20]Yu Zhou, Yongzhuang Wei, Hailong Zhang, Luyang Li, Enes Pasalic, Wenling Wu:
On Characterization of Transparency Order for (n, m)-functions. Inscrypt 2021: 351-370 - [c19]Yu Zhou, Yongzhuang Wei, Hailong Zhang, Luyang Li, Enes Pasalic, Wenling Wu:
Transparency Order of (n, m)-Functions - Its Further Characterization and Applications. ISC 2021: 139-157 - 2020
- [j11]Hailong Zhang:
On the Exact Relationship Between the Success Rate of Template Attack and Different Parameters. IEEE Trans. Inf. Forensics Secur. 15: 681-694 (2020) - [c18]Wei Yang, Hailong Zhang, Yansong Gao, Anmin Fu, Songjie Wei:
Side-Channel Leakage Detection Based on Constant Parameter Channel Model. ICCD 2020: 553-560 - [c17]Wei Yang, Anmin Fu, Hailong Zhang, Chanying Huang:
Improving Efficiency of Key Enumeration Based on Side-Channel Analysis. TrustCom 2020: 54-61
2010 – 2019
- 2019
- [j10]Hailong Zhang, Yongbin Zhou:
Template attack vs. stochastic model: An empirical study on the performances of profiling attacks in real scenarios. Microprocess. Microsystems 66: 43-54 (2019) - [c16]Wei Yang, Hailong Zhang:
Side-Channel Leakage Amount Estimation Based on Communication Theory. GLOBECOM 2019: 1-6 - 2018
- [j9]Hailong Zhang, Yongbin Zhou:
On the exact relationship between the Mutual Information Metric and the Success Rate Metric. Inf. Sci. 435: 15-25 (2018) - [j8]Hailong Zhang, Yongbin Zhou:
Multiple leakage samples based higher order optimal distinguisher. Inf. Sci. 466: 92-108 (2018) - [c15]Yiwen Gao, Hailong Zhang, Wei Cheng, Yongbin Zhou, Yuchen Cao:
Electro-magnetic analysis of GPU-based AES implementation. DAC 2018: 121:1-121:6 - [c14]Yiwen Gao, Wei Cheng, Hailong Zhang, Yongbin Zhou:
Cache-Collision Attacks on GPU-Based AES Implementation with Electro-Magnetic Leakages. TrustCom/BigDataSE 2018: 300-306 - [c13]Wei Zhang, Dongdai Lin, Hailong Zhang, Xiaojun Zhou, Yiwen Gao:
A Lightweight FourQ Primitive on ARM Cortex-M0. TrustCom/BigDataSE 2018: 699-704 - [c12]Wei Zhang, Dongdai Lin, Hailong Zhang, Xiaojun Zhou, Yiwen Gao, Cong Chen:
A Lightweight Multi-precision Squaring on Embedded Processors for ECC. TrustCom/BigDataSE 2018: 1014-1019 - 2017
- [j7]Hailong Zhang, Yongbin Zhou:
Mahalanobis Distance Similarity Measure Based Higher Order Optimal Distinguisher. Comput. J. 60(8): 1131-1144 (2017) - [j6]Wei Yang, Yongbin Zhou, Yuchen Cao, Hailong Zhang, Qian Zhang, Huan Wang:
Multi-Channel Fusion Attacks. IEEE Trans. Inf. Forensics Secur. 12(8): 1757-1771 (2017) - [c11]Shuang Qiu, Rui Zhang, Yongbin Zhou, Hailong Zhang:
Reducing Randomness Complexity of Mask Refreshing Algorithm. ICICS 2017: 88-101 - [c10]Wei Zhang, Dongdai Lin, Hailong Zhang, Cong Chen, Xiaojun Zhou:
A Lightweight Anonymous Mutual Authentication with Key Agreement Protocol on ECC. TrustCom/BigDataSE/ICESS 2017: 170-176 - [i5]Wei Cheng, Chao Zheng, Yuchen Cao, Yongbin Zhou, Hailong Zhang, Sylvain Guilley, Laurent Sauvage:
How Far Can We Reach? Breaking RSM-Masked AES-128 Implementation Using Only One Trace. IACR Cryptol. ePrint Arch. 2017: 1144 (2017) - 2016
- [j5]Hailong Zhang, Yongbin Zhou:
How many interesting points should be used in a template attack? J. Syst. Softw. 120: 105-113 (2016) - [j4]Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
Towards optimal leakage exploitation rate in template attacks. Secur. Commun. Networks 9(16): 3116-3126 (2016) - [j3]Hailong Zhang, Yongbin Zhou, Dengguo Feng:
Theoretical and practical aspects of multiple samples correlation power analysis. Secur. Commun. Networks 9(18): 5166-5177 (2016) - [j2]Wei Yang, Yuchen Cao, Yongbin Zhou, Hailong Zhang, Qian Zhang:
Distance Based Leakage Alignment for Side Channel Attacks. IEEE Signal Process. Lett. 23(4): 419-423 (2016) - [c9]Yuchen Cao, Yongbin Zhou, Hailong Zhang, Wei Yang:
Hilbert Transform Based Vertical Preprocessing for Side-Channel Analysis. ICCCN 2016: 1-7 - 2015
- [j1]Hailong Zhang, Yongbin Zhou, Dengguo Feng:
Mahalanobis distance similarity measure based distinguisher for template attack. Secur. Commun. Networks 8(5): 769-777 (2015) - [c8]Jiehui Tang, Yongbin Zhou, Hailong Zhang, Shuang Qiu:
Higher-Order Masking Schemes for Simon. ICICS 2015: 379-392 - [c7]Chun Guo, Hailong Zhang, Dongdai Lin:
Estimating Differential-Linear Distinguishers and Applications to CTC2. ISPEC 2015: 220-234 - 2014
- [c6]Yingxian Zheng, Yongbin Zhou, Zhenmei Yu, Chengyu Hu, Hailong Zhang:
How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice? ICICS 2014: 200-214 - [c5]Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
How to Choose Interesting Points for Template Attacks More Effectively? INTRUST 2014: 168-183 - [c4]Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
Template Attacks Based on Priori Knowledge. INTRUST 2014: 346-363 - [c3]Hailong Zhang:
How to Effectively Decrease the Resource Requirement in Template Attack? IWSEC 2014: 119-133 - [i4]Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
How to Choose Interesting Points for Template Attacks? IACR Cryptol. ePrint Arch. 2014: 332 (2014) - [i3]Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
How to Choose Interesting Points for Template Attack More Effectively? IACR Cryptol. ePrint Arch. 2014: 864 (2014) - 2013
- [c2]Hui Zhao, Yongbin Zhou, François-Xavier Standaert, Hailong Zhang:
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers. ISPEC 2013: 336-352 - [i2]Hui Zhao, Yongbin Zhou, François-Xavier Standaert, Hailong Zhang:
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers. IACR Cryptol. ePrint Arch. 2013: 91 (2013) - [i1]Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
Towards Leakage Exploitation Optimality in Profiled Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2013: 608 (2013) - 2011
- [c1]Hailong Zhang, Yongbin Zhou, Dengguo Feng:
An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks. ICISC 2011: 61-73
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint