Yang LI
Yang LI
Nanjing University of Aeronautics and Astronautics
Verified email at - Homepage
Cited by
Cited by
Fault sensitivity analysis
Y Li, K Sakiyama, S Gomisawa, T Fukunaga, J Takahashi, K Ohta
Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International …, 2010
On the power of fault sensitivity analysis and collision side-channel attacks in a combined setting
A Moradi, O Mischke, C Paar, Y Li, K Ohta, K Sakiyama
Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International …, 2011
Information-theoretic approach to optimal differential fault analysis
K Sakiyama, Y Li, M Iwamoto, K Ohta
IEEE Transactions on Information Forensics and Security 7 (1), 109-120, 2011
New fault-based side-channel attack using fault sensitivity
Y Li, K Ohta, K Sakiyama
IEEE Transactions on Information Forensics and Security 7 (1), 88-97, 2011
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
C Clavier, JL Danger, G Duc, MA Elaabid, B Gérard, S Guilley, A Heuser, ...
Journal of Cryptographic Engineering 4, 259-274, 2014
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl
Y Sasaki, Y Li, L Wang, K Sakiyama, K Ohta
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010
An information theoretic perspective on the differential fault analysis against aes
Y Li, S Gomisawa, K Sakiyama, K Ohta
Cryptology ePrint Archive, 2010
Revisit fault sensitivity analysis on WDDL-AES
Y Li, K Ohta, K Sakiyama
2011 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2011
Yet another fault-based leakage in non-uniform faulty ciphertexts
Y Li, Y Hayashi, A Matsubara, N Homma, T Aoki, K Ohta, K Sakiyama
Foundations and Practice of Security: 6th International Symposium, FPS 2013 …, 2014
Power Variance Analysis breaks a masked ASIC implementation of AES
Y Li, K Sakiyama, L Batina, D Nakatsu, K Ohta
2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010 …, 2010
Clockwise Collision Analysis--Overlooked Side-Channel Leakage Inside Your Measurements
Y Li, D Nakatsu, Q Li, K Ohta, K Sakiyama
Cryptology EPrint Archive, 2011
Toward Effective Countermeasures against an Improved Fault Sensitivity Analysis
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2012
Fault sensitivity analysis against elliptic curve cryptosystems
H Sakamoto, Y Li, K Ohta, K Sakiyama
2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 11-20, 2011
Key-dependent weakness of AES-based ciphers under clockwise collision distinguisher
T Nakasone, Y Li, Y Sasaki, M Iwamoto, K Ohta, K Sakiyama
Information Security and Cryptology–ICISC 2012: 15th International …, 2013
Exploring the relations between fault sensitivity and power consumption
Y Li, S Endo, N Debande, N Homma, T Aoki, TH Le, JL Danger, K Ohta, ...
Constructive Side-Channel Analysis and Secure Design: 4th International …, 2013
An extension of fault sensitivity analysis based on clockwise collision
Y Li, K Ohta, K Sakiyama
Information Security and Cryptology: 8th International Conference, Inscrypt …, 2013
Combination of SW countermeasure and CPU modification on FPGA against power analysis
D Nakatsu, Y Li, K Sakiyama, K Ohta
International Workshop on Information Security Applications, 258-272, 2010
Security evaluation of a DPA-resistant S-Box based on the Fourier transform
Y Li, K Sakiyama, S Kawamura, Y Komano, K Ohta
Information and Communications Security: 11th International Conference …, 2009
Fully Integrated Passive UHF RFID Tag for Hash‐Based Mutual Authentication Protocol
S Mikami, D Watanabe, Y Li, K Sakiyama
The Scientific World Journal 2015 (1), 498610, 2015
Intentional electromagnetic interference for fault analysis on AES block cipher IC
Y Hayashi, S Gomisawa, Y Li, N Homma, K Sakiyama, T Aoki, K Ohta
2011 8th Workshop on Electromagnetic Compatibility of Integrated Circuits …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20