BibTeX records: Zongbin Liu

download as .bib file

@article{DBLP:journals/sensors/LiZYLZ23,
  author       = {Quang Li and
                  Ling Zhao and
                  Xin Yu and
                  Zongbin Liu and
                  Yiqing Zhang},
  title        = {An Intelligent Sorting Method of Film in Cotton Combining Hyperspectral
                  Imaging and the AlexNet-PCA Algorithm},
  journal      = {Sensors},
  volume       = {23},
  number       = {16},
  pages        = {7041},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23167041},
  doi          = {10.3390/S23167041},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/LiZYLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/ZhengLLM20,
  author       = {Liang Zheng and
                  Changting Li and
                  Zongbin Liu and
                  Cunqing Ma},
  editor       = {Tinoosh Mohsenin and
                  Weisheng Zhao and
                  Yiran Chen and
                  Onur Mutlu},
  title        = {Boosting Entropy Extraction of PDL-based {RO} {PUF} by High-order
                  Difference Method},
  booktitle    = {{GLSVLSI} '20: Great Lakes Symposium on {VLSI} 2020, Virtual Event,
                  China, September 7-9, 2020},
  pages        = {59--64},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3386263.3406903},
  doi          = {10.1145/3386263.3406903},
  timestamp    = {Mon, 04 Jul 2022 14:19:34 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/ZhengLLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vts/TangLMLG20,
  author       = {Churan Tang and
                  Pengkun Liu and
                  Cunqing Ma and
                  Zongbin Liu and
                  Jingquan Ge},
  title        = {Flush+Time: {A} High Accuracy and High Resolution Cache Attack On
                  {ARM-FPGA} Embedded SoC},
  booktitle    = {38th {IEEE} {VLSI} Test Symposium, {VTS} 2020, San Diego, CA, USA,
                  April 5-8, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/VTS48691.2020.9107588},
  doi          = {10.1109/VTS48691.2020.9107588},
  timestamp    = {Thu, 25 Jun 2020 15:32:49 +0200},
  biburl       = {https://dblp.org/rec/conf/vts/TangLMLG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhengHLMZT19,
  author       = {Liang Zheng and
                  Donglei Han and
                  Zongbin Liu and
                  Cunqing Ma and
                  Lingchen Zhang and
                  Churan Tang},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {A Low Overhead Error Correction Algorithm Using Random Permutation
                  for {SRAM} PUFs},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {475--493},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_26},
  doi          = {10.1007/978-3-030-21548-4\_26},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhengHLMZT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscs/YangZMLP19,
  author       = {Xueyi Yang and
                  Lingchen Zhang and
                  Cunqing Ma and
                  Zongbin Liu and
                  Ping Peng},
  title        = {Android Control Flow Obfuscation Based on Dynamic Entry Points Modification},
  booktitle    = {22nd International Conference on Control Systems and Computer Science,
                  {CSCS} 2019, Bucharest, Romania, May 28-30, 2019},
  pages        = {296--303},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSCS.2019.00054},
  doi          = {10.1109/CSCS.2019.00054},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cscs/YangZMLP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TangLMGT19,
  author       = {Churan Tang and
                  Zongbin Liu and
                  Cunqing Ma and
                  Jingquan Ge and
                  Chenyang Tu},
  editor       = {Jianying Zhou and
                  Xiapu Luo and
                  Qingni Shen and
                  Zhen Xu},
  title        = {SecFlush: {A} Hardware/Software Collaborative Design for Real-Time
                  Detection and Defense Against Flush-Based Cache Attacks},
  booktitle    = {Information and Communications Security - 21st International Conference,
                  {ICICS} 2019, Beijing, China, December 15-17, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11999},
  pages        = {251--268},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41579-2\_15},
  doi          = {10.1007/978-3-030-41579-2\_15},
  timestamp    = {Mon, 02 Mar 2020 17:19:02 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/TangLMGT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/ZhangLMZH19,
  author       = {Pengcheng Zhang and
                  Zongbin Liu and
                  Cunqing Ma and
                  Lingchen Zhang and
                  Donglei Han},
  title        = {KPaM: {A} Key Protection Framework for Mobile Devices Based on Two-party
                  Computation},
  booktitle    = {2019 {IEEE} Symposium on Computers and Communications, {ISCC} 2019,
                  Barcelona, Spain, June 29 - July 3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISCC47284.2019.8969714},
  doi          = {10.1109/ISCC47284.2019.8969714},
  timestamp    = {Mon, 03 Feb 2020 18:35:04 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/ZhangLMZH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ZhengLLZM18,
  author       = {Liang Zheng and
                  Changting Li and
                  Zongbin Liu and
                  Lingchen Zhang and
                  Cunqing Ma},
  editor       = {Raheem Beyah and
                  Bing Chang and
                  Yingjiu Li and
                  Sencun Zhu},
  title        = {Implementation of High Throughput {XTS-SM4} Module for Data Storage
                  Devices},
  booktitle    = {Security and Privacy in Communication Networks - 14th International
                  Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {255},
  pages        = {271--290},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01704-0\_15},
  doi          = {10.1007/978-3-030-01704-0\_15},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ZhengLLZM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiLZMZ17,
  author       = {Changting Li and
                  Zongbin Liu and
                  Lingchen Zhang and
                  Cunqing Ma and
                  Liang Zheng},
  editor       = {Sihan Qing and
                  Chris Mitchell and
                  Liqun Chen and
                  Dongmei Liu},
  title        = {A Plausibly Deniable Encryption Scheme Utilizing PUF's Thermo-Sensitivity},
  booktitle    = {Information and Communications Security - 19th International Conference,
                  {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10631},
  pages        = {105--117},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-89500-0\_9},
  doi          = {10.1007/978-3-319-89500-0\_9},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LiLZMZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiLZMZ17a,
  author       = {Changting Li and
                  Zongbin Liu and
                  Lingchen Zhang and
                  Cunqing Ma and
                  Liang Zheng},
  editor       = {Sihan Qing and
                  Chris Mitchell and
                  Liqun Chen and
                  Dongmei Liu},
  title        = {A {PUF} and Software Collaborative Key Protection Scheme},
  booktitle    = {Information and Communications Security - 19th International Conference,
                  {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10631},
  pages        = {291--303},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-89500-0\_26},
  doi          = {10.1007/978-3-319-89500-0\_26},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LiLZMZ17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/LiuZMLJ16,
  author       = {Zongbin Liu and
                  Qinglong Zhang and
                  Cunqing Ma and
                  Changting Li and
                  Jiwu Jing},
  editor       = {Luca Fanucci and
                  J{\"{u}}rgen Teich},
  title        = {{HPAZ:} {A} high-throughput pipeline architecture of {ZUC} in hardware},
  booktitle    = {2016 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2016, Dresden, Germany, March 14-18, 2016},
  pages        = {269--272},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/document/7459319/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/LiuZMLJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MaZLTL16,
  author       = {Yuan Ma and
                  Qinglong Zhang and
                  Zongbin Liu and
                  Chenyang Tu and
                  Jingqiang Lin},
  editor       = {Kwok{-}Yan Lam and
                  Chi{-}Hung Chi and
                  Sihan Qing},
  title        = {Low-Cost Hardware Implementation of Elliptic Curve Cryptography for
                  General Prime Fields},
  booktitle    = {Information and Communications Security - 18th International Conference,
                  {ICICS} 2016, Singapore, November 29 - December 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9977},
  pages        = {292--306},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-50011-9\_23},
  doi          = {10.1007/978-3-319-50011-9\_23},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/MaZLTL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangGZLW16,
  author       = {Xin Wang and
                  Neng Gao and
                  Lingchen Zhang and
                  Zongbin Liu and
                  Lei Wang},
  editor       = {Kwok{-}Yan Lam and
                  Chi{-}Hung Chi and
                  Sihan Qing},
  title        = {Novel {MITM} Attacks on Security Protocols in {SDN:} {A} Feasibility
                  Study},
  booktitle    = {Information and Communications Security - 18th International Conference,
                  {ICICS} 2016, Singapore, November 29 - December 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9977},
  pages        = {455--465},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-50011-9\_35},
  doi          = {10.1007/978-3-319-50011-9\_35},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WangGZLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/LiuGTML16,
  author       = {Zeyi Liu and
                  Neng Gao and
                  Chenyang Tu and
                  Yuan Ma and
                  Zongbin Liu},
  editor       = {Roberto Avanzi and
                  Howard M. Heys},
  title        = {Detecting Side Channel Vulnerabilities in Improved Rotating S-Box
                  Masking Scheme - Presenting Four Non-profiled Attacks},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2016 - 23rd International Conference,
                  St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10532},
  pages        = {41--57},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-69453-5\_3},
  doi          = {10.1007/978-3-319-69453-5\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/LiuGTML16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ZhangLMLZ16,
  author       = {Qinglong Zhang and
                  Zongbin Liu and
                  Cunqing Ma and
                  Changting Li and
                  Lingchen Zhang},
  editor       = {Robert H. Deng and
                  Jian Weng and
                  Kui Ren and
                  Vinod Yegneswaran},
  title        = {{FROPUF:} How to Extract More Entropy from Two Ring Oscillators in
                  FPGA-Based PUFs},
  booktitle    = {Security and Privacy in Communication Networks - 12th International
                  Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016,
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {198},
  pages        = {675--693},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-59608-2\_37},
  doi          = {10.1007/978-3-319-59608-2\_37},
  timestamp    = {Tue, 12 May 2020 10:32:53 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ZhangLMLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TuZGLML15,
  author       = {Chenyang Tu and
                  Jian Zhou and
                  Neng Gao and
                  Zeyi Liu and
                  Yuan Ma and
                  Zongbin Liu},
  editor       = {Sihan Qing and
                  Eiji Okamoto and
                  Kwangjo Kim and
                  Dongmei Liu},
  title        = {{QRL:} {A} High Performance Quadruple-Rail Logic for Resisting {DPA}
                  on {FPGA} Implementations},
  booktitle    = {Information and Communications Security - 17th International Conference,
                  {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9543},
  pages        = {184--198},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29814-6\_15},
  doi          = {10.1007/978-3-319-29814-6\_15},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/TuZGLML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ZhangLMJ15,
  author       = {Qinglong Zhang and
                  Zongbin Liu and
                  Cunqing Ma and
                  Jiwu Jing},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Bit Error Probability Evaluation of {RO} PUFs},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {421--436},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_23},
  doi          = {10.1007/978-3-319-23318-5\_23},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ZhangLMJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhangLMJ15,
  author       = {Qinglong Zhang and
                  Zongbin Liu and
                  Cunqing Ma and
                  Jiwu Jing},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Bit Error Probability Evaluation of Ring Oscillator {PUF} (Short Paper)},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {347--356},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_21},
  doi          = {10.1007/978-3-319-22425-1\_21},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhangLMJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TuGLWLM15,
  author       = {Chenyang Tu and
                  Neng Gao and
                  Zeyi Liu and
                  Lei Wang and
                  Zongbin Liu and
                  Bingke Ma},
  title        = {A Practical Chosen Message Power Analysis Method on the Feistel-SP
                  ciphers with Applications to {CLEFIA} and Camellia},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {174},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/174},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/TuGLWLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangLMLJ15,
  author       = {Qinglong Zhang and
                  Zongbin Liu and
                  Cunqing Ma and
                  Changting Li and
                  Jiwu Jing},
  title        = {{FROPUF:} How to Extract More Entropy from Two Ring Oscillators in
                  FPGA-Based PUFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {545},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/545},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangLMLJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangLLXJ14,
  author       = {Qinglong Zhang and
                  Zongbin Liu and
                  Miao Li and
                  Ji Xiang and
                  Jiwu Jing},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {A High-Throughput Unrolled {ZUC} Core for 100Gbps Data Transmission},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {370--385},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_24},
  doi          = {10.1007/978-3-319-08344-5\_24},
  timestamp    = {Thu, 14 Oct 2021 10:41:30 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangLLXJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MaLCXLJ14,
  author       = {Yuan Ma and
                  Jingqiang Lin and
                  Tianyu Chen and
                  Changwei Xu and
                  Zongbin Liu and
                  Jiwu Jing},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Entropy Evaluation for Oscillator-Based True Random Number Generators},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {544--561},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_30},
  doi          = {10.1007/978-3-662-44709-3\_30},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MaLCXLJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiaiaai/ShangZLXJ14,
  author       = {Ming Shang and
                  Qinglong Zhang and
                  Zongbin Liu and
                  Ji Xiang and
                  Jiwu Jing},
  title        = {An Ultra-Compact Hardware Implementation of {SMS4}},
  booktitle    = {{IIAI} 3rd International Conference on Advanced Applied Informatics,
                  {IIAI-AAI} 2014, Kokura Kita-ku, Japan, August 31 - Sept. 4, 2014},
  pages        = {86--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/IIAI-AAI.2014.28},
  doi          = {10.1109/IIAI-AAI.2014.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iiaiaai/ShangZLXJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ZhangLCX14,
  author       = {Qinglong Zhang and
                  Zongbin Liu and
                  Quanwei Cai and
                  Ji Xiang},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {{TST:} {A} New Randomness Test Method Based on Coupon Collector's
                  Problem},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {152},
  pages        = {362--373},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23829-6\_25},
  doi          = {10.1007/978-3-319-23829-6\_25},
  timestamp    = {Sat, 17 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ZhangLCX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/MaLPJ13,
  author       = {Yuan Ma and
                  Zongbin Liu and
                  Wuqiong Pan and
                  Jiwu Jing},
  editor       = {Tanja Lange and
                  Kristin E. Lauter and
                  Petr Lisonek},
  title        = {A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves
                  over {\textbackslash}mathrm p},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
                  Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8282},
  pages        = {421--437},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43414-7\_21},
  doi          = {10.1007/978-3-662-43414-7\_21},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/MaLPJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LiHYGLZ13,
  author       = {Miao Li and
                  Liangsheng He and
                  Tongjie Yang and
                  Neng Gao and
                  Zongbin Liu and
                  Qinglong Zhang},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {An Efficient Reconfigurable {II-ONB} Modular Multiplier},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {169--181},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_11},
  doi          = {10.1007/978-3-319-04283-1\_11},
  timestamp    = {Mon, 05 Jun 2017 12:43:35 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/LiHYGLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLWG13,
  author       = {Pingjian Wang and
                  Zongbin Liu and
                  Lei Wang and
                  Neng Gao},
  title        = {High Radix Montgomery Modular Multiplier on Modern {FPGA}},
  booktitle    = {12th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
                  Symposium on Parallel and Distributed Processing with Applications,
                  {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
                  and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages        = {1484--1489},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/TrustCom.2013.180},
  doi          = {10.1109/TRUSTCOM.2013.180},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLWG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuGJ013,
  author       = {Zongbin Liu and
                  Neng Gao and
                  Jiwu Jing and
                  Peng Liu},
  title        = {{HPAZ:} a High-throughput Pipeline Architecture of {ZUC} in Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {461},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/461},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuGJ013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MaXLJLY12,
  author       = {Yuan Ma and
                  Luning Xia and
                  Jingqiang Lin and
                  Jiwu Jing and
                  Zongbin Liu and
                  Xingjie Yu},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {Hardware Performance Optimization and Evaluation of {SM3} Hash Algorithm
                  on {FPGA}},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {105--118},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_10},
  doi          = {10.1007/978-3-642-34129-8\_10},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/MaXLJLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangXLJM12,
  author       = {Lingchen Zhang and
                  Luning Xia and
                  Zongbin Liu and
                  Jiwu Jing and
                  Yuan Ma},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {Evaluating the Optimized Implementations of {SNOW3G} and {ZUC} on
                  {FPGA}},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {436--442},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.150},
  doi          = {10.1109/TRUSTCOM.2012.150},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangXLJM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/PanJXLY11,
  author       = {Wuqiong Pan and
                  Jiwu Jing and
                  Luning Xia and
                  Zongbin Liu and
                  Meng Yu},
  editor       = {Chuankun Wu and
                  Moti Yung and
                  Dongdai Lin},
  title        = {An Efficient {RSA} Implementation without Precomputation},
  booktitle    = {Information Security and Cryptology - 7th International Conference,
                  Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7537},
  pages        = {251--268},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-34704-7\_19},
  doi          = {10.1007/978-3-642-34704-7\_19},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/PanJXLY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangJLZP11,
  author       = {Lei Wang and
                  Jiwu Jing and
                  Zongbin Liu and
                  Lingchen Zhang and
                  Wuqiong Pan},
  editor       = {Sihan Qing and
                  Willy Susilo and
                  Guilin Wang and
                  Dongmei Liu},
  title        = {Evaluating Optimized Implementations of Stream Cipher {ZUC} Algorithm
                  on {FPGA}},
  booktitle    = {Information and Communications Security - 13th International Conference,
                  {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7043},
  pages        = {202--215},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25243-3\_17},
  doi          = {10.1007/978-3-642-25243-3\_17},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WangJLZP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LiuXJL11,
  author       = {Zongbin Liu and
                  Luning Xia and
                  Jiwu Jing and
                  Peng Liu},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {A Tiny {RSA} Coprocessor based on Optimized Systolic Montgomery Architecture},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {105--113},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LiuXJL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiuJL10,
  author       = {Zongbin Liu and
                  Jiwu Jing and
                  Peng Liu},
  editor       = {Jin Kwak and
                  Robert H. Deng and
                  Yoojae Won and
                  Guilin Wang},
  title        = {Rate-Based Watermark Traceback: {A} New Approach},
  booktitle    = {Information Security, Practice and Experience, 6th International Conference,
                  {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6047},
  pages        = {172--186},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12827-1\_13},
  doi          = {10.1007/978-3-642-12827-1\_13},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LiuJL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics