Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Zongbin Liu
@article{DBLP:journals/sensors/LiZYLZ23, author = {Quang Li and Ling Zhao and Xin Yu and Zongbin Liu and Yiqing Zhang}, title = {An Intelligent Sorting Method of Film in Cotton Combining Hyperspectral Imaging and the AlexNet-PCA Algorithm}, journal = {Sensors}, volume = {23}, number = {16}, pages = {7041}, year = {2023}, url = {https://doi.org/10.3390/s23167041}, doi = {10.3390/S23167041}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/LiZYLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/ZhengLLM20, author = {Liang Zheng and Changting Li and Zongbin Liu and Cunqing Ma}, editor = {Tinoosh Mohsenin and Weisheng Zhao and Yiran Chen and Onur Mutlu}, title = {Boosting Entropy Extraction of PDL-based {RO} {PUF} by High-order Difference Method}, booktitle = {{GLSVLSI} '20: Great Lakes Symposium on {VLSI} 2020, Virtual Event, China, September 7-9, 2020}, pages = {59--64}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3386263.3406903}, doi = {10.1145/3386263.3406903}, timestamp = {Mon, 04 Jul 2022 14:19:34 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/ZhengLLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vts/TangLMLG20, author = {Churan Tang and Pengkun Liu and Cunqing Ma and Zongbin Liu and Jingquan Ge}, title = {Flush+Time: {A} High Accuracy and High Resolution Cache Attack On {ARM-FPGA} Embedded SoC}, booktitle = {38th {IEEE} {VLSI} Test Symposium, {VTS} 2020, San Diego, CA, USA, April 5-8, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/VTS48691.2020.9107588}, doi = {10.1109/VTS48691.2020.9107588}, timestamp = {Thu, 25 Jun 2020 15:32:49 +0200}, biburl = {https://dblp.org/rec/conf/vts/TangLMLG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhengHLMZT19, author = {Liang Zheng and Donglei Han and Zongbin Liu and Cunqing Ma and Lingchen Zhang and Churan Tang}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {A Low Overhead Error Correction Algorithm Using Random Permutation for {SRAM} PUFs}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {475--493}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_26}, doi = {10.1007/978-3-030-21548-4\_26}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhengHLMZT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscs/YangZMLP19, author = {Xueyi Yang and Lingchen Zhang and Cunqing Ma and Zongbin Liu and Ping Peng}, title = {Android Control Flow Obfuscation Based on Dynamic Entry Points Modification}, booktitle = {22nd International Conference on Control Systems and Computer Science, {CSCS} 2019, Bucharest, Romania, May 28-30, 2019}, pages = {296--303}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSCS.2019.00054}, doi = {10.1109/CSCS.2019.00054}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cscs/YangZMLP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/TangLMGT19, author = {Churan Tang and Zongbin Liu and Cunqing Ma and Jingquan Ge and Chenyang Tu}, editor = {Jianying Zhou and Xiapu Luo and Qingni Shen and Zhen Xu}, title = {SecFlush: {A} Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks}, booktitle = {Information and Communications Security - 21st International Conference, {ICICS} 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11999}, pages = {251--268}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41579-2\_15}, doi = {10.1007/978-3-030-41579-2\_15}, timestamp = {Mon, 02 Mar 2020 17:19:02 +0100}, biburl = {https://dblp.org/rec/conf/icics/TangLMGT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/ZhangLMZH19, author = {Pengcheng Zhang and Zongbin Liu and Cunqing Ma and Lingchen Zhang and Donglei Han}, title = {KPaM: {A} Key Protection Framework for Mobile Devices Based on Two-party Computation}, booktitle = {2019 {IEEE} Symposium on Computers and Communications, {ISCC} 2019, Barcelona, Spain, June 29 - July 3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCC47284.2019.8969714}, doi = {10.1109/ISCC47284.2019.8969714}, timestamp = {Mon, 03 Feb 2020 18:35:04 +0100}, biburl = {https://dblp.org/rec/conf/iscc/ZhangLMZH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ZhengLLZM18, author = {Liang Zheng and Changting Li and Zongbin Liu and Lingchen Zhang and Cunqing Ma}, editor = {Raheem Beyah and Bing Chang and Yingjiu Li and Sencun Zhu}, title = {Implementation of High Throughput {XTS-SM4} Module for Data Storage Devices}, booktitle = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {255}, pages = {271--290}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01704-0\_15}, doi = {10.1007/978-3-030-01704-0\_15}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ZhengLLZM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiLZMZ17, author = {Changting Li and Zongbin Liu and Lingchen Zhang and Cunqing Ma and Liang Zheng}, editor = {Sihan Qing and Chris Mitchell and Liqun Chen and Dongmei Liu}, title = {A Plausibly Deniable Encryption Scheme Utilizing PUF's Thermo-Sensitivity}, booktitle = {Information and Communications Security - 19th International Conference, {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10631}, pages = {105--117}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-89500-0\_9}, doi = {10.1007/978-3-319-89500-0\_9}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LiLZMZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiLZMZ17a, author = {Changting Li and Zongbin Liu and Lingchen Zhang and Cunqing Ma and Liang Zheng}, editor = {Sihan Qing and Chris Mitchell and Liqun Chen and Dongmei Liu}, title = {A {PUF} and Software Collaborative Key Protection Scheme}, booktitle = {Information and Communications Security - 19th International Conference, {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10631}, pages = {291--303}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-89500-0\_26}, doi = {10.1007/978-3-319-89500-0\_26}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LiLZMZ17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/LiuZMLJ16, author = {Zongbin Liu and Qinglong Zhang and Cunqing Ma and Changting Li and Jiwu Jing}, editor = {Luca Fanucci and J{\"{u}}rgen Teich}, title = {{HPAZ:} {A} high-throughput pipeline architecture of {ZUC} in hardware}, booktitle = {2016 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2016, Dresden, Germany, March 14-18, 2016}, pages = {269--272}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/document/7459319/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/LiuZMLJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MaZLTL16, author = {Yuan Ma and Qinglong Zhang and Zongbin Liu and Chenyang Tu and Jingqiang Lin}, editor = {Kwok{-}Yan Lam and Chi{-}Hung Chi and Sihan Qing}, title = {Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields}, booktitle = {Information and Communications Security - 18th International Conference, {ICICS} 2016, Singapore, November 29 - December 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9977}, pages = {292--306}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-50011-9\_23}, doi = {10.1007/978-3-319-50011-9\_23}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/MaZLTL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangGZLW16, author = {Xin Wang and Neng Gao and Lingchen Zhang and Zongbin Liu and Lei Wang}, editor = {Kwok{-}Yan Lam and Chi{-}Hung Chi and Sihan Qing}, title = {Novel {MITM} Attacks on Security Protocols in {SDN:} {A} Feasibility Study}, booktitle = {Information and Communications Security - 18th International Conference, {ICICS} 2016, Singapore, November 29 - December 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9977}, pages = {455--465}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-50011-9\_35}, doi = {10.1007/978-3-319-50011-9\_35}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WangGZLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/LiuGTML16, author = {Zeyi Liu and Neng Gao and Chenyang Tu and Yuan Ma and Zongbin Liu}, editor = {Roberto Avanzi and Howard M. Heys}, title = {Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks}, booktitle = {Selected Areas in Cryptography - {SAC} 2016 - 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10532}, pages = {41--57}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-69453-5\_3}, doi = {10.1007/978-3-319-69453-5\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/LiuGTML16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ZhangLMLZ16, author = {Qinglong Zhang and Zongbin Liu and Cunqing Ma and Changting Li and Lingchen Zhang}, editor = {Robert H. Deng and Jian Weng and Kui Ren and Vinod Yegneswaran}, title = {{FROPUF:} How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs}, booktitle = {Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {198}, pages = {675--693}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-59608-2\_37}, doi = {10.1007/978-3-319-59608-2\_37}, timestamp = {Tue, 12 May 2020 10:32:53 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ZhangLMLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/TuZGLML15, author = {Chenyang Tu and Jian Zhou and Neng Gao and Zeyi Liu and Yuan Ma and Zongbin Liu}, editor = {Sihan Qing and Eiji Okamoto and Kwangjo Kim and Dongmei Liu}, title = {{QRL:} {A} High Performance Quadruple-Rail Logic for Resisting {DPA} on {FPGA} Implementations}, booktitle = {Information and Communications Security - 17th International Conference, {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9543}, pages = {184--198}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29814-6\_15}, doi = {10.1007/978-3-319-29814-6\_15}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/TuZGLML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ZhangLMJ15, author = {Qinglong Zhang and Zongbin Liu and Cunqing Ma and Jiwu Jing}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Bit Error Probability Evaluation of {RO} PUFs}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {421--436}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_23}, doi = {10.1007/978-3-319-23318-5\_23}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/ZhangLMJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhangLMJ15, author = {Qinglong Zhang and Zongbin Liu and Cunqing Ma and Jiwu Jing}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Bit Error Probability Evaluation of Ring Oscillator {PUF} (Short Paper)}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {347--356}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_21}, doi = {10.1007/978-3-319-22425-1\_21}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZhangLMJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TuGLWLM15, author = {Chenyang Tu and Neng Gao and Zeyi Liu and Lei Wang and Zongbin Liu and Bingke Ma}, title = {A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to {CLEFIA} and Camellia}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {174}, year = {2015}, url = {http://eprint.iacr.org/2015/174}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/TuGLWLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangLMLJ15, author = {Qinglong Zhang and Zongbin Liu and Cunqing Ma and Changting Li and Jiwu Jing}, title = {{FROPUF:} How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {545}, year = {2015}, url = {http://eprint.iacr.org/2015/545}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangLMLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangLLXJ14, author = {Qinglong Zhang and Zongbin Liu and Miao Li and Ji Xiang and Jiwu Jing}, editor = {Willy Susilo and Yi Mu}, title = {A High-Throughput Unrolled {ZUC} Core for 100Gbps Data Transmission}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {370--385}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_24}, doi = {10.1007/978-3-319-08344-5\_24}, timestamp = {Thu, 14 Oct 2021 10:41:30 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangLLXJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MaLCXLJ14, author = {Yuan Ma and Jingqiang Lin and Tianyu Chen and Changwei Xu and Zongbin Liu and Jiwu Jing}, editor = {Lejla Batina and Matthew Robshaw}, title = {Entropy Evaluation for Oscillator-Based True Random Number Generators}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {544--561}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_30}, doi = {10.1007/978-3-662-44709-3\_30}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/MaLCXLJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiaiaai/ShangZLXJ14, author = {Ming Shang and Qinglong Zhang and Zongbin Liu and Ji Xiang and Jiwu Jing}, title = {An Ultra-Compact Hardware Implementation of {SMS4}}, booktitle = {{IIAI} 3rd International Conference on Advanced Applied Informatics, {IIAI-AAI} 2014, Kokura Kita-ku, Japan, August 31 - Sept. 4, 2014}, pages = {86--90}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IIAI-AAI.2014.28}, doi = {10.1109/IIAI-AAI.2014.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiaiaai/ShangZLXJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ZhangLCX14, author = {Qinglong Zhang and Zongbin Liu and Quanwei Cai and Ji Xiang}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {{TST:} {A} New Randomness Test Method Based on Coupon Collector's Problem}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {152}, pages = {362--373}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23829-6\_25}, doi = {10.1007/978-3-319-23829-6\_25}, timestamp = {Sat, 17 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ZhangLCX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/MaLPJ13, author = {Yuan Ma and Zongbin Liu and Wuqiong Pan and Jiwu Jing}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over {\textbackslash}mathrm p}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {421--437}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_21}, doi = {10.1007/978-3-662-43414-7\_21}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/MaLPJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/LiHYGLZ13, author = {Miao Li and Liangsheng He and Tongjie Yang and Neng Gao and Zongbin Liu and Qinglong Zhang}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {An Efficient Reconfigurable {II-ONB} Modular Multiplier}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {169--181}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_11}, doi = {10.1007/978-3-319-04283-1\_11}, timestamp = {Mon, 05 Jun 2017 12:43:35 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/LiHYGLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLWG13, author = {Pingjian Wang and Zongbin Liu and Lei Wang and Neng Gao}, title = {High Radix Montgomery Modular Multiplier on Modern {FPGA}}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1484--1489}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.180}, doi = {10.1109/TRUSTCOM.2013.180}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangLWG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuGJ013, author = {Zongbin Liu and Neng Gao and Jiwu Jing and Peng Liu}, title = {{HPAZ:} a High-throughput Pipeline Architecture of {ZUC} in Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {461}, year = {2013}, url = {http://eprint.iacr.org/2013/461}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuGJ013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MaXLJLY12, author = {Yuan Ma and Luning Xia and Jingqiang Lin and Jiwu Jing and Zongbin Liu and Xingjie Yu}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {Hardware Performance Optimization and Evaluation of {SM3} Hash Algorithm on {FPGA}}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {105--118}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_10}, doi = {10.1007/978-3-642-34129-8\_10}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/MaXLJLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangXLJM12, author = {Lingchen Zhang and Luning Xia and Zongbin Liu and Jiwu Jing and Yuan Ma}, editor = {Geyong Min and Yulei Wu and Lei (Chris) Liu and Xiaolong Jin and Stephen A. Jarvis and Ahmed Yassin Al{-}Dubai}, title = {Evaluating the Optimized Implementations of {SNOW3G} and {ZUC} on {FPGA}}, booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012}, pages = {436--442}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/TrustCom.2012.150}, doi = {10.1109/TRUSTCOM.2012.150}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangXLJM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/PanJXLY11, author = {Wuqiong Pan and Jiwu Jing and Luning Xia and Zongbin Liu and Meng Yu}, editor = {Chuankun Wu and Moti Yung and Dongdai Lin}, title = {An Efficient {RSA} Implementation without Precomputation}, booktitle = {Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7537}, pages = {251--268}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-34704-7\_19}, doi = {10.1007/978-3-642-34704-7\_19}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/PanJXLY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangJLZP11, author = {Lei Wang and Jiwu Jing and Zongbin Liu and Lingchen Zhang and Wuqiong Pan}, editor = {Sihan Qing and Willy Susilo and Guilin Wang and Dongmei Liu}, title = {Evaluating Optimized Implementations of Stream Cipher {ZUC} Algorithm on {FPGA}}, booktitle = {Information and Communications Security - 13th International Conference, {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7043}, pages = {202--215}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25243-3\_17}, doi = {10.1007/978-3-642-25243-3\_17}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WangJLZP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LiuXJL11, author = {Zongbin Liu and Luning Xia and Jiwu Jing and Peng Liu}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {A Tiny {RSA} Coprocessor based on Optimized Systolic Montgomery Architecture}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {105--113}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LiuXJL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiuJL10, author = {Zongbin Liu and Jiwu Jing and Peng Liu}, editor = {Jin Kwak and Robert H. Deng and Yoojae Won and Guilin Wang}, title = {Rate-Based Watermark Traceback: {A} New Approach}, booktitle = {Information Security, Practice and Experience, 6th International Conference, {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6047}, pages = {172--186}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12827-1\_13}, doi = {10.1007/978-3-642-12827-1\_13}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiuJL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.