- Cryptographic Implementations and Security
- Coding theory and cryptography
- Chaos-based Image/Signal Encryption
- Physical Unclonable Functions (PUFs) and Hardware Security
- Advanced Malware Detection Techniques
- graph theory and CDMA systems
- Security and Verification in Computing
- Cryptography and Data Security
- Quantum-Dot Cellular Automata
- DNA and Biological Computing
- Network Security and Intrusion Detection
- 2D Materials and Applications
- Mobile Ad Hoc Networks
- MXene and MAX Phase Materials
- Advanced Authentication Protocols Security
- Cryptography and Residue Arithmetic
- Internet Traffic Analysis and Secure E-voting
- Computability, Logic, AI Algorithms
- Limits and Structures in Graph Theory
- Quantum Computing Algorithms and Architecture
- Advanced Database Systems and Queries
- Advanced Queuing Theory Analysis
- Opportunistic and Delay-Tolerant Networks
- Advanced Steganography and Watermarking Techniques
- Cybersecurity and Information Systems
Model Animal Research Center
2025
Nanjing University
2025
Nanjing Drum Tower Hospital
2025
Shandong University
2015-2024
Nanjing University of Posts and Telecommunications
2024
State Key Laboratory of Cryptology
2015-2024
Shandong University of Science and Technology
2019-2024
Peng Cheng Laboratory
2022-2024
Binzhou Medical University
2024
Beijing Normal University
2023-2024
The introduction of the automatic search boosts cryptanalysis symmetric-key primitives to some degree. However, performance is not always satisfactory for long trails or ciphers with large state sizes. Compared extensive attention on enhancement mixed integer linear programming (MILP) method, few works care acceleration Boolean satisfiability problem (SAT) modulo theories (SMT) method. This paper intends fill this vacancy. Firstly, additional encoding variables sequential counter circuit...
The reduction reaction of<italic>p</italic>-nitrophenol was catalyzed and monitored using the fluorescence of Cu-doped CDs.
In this study, the authors settle feasibility of mixed integer linear programming (MILP)-aided bit-based division property for ciphers with non-bit-permutation layers. First, they transform complicated layers to their primitive representations. Then, original Copy and exclusive OR models are generalised, these exploited depict Accord- ingly, MILP-aided can be applied much more primitives As an illus- tration, rst evaluate properties some word-oriented block ciphers. For Midori64, obtain a...
Purpose In recent times, live online teaching has emerged as a prominent trend in education. However, teachers are confronted with the challenge of not only acquainting themselves associated technologies but also effectively integrating them into their practices. This dual exerts pressure on to adopt teaching. study aims explore factors and mechanisms influencing teachers’ attitudes continuance intention toward It covers both intrinsic extrinsic motivations, well enabling inhibiting factors,...
Masking schemes are widely adopted strategies for countering side‐channel analysis (SCA) attacks. The initial hardware masking strategy, threshold implementation (TI), provides robust security against glitches in platforms. minimum number of shares required a TI scheme depends not only on the desired order but also algebraic degree target function. For instance, implementing second‐order quadratic nonlinear functions requires at least five to ensure security, leading substantially high costs...
The MPC-in-the-head with preprocessing (MPCitH-PP) paradigm presents a novel approach for constructing post-quantum digital signatures like Picnic3. This paper revisits the MPCitH-PP construction, analyzing both its offline and online phases proposing reformulation of protocol. By identifying redundant computations in these phases, we optimize them into single phase, thereby enhancing efficiency MPCitH-PP. Furthermore, explore independence mask, demonstrating that it can be calculated...
Side-Channel Attacks (SCAs) pose a significant threat to data security in embedded environments. To counteract the power-based SCAs, masking is widely used defense technique, that introduces randomness obscure sidechannel information generated during processing of secret data. However, practice, some challenges exist when implementing schemes. For example, implementation Boolean masking, they may refer low noise level and flaws. address said challenges, we present an effective efficient...
Yoroi is a family of space-hard block cipher proposed at TCHES 2021. This contains two parts, core part and an AES layer to prevent the blackbox adversary. At FSE 2023, Todo Isobe code-lifting attack recover secret T-box in Yoroi, breaking security claims Yoroi. Their work shows that vulnerable whitebox model has no contribution hybrid model. Besides, their employs strong hack modify extract table entries T-box. suitable for environment used by while it difficult achieve practical...