- Cryptographic Implementations and Security
- Physical Unclonable Functions (PUFs) and Hardware Security
- Chaos-based Image/Signal Encryption
- Advanced Malware Detection Techniques
- Peer-to-Peer Network Technologies
- Caching and Content Delivery
- Complexity and Algorithms in Graphs
- Cryptography and Data Security
- Opportunistic and Delay-Tolerant Networks
- Chaos control and synchronization
- Nicotinic Acetylcholine Receptors Study
- Information and Cyber Security
- Bacillus and Francisella bacterial research
- Optimization and Search Problems
- Coding theory and cryptography
- DNA and Biological Computing
- Image and Video Quality Assessment
- Privacy-Preserving Technologies in Data
- Advanced Data Storage Technologies
- Fractal and DNA sequence analysis
- Security and Verification in Computing
- Security in Wireless Sensor Networks
- Network Security and Intrusion Detection
- Cryptography and Residue Arithmetic
- Advanced Graph Theory Research
Institute of Information Engineering
2015-2025
Chinese Academy of Sciences
2007-2025
Harbin Institute of Technology
2020
SUNY Oneonta
2019
University of Chinese Academy of Sciences
2011-2018
China People's Public Security University
2017-2018
In side channel attacks (SCA), noise has been a hot topic for affecting the quality of obtained observations. this paper, we propose kind improved wavelet transform denoising method based on singular spectral analysis (SSA) and detrended fluctuation (DFA). Principal signal component in SSA can be selected by DFA adaptively, residual part denoised to retrieve important information. The superposition between improves efficiency original transform. order verify usefulness proposed method,...
With the rapid accumulation of data in various types, modern database systems are facing problem managing multidimensional data. The main challenge is to design a highly efficient storage mechanism which can support fast item lookup with exact membership queries or partial information queries. This paper presents novel structure called Cartesian-join Bloom Filters. method maintains matrix that stores Cartesian product attribute bloom filters, each represents one dimension dataset....
The video content is growing rapidly in the Internet. This demand has raised a great deal of challenges. One crucial problems to figure out an efficient routing approach quickly find and transport right titles users. paper presents direct access network (DAN) which can automatically fetch interesting subject users' community their local network. Our solution not only optimize Internet traffic offer user fluent watching experience but also provide Omega Point, fast addressing mechanism...
Constrained by the limited resource, high-latency and high bit error rate, existing group key management schemes for space network are inefficient. To solve this problem, we proposed a centralized identity-based scheme using McEliece public-key cryptosystem (PKC). In scheme, node identity is used as parameter to generate public key. Therefore, authentication can be embedded into verification of without needing PKI. The distributed with protection so that implemented safely. Furthermore,...
Key enumeration schemes are used to post-process the scores given by side channel distinguishers and enumerate key candidates from most possible one least one, which can be regarded as optimal tools of search. However, application them is limited very large candidate space computing power consumption. For example, attacker may spend several weeks or months enumerating whole 2 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">45</sup> candidates....
Electromagnetic analysis in side channel attack exploits the information of electromagnetic radiation that leaks from cryptographic devices when they are running. It's no-table because its efficiency and easiness to perform. Correlation (CEMA) is most effective means analysis. However, traditional CEMA limited by some insignificant' traces. It necessary select helpful subset traces for rather than using whole set improve efficiency. In this paper, we first give an proposition about prove it...
Electromagnetic attacks are non-invasive and pose serious threats to the security of cryptographic devices. However, its environment is complex noise on electromagnetic traces often large. Thus, traditional differential analysis (DEMA) correlation (CEMA) require a lot recover key used in In order reduce number required our attacks, two high efficiency side channel distinguishers named multiple interesting points combined (MIP-DEMA) (MIP-CEMA) proposed this paper. Experimental results AES...
In cloud storage systems, the index system, which maps a queried item to its location, is key component. Due limited space in nodes, it requires compact for fast response. Moreover, since may be published on many nodes of privacy nodes' ownership information needs protected. this paper we introduce an indexing model - Lightweight Bloom filter Array (LBA) improve performance while preserves systems. We conduct theoretical analysis find system. also make comparisons with other method....
The efficiency can be significantly improved if the attacker uses interesting points to perform Correlation Power Analysis (CPA). prerequisite for this is that knows positions of points. However, it difficult accurately find locations he only has a small number power traces. In paper, we propose Frequency based Interesting Points Selection algorithm (FIPS) select under condition very Moreover, an error tolerant Single Point CPA (SIP-CPA) proposed. Experiments on AES implemented AT89S52...
Correlation Electromagnetic analysis (CEMA) has been effective in revealing the cryptographic key on cryptosystems. Random delay insertion (RDI) causes misalignments to prevent action of these attacks time domain avoid information leakage. In this paper, we first use newly proposed time-frequency transformation Hirschman Optimal Transform (HOT) transform signal from frequency for analysis. Experimental results show that method conquers weakness which samples have be aligned accurately. So,...
Correlation enhanced Collision Attacks (CCA) can be able to exploit any first-order leakage without knowing the precise hypothetical power model. However, correlation between time samples of two S-boxes is relatively weak, which leads low efficiency CCA. Actually, CCA much lower than that Power Analysis (CPA). In this paper, methods named Invalid Traces Clipping based (IPTC-CCA) and Splicing (PTS-CCA) are proposed improve IPTC+PTS-CCA, a combination IPTC-CCA PTSCCA, more efficient both...
Motivated by the fair rate allocation in a multiaccess Gaussian channel, this paper studies problem of over generalized symmetric polymatroid with box constraints. The best-known algorithm for has time complexity O(n <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">5</sup> ln xmlns:xlink="http://www.w3.org/1999/xlink">O(1)</sup> n). In paper, we present divide-and-conquer quadratic running time. It is an implementation refined decomposing method...