Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, and Kazuo Sakiyama, “All You Need Is Fault: Zero-Value Attacks on AES and a New $\lambda$-Detection M&M,” Cryptology ePrint Archive, Report 2023/1129, 2023.
金子尚平, 李陽, 崎山一男, 宮原大輝, “天秤ベース秘密計算に対する計算モデルの構築,” マルチメディア、分散、協調とモバイル(DICOMO2023)シンポジウム, 9A-2, 8 pages (Jul., 2023).
Saya Inagaki, Mingyu Yang, Yang Li, Kazuo Sakiyama, and Yuko Hara-Azumi, “Power Side-channel Attack Resistant Circuit Designs of ARX Ciphers Using High-level Synthesis,” ACM Trans. Embed. Comput. Syst., Vol.22, Issue 5, No.85, pp.1-17, (Sept., 2023).
Yang Li, Mengting Chen, Zhe Liu, and Jian Wang, “Reduction in the Number of Fault Injections for Blind Fault Attack on SPN Block Ciphers” ACM Transactions on Embedded Computing Systems (TECS), Vol.16(2), pp.1–20 (May., 2017).
Yang Li, Mengting Chen, and Jian Wang, “Another Security Evaluation of SPA Countermeasures for AES Key Expansion in IoT devices” Journal of Information Science & Engineering, Vol.33/ 4, pp.1085–1100 (Jul., 2017).
Sen Xu, Xiangjun Lu, Kaiyu Zhang, Yang Li, Lei Wang, Weijia Wang, Haihua Gu, Zheng Guo, Junrong Liu, and Dawu Gu, “Similar Operation Template Attack on RSA-CRT as a Case Study” Science China Information Sciences, Vol.61/ 32111, 17 pages (Mar., 2018).
Ruyan Wang, Xiaohan Meng, Yang Li, Jian Wang, “Towards Optimized DFA Attacks on AES under Multibyte Random Fault Model,” Security and Communication Networks, Vol.2018, 9 pages (Aug. 2018).
Jingyi Feng, Hua Chen, Yang Li, Zhipeng Jiao, and Wei Xi, “A Framework for Evaluation and Analysis on Infection Countermeasures Against Fault Attacks,” IEEE Transactions on Information Forensics and Security, Vol.15, pp.391–406 (Mar., 2019).
Daisuke Fujimoto, Takumi Okamoto, Yang Li, Youngwoo Kim, and Yuichi Hayashi, ”Evaluation of Statistical Fault Analysis using Input Timing Violation of Sequential Circuit on Cryptographic Module under IEM” Transactions on Electromagnetic Compatibility, 7 pages, accepted.
Mengting Chen, Yang Li, and Jian Wang, “Another SPA Key Recovery Against Random Order Countermeasures for AES Key Expansion”, In Proc. International Conference on Cloud Computing and Security (ICCCS’16), LNCS 10039, Springer-Verlag, pp.322–334 (Jun., 2016).