Jingyi Feng, Hua Chen, Yang Li, Zhipeng Jiao, and Wei Xi, “A Framework for Evaluation and Analysis on Infection Countermeasures Against Fault Attacks,” IEEE Transactions on Information Forensics and Security, Vol.15, pp.391–406 (Mar., 2019).
Daisuke Fujimoto, Takumi Okamoto, Yang Li, Youngwoo Kim, and Yuichi Hayashi, ”Evaluation of Statistical Fault Analysis using Input Timing Violation of Sequential Circuit on Cryptographic Module under IEM” Transactions on Electromagnetic Compatibility, 7 pages, accepted.
Mengting Chen, Yang Li, and Jian Wang, “Another SPA Key Recovery Against Random Order Countermeasures for AES Key Expansion”, In Proc. International Conference on Cloud Computing and Security (ICCCS’16), LNCS 10039, Springer-Verlag, pp.322–334 (Jun., 2016).
Yang Li, Mengting Chen, and Jian Wang, “Introduction to side-channel attacks and fault attacks,” In Proc. Electromagnetic Compatibility 2016 Asia-Pacific International Symposium (APEMC’16), IEEE, pp.573–575 (Sep. 2016).
Shuang Wang, Yang Li, and Jian Wang, “A New Key Rank Estimation Method to Investigate Dependent Key Lists of Side Channel Attacks” In Proc. Asian Hardware Oriented Security and Trust Symposium (AsianHOST’17), IEEE, pp.1–6 (Oct., 2017).
Yang Li, Shuang Wang, Zhibin Wang, and Jian Wang, “A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks” In Proc. 16th Smart Card Research and Advanced Application Conference (Cardis’17), LNCS 10728, Springer-Verlag, pp.51–69 (Jan., 2018).
Ruyan Wang, Xiaohan Meng, Yang Li, Jian Wang, “Improved Differential Fault Analysis on Authenticated Encryption of PAEQ-128”, In Proc. International Conferences on Information Security and Cryptology 2018 (Inscript’18), LNCS 11449, Springer-Verlag, pp.183–199 (Dec., 2018).
Muhammad Salman, Yang Li, Jian Wang, “A Graphical PIN Entry System with Shoulder Surfing Resistance”, 2019 IEEE 4th International Conference on Signal and Image Processing, IEEE, pp. 203–207 (Jul., 2019).
Takeshi Sugawara, Tatsuya Onuma, and Yang Li, “Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function,” In Proc. International Workshop on Security (IWSEC 2020), LNCS 12231, Springer-Verlag, pp.117–127 (Sep., 2020).
Yang Li, Mengyu Zhu, Wang Lei, Kazuo Ohta, and Kazuo Sakiyama, “Visual Secret Sharing Schemes for Multiple Secret Images Allowing the 90-degree Rotation of Shares,” 2009 Symposium on Cryptography and Information Security (SCIS’09), 1F1-3 (Jan., 2009).