Shuang Wang, Yang Li, and Jian Wang, “A New Key Rank Estimation Method to Investigate Dependent Key Lists of Side Channel Attacks” In Proc. Asian Hardware Oriented Security and Trust Symposium (AsianHOST’17), IEEE, pp.1–6 (Oct., 2017).
Yang Li, Shuang Wang, Zhibin Wang, and Jian Wang, “A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks” In Proc. 16th Smart Card Research and Advanced Application Conference (Cardis’17), LNCS 10728, Springer-Verlag, pp.51–69 (Jan., 2018).
Ruyan Wang, Xiaohan Meng, Yang Li, Jian Wang, “Improved Differential Fault Analysis on Authenticated Encryption of PAEQ-128”, In Proc. International Conferences on Information Security and Cryptology 2018 (Inscript’18), LNCS 11449, Springer-Verlag, pp.183–199 (Dec., 2018).
Muhammad Salman, Yang Li, Jian Wang, “A Graphical PIN Entry System with Shoulder Surfing Resistance”, 2019 IEEE 4th International Conference on Signal and Image Processing, IEEE, pp. 203–207 (Jul., 2019).
Takeshi Sugawara, Tatsuya Onuma, and Yang Li, “Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function,” In Proc. International Workshop on Security (IWSEC 2020), LNCS 12231, Springer-Verlag, pp.117–127 (Sep., 2020).
Samuel Hand, Alexander Koch, Pascal Lafourcade Daiki Miyahara, and Léo Robert, “Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun,” In Proc. International Workshop on Security (IWSEC’23), LNCS 14128, Springer-Verlag, pp.255–272 (Aug., 2023).
Lei Wang, Yu Sasaki, Kazuo Sakiyama, and Kazuo Ohta, “Bit-Free Collision: Application to APOP Attack,” In Proc. International Workshop on Security 2009 (IWSEC’09), LNCS 5824, Springer-Verlag, pp.3–21 (Oct., 2009).
Yang Li, Kazuo Sakiyama, Shinichi Kawamura, Yuichi Komano, and Kazuo Ohta, “Security Evaluation of a DPA-resistant S-box Based on the Fourier Transform,” In Proc. International Conference on Information and Communications Security (ICICS’09), LNCS 5927, Springer-Verlag, pp.3–16 (Dec., 2009).
Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, and Goichiro Hanaoka, “Improving Efficiency of An ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness,” In Proc. RSA Conference 2010, Cryptographer’s Track (CT-RSA’10), LNCS 5985, Springer-Verlag, pp.284–301 (Mar., 2010).
Masami Izumi, Jun Ikegami, Kazuo Sakiyama, and Kazuo Ohta, “Improved Countermeasure against Address-bit DPA for ECC Scalar Multiplication,” In Proc. Design, Automation and Test in Europe (DATE’10), ACM, pp.981–984 (Mar., 2010).