Personal information

Activities

Works (6)

Statistical Higher-Order Correlation Attacks Against Code-Based Masking

IEEE Transactions on Computers
2024-10 | Journal article
Contributors: Wei Cheng; Jingdian Ming; Sylvain Guilley; Jean-Luc Danger
Source: check_circle
Crossref

Practical Public Template Attacks on CRYSTALS-Dilithium With Randomness Leakages

IEEE Transactions on Information Forensics and Security
2023 | Journal article
Contributors: Zehua Qiao; Yuejun Liu; Yongbin Zhou; Jingdian Ming; Chengbin Jin; Huizhong Li
Source: check_circle
Crossref

Optimizing Higher-Order Correlation Analysis Against Inner Product Masking Scheme

IEEE Transactions on Information Forensics and Security
2022 | Journal article
Contributors: Jingdian Ming; Yongbin Zhou; Wei Cheng; Huizhong Li
Source: check_circle
Crossref

Assessment of Addition-Chain-Based Masked S-Box Using Deep-Learning-Based Side-Channel Attacks

Security and Communication Networks
2022-03-24 | Journal article
Contributors: Huizhong Li; Jingdian Ming; Yongbin Zhou; Dragan Peraković
Source: check_circle
Crossref

On the Security of Lattice-Based Fiat-Shamir Signatures in the Presence of Randomness Leakage

IEEE Transactions on Information Forensics and Security
2021 | Journal article
Contributors: Yuejun Liu; Yongbin Zhou; Shuo Sun; Tianyu Wang; Rui Zhang; Jingdian Ming
Source: check_circle
Crossref

Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes

IEEE Transactions on Information Forensics and Security
2020 | Journal article
Contributors: Jingdian Ming; Yongbin Zhou; Wei Cheng; Huizhong Li; Guang Yang; Qian Zhang
Source: check_circle
Crossref