欢迎来到张帆的中文主页

信息与电子工程学院
浙江大学
我的主页 相关新闻 发表论著 科研活动 教学活动 相关信息 我的学生 中文 英文
代表性论文
所有论文
其他著作








    相关链接:
安全架构和前沿电子实验室
(在建,仅限校内访问)
信息与电子工程学院
网络空间安全研究中心






 
代表性论文

请点击这里查看所有的论文列表。

  1. F. Zhang, B. Shao, W. Gu, "Artificial Intelligence with Side Channle Analysis," (人工智能之于旁路分析) in Communications of the CCF, Vol.15, Issue.7, Editors: K. Ren, (Eds.), July 2019.[PDF]
  2. Y. Chen, C. Poskitt, J. Sun, S. Adepu, F. Zhang*, "Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences," In ASE 2019, Nov 2019.  [PDF] (CCF-A, AR=21%, 93/455)
  3. F. Zhang*, X. Lou, X. Zhao, S. Bhasin, W. He, R. Ding, S. Qureshi, K. Ren, "Persistent Fault Analysis on Block Ciphers," IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 3, pp.150-172, 2018. [PDF] [Video] [PPT] (CCF-B, the same paper won Best Paper Award in ChinaCrypt 2018).
  4. J. Pan, S. Bhasin, F. Zhang, K. Ren, "One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis," In DATE 2019, March 2019. (CCF-B, Top conferences in EDA).
  5. F. Zhang*, Z. Liang, B. Yang, X. Zhao, S. Guo, K. Ren, "Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition," Frontiers of Information Technology & Electronic Engineering., Vol.19, No.12, pp.1475-1499, 2018. [PDF]
  6. J. T. Ning, J. Xu*, K. T. Liang, F. Zhang, E. -C. Chang, "Passive Attacks Against Searchable Encryption," IEEE Transactions on Information Forensics & Security, Vol.13, Issue.3, pp.789-802, 2019. [PDF]  (CCF-A, IF=4.332).
  7. J. Shen*, L. Geng, F. Zhang, "Dynamic current logic based flip-flop design for robust and low power security ICs," Electronics Letters, Vol.53, No.18, pp.1236-1238, 2017. [PDF] (ZJU TOP)
  8. F. Zhang, X. Zhao, W. He*, S. Bhasin, S. Guo, "Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers," SCIENCE CHINA Information Sciences, 2017, 60:048102. [PDF]
  9. F. Zhang*, S. Guo, X. Zhao, T. Wang, J. Yang, F. -X. Standaert, D. Gu "A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers," IEEE Transactions on Information Forensics & Security, Vol.11, No.5, pp.1039-1054, 2016.  (CCF-A, IF=4.332[PDF]
  10. S. Guo, X. Zhao, F. Zhang*, T. Wang, Z. Shi, F. -X Standaert, "Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack against the AES and its Application to Microcontroller Implementations," IEEE Transactions on Information Forensics & Security, Vol.9, No.6, pp.999-1014, 2014. (CCF-A, IF=4.332[PDF]
  11. X. Zhao, S. Guo, F. Zhang*, T. Wang, Z. Shi, Z. Liu, J. Gallais, "A Comprehensive Study of Multiple Deductions-based Algebraic Trace Driven Cache Attacks on AES," Computers & Security, Vol.39: 173-189, 2013. [PDF]
  12. X. Zhao, S. Guo, F. Zhang*, T. Wang, Z. Shi, H. Liu, K, Ji, J. Huang. "Efficient Hamming Weight based Side-Channel Cube Attacks on PRESENT," The Journal of Systems and Software, Vol. 86, Issue 3, pp. 728-743, 2013. [PDF]
  13. X. Zhao, F. Zhang, T. Wang, S. Guo, Z. Shi, H. Liu, K. Ji. "MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation," In COSADE 2012, LNCS, vol. 7275, pp. 231-248, 2012.  [PDF] (Best Paper Award)
  14. S. Wang, F. Zhang, J. Dai, Z. Shi, L, Wang, "Making Register File Resistant to Power Analysis Attacks," In ICCD 2008, pp. 577-582, October 2008. [PDF]




























































 

最后一次更新时间:
版权所有©2019: 张帆