Welcome to Fan (Terry) Zhang's Homepage

College of Information Science & Electronic Engineering
Zhejiang University
Home News Publication Research Teaching Information Students 中文 英文
Publication (Selected)
Publication (Full List)
Books








    Other Links :

ZJU
UCONN
SALUC






 
Selected Publications

For the full list, please check here.

  1. F. Zhang, B. Shao, W. Gu, "Artificial Intelligence with Side Channle Analysis," (人工智能之于旁路分析) in Communications of the CCF, Vol.15, Issue.7, Editors: K. Ren, (Eds.), July 2019.[PDF]
  2. Y. Chen, C. Poskitt, J. Sun, S. Adepu, F. Zhang*, "Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences," In ASE 2019, Nov 2019.  [PDF] (CCF-A, AR=21%, 93/455)
  3. F. Zhang*, X. Lou, X. Zhao, S. Bhasin, W. He, R. Ding, S. Qureshi, K. Ren, "Persistent Fault Analysis on Block Ciphers," IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 3, pp.150-172, 2018. [PDF] [Video] [PPT] (CCF-B, the same paper won Best Paper Award in ChinaCrypt 2018).
  4. J. Pan, S. Bhasin, F. Zhang, K. Ren, "One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis," In DATE 2019, March 2019. (CCF-B, Top conferences in EDA).
  5. F. Zhang*, Z. Liang, B. Yang, X. Zhao, S. Guo, K. Ren, "Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition," Frontiers of Information Technology & Electronic Engineering., Vol.19, No.12, pp.1475-1499, 2018. [PDF]
  6. J. T. Ning, J. Xu*, K. T. Liang, F. Zhang, E. -C. Chang, "Passive Attacks Against Searchable Encryption," IEEE Transactions on Information Forensics & Security, Vol.13, Issue.3, pp.789-802, 2019. [PDF]  (CCF-A, IF=4.332).
  7. J. Shen*, L. Geng, F. Zhang, "Dynamic current logic based flip-flop design for robust and low power security ICs," Electronics Letters, Vol.53, No.18, pp.1236-1238, 2017. [PDF] (ZJU TOP)
  8. F. Zhang, X. Zhao, W. He*, S. Bhasin, S. Guo, "Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers," SCIENCE CHINA Information Sciences, 2017, 60:048102. [PDF]
  9. F. Zhang*, S. Guo, X. Zhao, T. Wang, J. Yang, F. -X. Standaert, D. Gu "A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers," IEEE Transactions on Information Forensics & Security, Vol.11, No.5, pp.1039-1054, 2016.  (CCF-A, IF=4.332[PDF]
  10. S. Guo, X. Zhao, F. Zhang*, T. Wang, Z. Shi, F. -X Standaert, "Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack against the AES and its Application to Microcontroller Implementations," IEEE Transactions on Information Forensics & Security, Vol.9, No.6, pp.999-1014, 2014. (CCF-A, IF=4.332[PDF]
  11. X. Zhao, S. Guo, F. Zhang*, T. Wang, Z. Shi, Z. Liu, J. Gallais, "A Comprehensive Study of Multiple Deductions-based Algebraic Trace Driven Cache Attacks on AES," Computers & Security, Vol.39: 173-189, 2013. [PDF]
  12. X. Zhao, S. Guo, F. Zhang*, T. Wang, Z. Shi, H. Liu, K, Ji, J. Huang. "Efficient Hamming Weight based Side-Channel Cube Attacks on PRESENT," The Journal of Systems and Software, Vol. 86, Issue 3, pp. 728-743, 2013. [PDF]
  13. X. Zhao, F. Zhang, T. Wang, S. Guo, Z. Shi, H. Liu, K. Ji. "MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation," In COSADE 2012, LNCS, vol. 7275, pp. 231-248, 2012.  [PDF] (Best Paper Award)
  14. S. Wang, F. Zhang, J. Dai, Z. Shi, L, Wang, "Making Register File Resistant to Power Analysis Attacks," In ICCD 2008, pp. 577-582, October 2008. [PDF]




























































 

Last updated date:
Copyright©2019: Fan (Terry) Zhang