default search action
Zongbin Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j1]Quang Li, Ling Zhao, Xin Yu, Zongbin Liu, Yiqing Zhang:
An Intelligent Sorting Method of Film in Cotton Combining Hyperspectral Imaging and the AlexNet-PCA Algorithm. Sensors 23(16): 7041 (2023) - 2020
- [c30]Liang Zheng, Changting Li, Zongbin Liu, Cunqing Ma:
Boosting Entropy Extraction of PDL-based RO PUF by High-order Difference Method. ACM Great Lakes Symposium on VLSI 2020: 59-64 - [c29]Churan Tang, Pengkun Liu, Cunqing Ma, Zongbin Liu, Jingquan Ge:
Flush+Time: A High Accuracy and High Resolution Cache Attack On ARM-FPGA Embedded SoC. VTS 2020: 1-6
2010 – 2019
- 2019
- [c28]Liang Zheng, Donglei Han, Zongbin Liu, Cunqing Ma, Lingchen Zhang, Churan Tang:
A Low Overhead Error Correction Algorithm Using Random Permutation for SRAM PUFs. ACISP 2019: 475-493 - [c27]Xueyi Yang, Lingchen Zhang, Cunqing Ma, Zongbin Liu, Ping Peng:
Android Control Flow Obfuscation Based on Dynamic Entry Points Modification. CSCS 2019: 296-303 - [c26]Churan Tang, Zongbin Liu, Cunqing Ma, Jingquan Ge, Chenyang Tu:
SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks. ICICS 2019: 251-268 - [c25]Pengcheng Zhang, Zongbin Liu, Cunqing Ma, Lingchen Zhang, Donglei Han:
KPaM: A Key Protection Framework for Mobile Devices Based on Two-party Computation. ISCC 2019: 1-6 - 2018
- [c24]Liang Zheng, Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma:
Implementation of High Throughput XTS-SM4 Module for Data Storage Devices. SecureComm (2) 2018: 271-290 - 2017
- [c23]Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng:
A Plausibly Deniable Encryption Scheme Utilizing PUF's Thermo-Sensitivity. ICICS 2017: 105-117 - [c22]Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng:
A PUF and Software Collaborative Key Protection Scheme. ICICS 2017: 291-303 - 2016
- [c21]Zongbin Liu, Qinglong Zhang, Cunqing Ma, Changting Li, Jiwu Jing:
HPAZ: A high-throughput pipeline architecture of ZUC in hardware. DATE 2016: 269-272 - [c20]Yuan Ma, Qinglong Zhang, Zongbin Liu, Chenyang Tu, Jingqiang Lin:
Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields. ICICS 2016: 292-306 - [c19]Xin Wang, Neng Gao, Lingchen Zhang, Zongbin Liu, Lei Wang:
Novel MITM Attacks on Security Protocols in SDN: A Feasibility Study. ICICS 2016: 455-465 - [c18]Zeyi Liu, Neng Gao, Chenyang Tu, Yuan Ma, Zongbin Liu:
Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks. SAC 2016: 41-57 - [c17]Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Lingchen Zhang:
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs. SecureComm 2016: 675-693 - 2015
- [c16]Chenyang Tu, Jian Zhou, Neng Gao, Zeyi Liu, Yuan Ma, Zongbin Liu:
QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations. ICICS 2015: 184-198 - [c15]Qinglong Zhang, Zongbin Liu, Cunqing Ma, Jiwu Jing:
Bit Error Probability Evaluation of RO PUFs. ISC 2015: 421-436 - [c14]Qinglong Zhang, Zongbin Liu, Cunqing Ma, Jiwu Jing:
Bit Error Probability Evaluation of Ring Oscillator PUF (Short Paper). IWSEC 2015: 347-356 - [i3]Chenyang Tu, Neng Gao, Zeyi Liu, Lei Wang, Zongbin Liu, Bingke Ma:
A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia. IACR Cryptol. ePrint Arch. 2015: 174 (2015) - [i2]Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Jiwu Jing:
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs. IACR Cryptol. ePrint Arch. 2015: 545 (2015) - 2014
- [c13]Qinglong Zhang, Zongbin Liu, Miao Li, Ji Xiang, Jiwu Jing:
A High-Throughput Unrolled ZUC Core for 100Gbps Data Transmission. ACISP 2014: 370-385 - [c12]Yuan Ma, Jingqiang Lin, Tianyu Chen, Changwei Xu, Zongbin Liu, Jiwu Jing:
Entropy Evaluation for Oscillator-Based True Random Number Generators. CHES 2014: 544-561 - [c11]Ming Shang, Qinglong Zhang, Zongbin Liu, Ji Xiang, Jiwu Jing:
An Ultra-Compact Hardware Implementation of SMS4. IIAI-AAI 2014: 86-90 - [c10]Qinglong Zhang, Zongbin Liu, Quanwei Cai, Ji Xiang:
TST: A New Randomness Test Method Based on Coupon Collector's Problem. SecureComm (1) 2014: 362-373 - 2013
- [c9]Yuan Ma, Zongbin Liu, Wuqiong Pan, Jiwu Jing:
A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over \mathrm p. Selected Areas in Cryptography 2013: 421-437 - [c8]Miao Li, Liangsheng He, Tongjie Yang, Neng Gao, Zongbin Liu, Qinglong Zhang:
An Efficient Reconfigurable II-ONB Modular Multiplier. SecureComm 2013: 169-181 - [c7]Pingjian Wang, Zongbin Liu, Lei Wang, Neng Gao:
High Radix Montgomery Modular Multiplier on Modern FPGA. TrustCom/ISPA/IUCC 2013: 1484-1489 - [i1]Zongbin Liu, Neng Gao, Jiwu Jing, Peng Liu:
HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware. IACR Cryptol. ePrint Arch. 2013: 461 (2013) - 2012
- [c6]Yuan Ma, Luning Xia, Jingqiang Lin, Jiwu Jing, Zongbin Liu, Xingjie Yu:
Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA. ICICS 2012: 105-118 - [c5]Lingchen Zhang, Luning Xia, Zongbin Liu, Jiwu Jing, Yuan Ma:
Evaluating the Optimized Implementations of SNOW3G and ZUC on FPGA. TrustCom 2012: 436-442 - 2011
- [c4]Wuqiong Pan, Jiwu Jing, Luning Xia, Zongbin Liu, Meng Yu:
An Efficient RSA Implementation without Precomputation. Inscrypt 2011: 251-268 - [c3]Lei Wang, Jiwu Jing, Zongbin Liu, Lingchen Zhang, Wuqiong Pan:
Evaluating Optimized Implementations of Stream Cipher ZUC Algorithm on FPGA. ICICS 2011: 202-215 - [c2]Zongbin Liu, Luning Xia, Jiwu Jing, Peng Liu:
A Tiny RSA Coprocessor based on Optimized Systolic Montgomery Architecture. SECRYPT 2011: 105-113 - 2010
- [c1]Zongbin Liu, Jiwu Jing, Peng Liu:
Rate-Based Watermark Traceback: A New Approach. ISPEC 2010: 172-186
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint