default search action
Jingqiang Lin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, Jingqiang Lin:
ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 25-63 (2024) - [j31]Mingyu Wang, Fangyu Zheng, Jingqiang Lin, Fangjie Jiang, Yuan Ma:
ZeroShield: Transparently Mitigating Code Page Sharing Attacks With Zero-Cost Stand-By. IEEE Trans. Inf. Forensics Secur. 19: 7389-7403 (2024) - [j30]Jiankuo Dong, Yusheng Fu, Xusheng Qin, Zhenjiang Dong, Fu Xiao, Jingqiang Lin:
ECO-BIKE: Bridging the Gap Between PQC BIKE and GPU Acceleration. IEEE Trans. Inf. Forensics Secur. 19: 8952-8965 (2024) - [c117]Wenxu Tang, Fangyu Zheng, Guang Fan, Tian Zhou, Jingqiang Lin, Jiwu Jing:
DPad-HE: Towards Hardware-friendly Homomorphic Evaluation using 4-Directional Manipulation. CCS 2024: 2475-2489 - [c116]Yuexi Zhang, Bingyu Li, Jingqiang Lin, Linghui Li, Jiaju Bai, Shijie Jia, Qianhong Wu:
Gopher: High-Precision and Deep-Dive Detection of Cryptographic API Misuse in the Go Ecosystem. CCS 2024: 2978-2992 - [c115]Mingyu Wang, Lingjia Meng, Fangyu Zheng, Jingqiang Lin, Shijie Jia, Yuan Ma, Haoling Fan:
TLTracer: Dynamically Detecting Cache Side Channel Attacks with a Timing Loop Tracer. ICC 2024: 109-114 - [c114]Aozhuo Sun, Jingqiang Lin, Wei Wang, Zeyan Liu, Bingyu Li, Shushang Wen, Qiongxiao Wang, Fengjun Li:
Certificate Transparency Revisited: The Public Inspections on Third-party Monitors. NDSS 2024 - [c113]Mingyu Wang, Shijie Jia, Fangyu Zheng, Yuan Ma, Jingqiang Lin, Lingjia Meng, Ziqiang Ma:
TF-Timer: Mitigating Cache Side-Channel Attacks in Cloud through a Targeted Fuzzy Timer. WCNC 2024: 1-6 - [i13]Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, Jingqiang Lin:
ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches. IACR Cryptol. ePrint Arch. 2024: 95 (2024) - [i12]Yijing Ning, Jiankuo Dong, Jingqiang Lin, Fangyu Zheng, Yu Fu, Zhenjiang Dong, Fu Xiao:
GRASP: Accelerating Hash-based PQC Performance on GPU Parallel Architecture. IACR Cryptol. ePrint Arch. 2024: 1030 (2024) - [i11]Xinyi Ji, Jiankuo Dong, Junhao Huang, Zhijian Yuan, Wangchen Dai, Fu Xiao, Jingqiang Lin:
ECO-CRYSTALS: Efficient Cryptography CRYSTALS on Standard RISC-V ISA. IACR Cryptol. ePrint Arch. 2024: 1198 (2024) - [i10]Fuyuan Chen, Jiankuo Dong, Xiaoyu Hu, Zhenjiang Dong, Wangchen Dai, Jingqiang Lin, Fu Xiao:
HI-CKKS: Is High-Throughput Neglected? Reimagining CKKS Efficiency with Parallelism. IACR Cryptol. ePrint Arch. 2024: 1976 (2024) - 2023
- [j29]Tianyu Chen, Shijie Jia, Yuan Ma, Yuan Cao, Na Lv, Wei Wang, Jing Yang, Jingqiang Lin:
A Design of High-Efficiency Coherent Sampling Based TRNG With On-Chip Entropy Assurance. IEEE Trans. Circuits Syst. I Regul. Pap. 70(12): 5060-5073 (2023) - [j28]Yu Fu, Jingqiang Lin, Dengguo Feng, Wei Wang, Mingyu Wang, Wenjie Wang:
RegKey: A Register-based Implementation of ECC Signature Algorithms Against One-shot Memory Disclosure. ACM Trans. Embed. Comput. Syst. 22(6): 97:1-97:22 (2023) - [j27]Jiankuo Dong, Pinchang Zhang, Kaisheng Sun, Fu Xiao, Fangyu Zheng, Jingqiang Lin:
EG-Four$\mathbb {Q}$: An Embedded GPU-Based Efficient ECC Cryptography Accelerator for Edge Computing. IEEE Trans. Ind. Informatics 19(6): 7291-7300 (2023) - [j26]Ruixuan Li, Xiaofeng Jia, Zhenyong Zhang, Jun Shao, Rongxing Lu, Jingqiang Lin, Xiaoqi Jia, Guiyi Wei:
A Longitudinal and Comprehensive Measurement of DNS Strict Privacy. IEEE/ACM Trans. Netw. 31(6): 2793-2808 (2023) - [c112]Qingguan Gao, Kaisheng Sun, Jiankuo Dong, Fangyu Zheng, Jingqiang Lin, Yongjun Ren, Zhe Liu:
V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture. Inscrypt (2) 2023: 130-149 - [c111]Yajun Teng, Wei Wang, Jun Shao, Huiqing Wan, Heqing Huang, Yong Liu, Jingqiang Lin:
Curveball+: Exploring Curveball-Like Vulnerabilities of Implicit Certificate Validation. ESORICS (2) 2023: 212-234 - [c110]Bowen Xu, Shijie Jia, Jingqiang Lin, Fangyu Zheng, Yuan Ma, Limin Liu, Xiaozhuo Gu, Li Song:
JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications. ESORICS (3) 2023: 263-282 - [c109]Wenjie Wang, Wei Wang, Jingqiang Lin, Lina Shang, Fan Lang, Dingfeng Ye:
Fast and Parallel Modular Multiplication without Borrow for ECC on ARM-NEON. ICC 2023: 4552-4557 - [c108]Huiqing Wan, Qiongxiao Wang, Yajun Teng, Cunqing Ma, Jingqiang Lin, Mingyu Wang:
ImCT: A Feasible Scheme for Deploying Implicit Certificates with Certificate Transparency in IoT. ICCCN 2023: 1-10 - [c107]Guang Fan, Fangyu Zheng, Lipeng Wan, Lili Gao, Yuan Zhao, Jiankuo Dong, Yixuan Song, Yuewu Wang, Jingqiang Lin:
Towards Faster Fully Homomorphic Encryption Implementation with Integer and Floating-point Computing Power of GPUs. IPDPS 2023: 798-808 - [c106]Aozhuo Sun, Bingyu Li, Qiongxiao Wang, Huiqing Wan, Jingqiang Lin, Wei Wang:
Semi-CT: Certificates Transparent to Identity Owners but Opaque to Snoopers. ISCC 2023: 1207-1213 - [c105]Huiqing Wan, Qiongxiao Wang, Cunqing Ma, Yajun Teng, Jingqiang Lin, Dingfeng Ye:
ESCORT: Efficient Status Check and Revocation Transparency for Linkage-Based Pseudonym Certificates in VANETs. ISCC 2023: 1340-1343 - [c104]Lingjia Meng, Yu Fu, Fangyu Zheng, Ziqiang Ma, Mingyu Wang, Dingfeng Ye, Jingqiang Lin:
Protecting Private Keys of Dilithium Using Hardware Transactional Memory. ISC 2023: 288-306 - [c103]Guangqi Liu, Jingqiang Lin, Dawei Chu, Xiaokun Zhang, Qiongxiao Wang, Cunqing Ma, Fengjun Li, Dingfeng Ye:
Enhanced Ticket Transparency (eTT) Framework for Single Sign-On Services with Pseudonyms. TrustCom 2023: 730-739 - [c102]Haoling Fan, Fangyu Zheng, Jingqiang Lin, Lingjia Meng, Mingyu Wang, Qiang Wang, Shijie Jia, Yuan Ma:
Hydamc: A Hybrid Detection Approach for Misuse of Cryptographic Algorithms in Closed-Source Software. TrustCom 2023: 796-803 - [c101]Guangqi Liu, Qiongxiao Wang, Cunqing Ma, Jingqiang Lin, Yanduo Fu, Bingyu Li, Dingfeng Ye:
The Broken Verifying: Inspections at Verification Tools for Windows Code-Signing Signatures. TrustCom 2023: 804-813 - [e4]Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel O. Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Yu Zhang, Yury Zhauniarovich:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9 [contents] - 2022
- [j25]Jiankuo Dong, Guang Fan, Fangyu Zheng, Tianyu Mao, Fu Xiao, Jingqiang Lin:
TEGRAS: An Efficient Tegra Embedded GPU-Based RSA Acceleration Server. IEEE Internet Things J. 9(18): 16850-16861 (2022) - [j24]Ze Wang, Jingqiang Lin, Quanwei Cai, Qiongxiao Wang, Daren Zha, Jiwu Jing:
Blockchain-Based Certificate Transparency and Revocation Transparency. IEEE Trans. Dependable Secur. Comput. 19(1): 681-697 (2022) - [j23]Jiankuo Dong, Fangyu Zheng, Jingqiang Lin, Zhe Liu, Fu Xiao, Guang Fan:
EC-ECC: Accelerating Elliptic Curve Cryptography for Edge Computing on Embedded GPU TX2. ACM Trans. Embed. Comput. Syst. 21(2): 16:1-16:25 (2022) - [j22]Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Wei Wang, Qi Li, Guangshen Cheng, Jiwu Jing, Congli Wang:
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild. IEEE/ACM Trans. Netw. 30(2): 749-765 (2022) - [c100]Wenqing Li, Shijie Jia, Limin Liu, Fangyu Zheng, Yuan Ma, Jingqiang Lin:
CryptoGo: Automatic Detection of Go Cryptographic API Misuses. ACSAC 2022: 318-331 - [c99]Fan Lang, Wei Wang, Lingjia Meng, Jingqiang Lin, Qiongxiao Wang, Linli Lu:
MoLE: Mitigation of Side-channel Attacks against SGX via Dynamic Data Location Escape. ACSAC 2022: 978-988 - [c98]Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo:
Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems. ESORICS (3) 2022: 343-363 - [c97]Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao, Yuewu Wang, Jingqiang Lin, Jiankuo Dong:
A Novel High-Performance Implementation of CRYSTALS-Kyber with AI Accelerator. ESORICS (3) 2022: 514-534 - [c96]Xin Xu, Wei Wang, Jingqiang Lin, Zhen Yang, Haoling Fan, Qiongxiao Wang:
LiTIV: A Lightweight Traceable Data Integrity Verification Scheme for Version Control Systems. ICCCN 2022: 1-10 - [c95]Wenqiang Li, Jiameng Shi, Fengjun Li, Jingqiang Lin, Wei Wang, Le Guan:
$\mu AFL$: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware. ICSE 2022: 1-12 - [c94]Ziqiang Ma, Shuaigang Li, Jingqiang Lin, Quanwei Cai, Shuqin Fan, Fan Zhang, Bo Luo:
Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature. SecureComm 2022: 111-129 - [c93]Juanjuan Guo, Mengjie Shuai, Qiongxiao Wang, Wenyuan Li, Jingqiang Lin:
Replicated Additive Secret Sharing with the Optimized Number of Shares. SecureComm 2022: 371-389 - [c92]Li Song, Qiongxiao Wang, Shijie Jia, Jingqiang Lin, Linli Lu, Yanduo Fu:
You Cannot Fully Trust Your Device: An Empirical Study of Client-Side Certificate Validation in WPA2-Enterprise Networks. TrustCom 2022: 266-273 - [c91]Yaxi He, Wei Wang, Yajun Teng, Qiongxiao Wang, Mingyue Wang, Jingqiang Lin:
ABLE: Zero-effort Two-factor Authentication Exploiting BLE Co-location. WCNC 2022: 992-997 - [c90]Li Song, Qiongxiao Wang, Jingqiang Lin, Shijie Jia, Yingjiu Li, Yikai Chen:
Approach then connect: A Physical Location-based Wi-Fi Password Dynamic Update Scheme. WCNC 2022: 1010-1015 - [e3]Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, Sudipta Chattopadhyay, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Weizhi Meng, Stjepan Picek, Jun Shao, Chunhua Su, Cong Wang, Yury Zhauniarovich, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7 [contents] - [i9]Wenqiang Li, Jiameng Shi, Fengjun Li, Jingqiang Lin, Wei Wang, Le Guan:
μAFL: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware. CoRR abs/2202.03013 (2022) - [i8]Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo:
Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems. CoRR abs/2205.15944 (2022) - [i7]Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao, Jiankuo Dong, Jingqiang Lin, Yuewu Wang:
A Novel High-performance Implementation of CRYSTALS-Kyber with AI Accelerator. IACR Cryptol. ePrint Arch. 2022: 881 (2022) - 2021
- [j21]Zhaohui Chen, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing:
High-performance area-efficient polynomial ring processor for CRYSTALS-Kyber on FPGAs. Integr. 78: 25-35 (2021) - [j20]Mingwu Zhang, Yu Chen, Jingqiang Lin:
A Privacy-Preserving Optimization of Neighborhood-Based Recommendation for Medical-Aided Diagnosis and Treatment. IEEE Internet Things J. 8(13): 10830-10842 (2021) - [j19]Tianyu Chen, Yuan Ma, Jingqiang Lin, Yuan Cao, Na Lv, Jiwu Jing:
A Lightweight Full Entropy TRNG With On-Chip Entropy Assurance. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(12): 2431-2444 (2021) - [j18]Congwu Li, Le Guan, Jingqiang Lin, Bo Luo, Quanwei Cai, Jiwu Jing, Jing Wang:
Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory. IEEE Trans. Dependable Secur. Comput. 18(3): 1196-1213 (2021) - [j17]Bingyu Li, Jingqiang Lin, Qiongxiao Wang, Ze Wang, Jiwu Jing:
Locally-Centralized Certificate Validation and its Application in Desktop Virtualization Systems. IEEE Trans. Inf. Forensics Secur. 16: 1380-1395 (2021) - [j16]Lili Gao, Fangyu Zheng, Rong Wei, Jiankuo Dong, Niall Emmart, Yuan Ma, Jingqiang Lin, Charles C. Weems:
DPF-ECC: A Framework for Efficient ECC With Double Precision Floating-Point Computing Power. IEEE Trans. Inf. Forensics Secur. 16: 3988-4002 (2021) - [c89]Rong Wei, Fangyu Zheng, Lili Gao, Jiankuo Dong, Guang Fan, Lipeng Wan, Jingqiang Lin, Yuewu Wang:
Heterogeneous-PAKE: Bridging the Gap between PAKE Protocols and Their Real-World Deployment. ACSAC 2021: 76-90 - [c88]Wenyuan Li, Wei Wang, Jingqiang Lin, Qiongxiao Wang, Wenjie Wang:
Privacy Preserving OpenPGP Public Key Distribution with Spamming Resistance. Inscrypt 2021: 487-506 - [c87]Wenjie Wang, Wei Wang, Jingqiang Lin, Yu Fu, Lingjia Meng, Qiongxiao Wang:
SMCOS: Fast and Parallel Modular Multiplication on ARM NEON Architecture for ECC. Inscrypt 2021: 531-550 - [c86]Wanling Huang, Jingqiang Lin, Qiongxiao Wang, Yajun Teng, Huiqing Wan, Wei Wang:
Certificate Transparency for ECQV Implicit Certificates. ICC 2021: 1-6 - [c85]Yu Fu, Wei Wang, Lingjia Meng, Qiongxiao Wang, Yuan Zhao, Jingqiang Lin:
VIRSA: Vectorized In-Register RSA Computation with Memory Disclosure Resistance. ICICS (1) 2021: 293-309 - [c84]Fan Lang, Wei Wang, Lingjia Meng, Qiongxiao Wang, Jingqiang Lin, Li Song:
Informer: Protecting Intel SGX from Cross-Core Side Channel Threats. ICICS (1) 2021: 310-328 - [c83]Yanduo Fu, Qiongxiao Wang, Jingqiang Lin, Aozhuo Sun, Linli Lu:
Exploring the Security Issues of Trusted CA Certificate Management. ICICS (1) 2021: 384-401 - [c82]Wenyi Ouyang, Qiongxiao Wang, Wei Wang, Jingqiang Lin, Yaxi He:
SCB: Flexible and Efficient Asymmetric Computations Utilizing Symmetric Cryptosystems Implemented with Intel SGX. IPCCC 2021: 1-8 - [c81]Wenqiang Li, Le Guan, Jingqiang Lin, Jiameng Shi, Fengjun Li:
From Library Portability to Para-rehosting: Natively Executing Microcontroller Software on Commodity Hardware. NDSS 2021 - [c80]Lipeng Wan, Fangyu Zheng, Jingqiang Lin:
TESLAC: Accelerating Lattice-Based Cryptography with AI Accelerator. SecureComm (1) 2021: 249-269 - [c79]Guang Fan, Fangyu Zheng, Jiankuo Dong, Jingqiang Lin, Lili Gao, Rong Wei, Lipeng Wan:
SECCEG: A Secure and Efficient Cryptographic Co-processor Based on Embedded GPU System. WASA (2) 2021: 107-122 - [c78]Jiankuo Dong, Guang Fan, Fangyu Zheng, Jingqiang Lin, Fu Xiao:
TX-RSA: A High Performance RSA Implementation Scheme on NVIDIA Tegra X2. WASA (2) 2021: 210-222 - [e2]Jianying Zhou, Chuadhry Mujeeb Ahmed, Lejla Batina, Sudipta Chattopadhyay, Olga Gadyatskaya, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Mihalis Maniatakos, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Masaki Shimaoka, Chunhua Su, Cong Wang:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5 [contents] - [i6]Wenqiang Li, Le Guan, Jingqiang Lin, Jiameng Shi, Fengjun Li:
From Library Portability to Para-rehosting: Natively Executing Microcontroller Software on Commodity Hardware. CoRR abs/2107.12867 (2021) - [i5]Chengqian Guo, Jingqiang Lin, Quanwei Cai, Fengjun Li, Qiongxiao Wang, Jiwu Jing, Bin Zhao, Wei Wang:
UPPRESSO: Untraceable and Unlinkable Privacy-PREserving Single Sign-On Services. CoRR abs/2110.10396 (2021) - 2020
- [j15]Na Lv, Tianyu Chen, Shuangyi Zhu, Jing Yang, Yuan Ma, Jiwu Jing, Jingqiang Lin:
Erratum to "High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators". Secur. Commun. Networks 2020: 3451823:1-3451823:1 (2020) - [j14]Na Lv, Tianyu Chen, Shuangyi Zhu, Jing Yang, Yuan Ma, Jiwu Jing, Jingqiang Lin:
High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators. Secur. Commun. Networks 2020: 4241713:1-4241713:18 (2020) - [j13]Shuangyi Zhu, Yuan Ma, Xusheng Li, Jing Yang, Jingqiang Lin, Jiwu Jing:
On the Analysis and Improvement of Min-Entropy Estimation on Time-Varying Data. IEEE Trans. Inf. Forensics Secur. 15: 1696-1708 (2020) - [c77]Zhaohui Chen, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing:
Towards Efficient Kyber on FPGAs: A Processor for Vector of Polynomials. ASP-DAC 2020: 247-252 - [c76]Fan Lang, Huorong Li, Wei Wang, Jingqiang Lin, Fengwei Zhang, Wuqiong Pan, Qiongxiao Wang:
E-SGX: Effective Cache Side-Channel Protection for Intel SGX on Untrusted OS. Inscrypt 2020: 221-243 - [c75]Tianlin Song, Wei Wang, Fan Lang, Wenyi Ouyang, Qiongxiao Wang, Jingqiang Lin:
P2A: Privacy Preserving Anonymous Authentication Based on Blockchain and SGX. Inscrypt 2020: 257-276 - [c74]Abdulmalik Humayed, Fengjun Li, Jingqiang Lin, Bo Luo:
CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks. ESORICS (1) 2020: 153-173 - [c73]Tianlin Song, Jingqiang Lin, Wei Wang, Quanwei Cai:
Traceable Revocable Anonymous Registration Scheme with Zero-knowledge Proof on Blockchain. ICC 2020: 1-7 - [c72]Yang Zhang, Dongzheng Jia, Shijie Jia, Limin Liu, Jingqiang Lin:
Splitter: An Efficient Scheme to Determine the Geolocation of Cloud Data Publicly. ICCCN 2020: 1-11 - [c71]Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Guang Fan, Jiankuo Dong:
SEGIVE: A Practical Framework of Secure GPU Execution in Virtualization Environment. IPCCC 2020: 1-10 - [c70]Lili Gao, Fangyu Zheng, Niall Emmart, Jiankuo Dong, Jingqiang Lin, Charles C. Weems:
DPF-ECC: Accelerating Elliptic Curve Cryptography with Floating-Point Computing Power of GPUs. IPDPS 2020: 494-504 - [c69]Dongzheng Jia, Yang Zhang, Shijie Jia, Limin Liu, Jingqiang Lin:
DPVGeo: Delay-based Public Verification of Cloud Data Geolocation. ISCC 2020: 1-7 - [c68]Li Zhu, Pingjian Wang, Xiaozhuo Gu, Yuewu Wang, Jingqiang Lin:
PIV4DB: Probabilistic Integrity Verification for Cloud Database. ISCC 2020: 1-7 - [c67]Chengqian Guo, Quanwei Cai, Qiongxiao Wang, Jingqiang Lin:
Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR Codes. TrustCom 2020: 518-529 - [e1]Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man Ho Au, Lejla Batina, Zhou Li, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Weizhi Meng, Martín Ochoa, Stjepan Picek, Georgios Portokalidis, Cong Wang, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents]
2010 – 2019
- 2019
- [j12]Ziqiang Ma, Quanwei Cai, Jingqiang Lin, Bo Luo, Jiwu Jing:
Towards the optimal performance of integrating Warm and Delay against remote cache timing side channels on block ciphers. J. Comput. Secur. 27(5): 547-580 (2019) - [j11]Yuan Ma, Tianyu Chen, Jingqiang Lin, Jing Yang, Jiwu Jing:
Entropy Estimation for ADC Sampling-Based True Random Number Generators. IEEE Trans. Inf. Forensics Secur. 14(11): 2887-2900 (2019) - [c66]Fangjie Jiang, Quanwei Cai, Jingqiang Lin, Bo Luo, Le Guan, Ziqiang Ma:
TF-BIV: transparent and fine-grained binary integrity verification in the cloud. ACSAC 2019: 57-69 - [c65]Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jing, Congli Wang:
Certificate Transparency in the Wild: Exploring the Reliability of Monitors. CCS 2019: 2505-2520 - [c64]Kai Wang, Fengkai Yuan, Rui Hou, Jingqiang Lin, Zhenzhou Ji, Dan Meng:
CacheGuard: a security-enhanced directory architecture against continuous attacks. CF 2019: 32-41 - [c63]Bingyu Li, Wei Wang, Lingjia Meng, Jingqiang Lin, Xuezhong Liu, Congli Wang:
Elaphurus: Ensemble Defense Against Fraudulent Certificates in TLS. Inscrypt 2019: 246-259 - [c62]Ziqiang Ma, Quanwei Cai, Jingqiang Lin, Jiwu Jing, Dingfeng Ye, Lingjia Meng:
Evaluating the Cache Side Channel Attacks Against ECDSA. Inscrypt 2019: 325-345 - [c61]Xuhua Bao, Xiaokun Zhang, Jingqiang Lin, Dawei Chu, Qiongxiao Wang, Fengjun Li:
Towards the Trust-Enhancements of Single Sign-On Services. DSC 2019: 1-8 - [c60]Dawei Chu, Kaijie Zhu, Quanwei Cai, Jingqiang Lin, Fengjun Li, Le Guan, Lingchen Zhang:
Secure Cryptography Infrastructures in the Cloud. GLOBECOM 2019: 1-7 - [c59]Maomao Fu, Xiaozhuo Gu, Wenhao Dai, Jingqiang Lin, Han Wang:
Secure Multi-receiver Communications: Models, Proofs, and Implementation. ICA3PP (1) 2019: 689-709 - [c58]Congli Wang, Jingqiang Lin, Bingyu Li, Qi Li, Qiongxiao Wang, Xiaokun Zhang:
Analyzing the Browser Security Warnings on HTTPS Errors. ICC 2019: 1-6 - [c57]Xin Xu, Quanwei Cai, Jingqiang Lin, Shiran Pan, Liangqin Ren:
Enforcing Access Control in Distributed Version Control Systems. ICME 2019: 772-777 - [c56]Dongzheng Jia, Limin Liu, Shijie Jia, Jingqiang Lin:
VoteGeo: An IoT-based Voting Approach to Verify the Geographic Location of Cloud Hosts. IPCCC 2019: 1-9 - [c55]Jinxia Fang, Limin Liu, Jingqiang Lin:
Practical Verification of Data Encryption for Cloud Storage Services. SCC 2019: 16-31 - [c54]Xinying Wu, Yuan Ma, Jing Yang, Tianyu Chen, Jingqiang Lin:
On the Security of TRNGs Based on Multiple Ring Oscillators. SecureComm (2) 2019: 89-107 - [c53]Dawei Chu, Jingqiang Lin, Fengjun Li, Xiaokun Zhang, Qiongxiao Wang, Guangqi Liu:
Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs. SecureComm (1) 2019: 511-531 - [c52]Bingyu Li, Dawei Chu, Jingqiang Lin, Quanwei Cai, Congli Wang, Lingjia Meng:
The Weakest Link of Certificate Transparency: Exploring the TLS/HTTPS Configurations of Third-Party Monitors. TrustCom/BigDataSE 2019: 216-223 - [c51]Le Guan, Chen Cao, Sencun Zhu, Jingqiang Lin, Peng Liu, Yubin Xia, Bo Luo:
Protecting mobile devices from physical memory attacks with targeted encryption. WiSec 2019: 34-44 - 2018
- [j10]Le Guan, Jingqiang Lin, Ziqiang Ma, Bo Luo, Luning Xia, Jiwu Jing:
Copker: A Cryptographic Engine Against Cold-Boot Attacks. IEEE Trans. Dependable Secur. Comput. 15(5): 742-754 (2018) - [c50]Yafei Ji, Luning Xia, Jingqiang Lin, Qiongxiao Wang, Lingguang Lei, Li Song:
Chord: Thwarting Relay Attacks Among Near Field Communications. Inscrypt 2018: 329-348 - [c49]Jiankuo Dong, Fangyu Zheng, Juanjuan Cheng, Jingqiang Lin, Wuqiong Pan, Ziyang Wang:
Towards High-performance X25519/448 Key Agreement in General Purpose GPUs. CNS 2018: 1-9 - [c48]Ze Wang, Jingqiang Lin, Quanwei Cai, Qiongxiao Wang, Jiwu Jing, Daren Zha:
Blockchain-Based Certificate Transparency and Revocation Transparency. Financial Cryptography Workshops 2018: 144-162 - [c47]Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Jiankuo Dong:
Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation. ICICS 2018: 142-157 - [c46]Huorong Li, Jingqiang Lin, Bingyu Li, Wangzhao Cheng:
PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX. ICICS 2018: 767-777 - [c45]Jiankuo Dong, Fangyu Zheng, Niall Emmart, Jingqiang Lin, Charles C. Weems:
sDPF-RSA: Utilizing Floating-point Computing Power of GPUs for Massive Digital Signature Computations. IPDPS 2018: 599-609 - [c44]Congwu Li, Jingqiang Lin, Quanwei Cai, Bo Luo:
Peapods: OS-Independent Memory Confidentiality for Cryptographic Engines. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 862-869 - [c43]Fangjie Jiang, Quanwei Cai, Le Guan, Jingqiang Lin:
Enforcing Access Controls for the Cryptographic Cloud Service Invocation Based on Virtual Machine Introspection. ISC 2018: 213-230 - [c42]Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo, Peng Liu, Ji Xiang, Wenjing Lou:
CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices. RAID 2018: 380-400 - [c41]Jing Yang, Shuangyi Zhu, Tianyu Chen, Yuan Ma, Na Lv, Jingqiang Lin:
Neural Network Based Min-entropy Estimation for Random Number Generators. SecureComm (2) 2018: 231-250 - [c40]Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li:
Building Your Private Cloud Storage on Public Cloud Service Using Embedded GPUs. SecureComm (1) 2018: 512-528 - 2017
- [j9]Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, Bo Luo:
Cyber-Physical Systems Security - A Survey. IEEE Internet Things J. 4(6): 1802-1831 (2017) - [j8]Jiankuo Dong, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao:
Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration. Secur. Commun. Networks 2017: 3508786:1-3508786:15 (2017) - [j7]Shuangyi Zhu, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing:
Analysis and Improvement of Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources. IACR Trans. Symmetric Cryptol. 2017(3): 151-168 (2017) - [c39]Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, Luning Xia:
Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices. ACSAC 2017: 339-349 - [c38]Yuan Ma, Jingqiang Lin, Jiwu Jing:
On the Entropy of Oscillator-Based True Random Number Generators. CT-RSA 2017: 165-180 - [c37]Huorong Li, Wuqiong Pan, Jingqiang Lin, Wangzhao Cheng, Bingyu Li:
SSUKey: A CPU-Based Solution Protecting Private Keys on Untrusted OS. ICICS 2017: 51-62 - [c36]Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li:
High-Performance Symmetric Cryptography Server with GPU Acceleration. ICICS 2017: 529-540 - [c35]Quanwei Cai, Jonathan Lutes, Jingqiang Lin, Bo Luo:
A-Tor: Accountable Anonymity in Tor. SecureComm 2017: 838-851 - [i4]Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, Bo Luo:
Cyber-Physical Systems Security - A Survey. CoRR abs/1701.04525 (2017) - [i3]Chen Cao, Le Guan, Peng Liu, Neng Gao, Jingqiang Lin, Ji Xiang:
Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices. CoRR abs/1706.05779 (2017) - 2016
- [j6]Jingqiang Lin, Bo Luo, Le Guan, Jiwu Jing:
Secure Computing Using Registers and Caches: The Problem, Challenges, and Solutions. IEEE Secur. Priv. 14(6): 63-70 (2016) - [j5]Wen Tao Zhu, Jingqiang Lin:
Generating Correlated Digital Certificates: Framework and Applications. IEEE Trans. Inf. Forensics Secur. 11(6): 1117-1127 (2016) - [c34]Shuangyi Zhu, Yuan Ma, Jingqiang Lin, Jia Zhuang, Jiwu Jing:
More Powerful and Reliable Second-Level Statistical Randomness Tests for NIST SP 800-22. ASIACRYPT (1) 2016: 307-329 - [c33]Lei Lei, Quanwei Cai, Bo Chen, Jingqiang Lin:
Towards Efficient Re-encryption for Secure Client-Side Deduplication in Public Clouds. ICICS 2016: 71-84 - [c32]Yuan Ma, Qinglong Zhang, Zongbin Liu, Chenyang Tu, Jingqiang Lin:
Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields. ICICS 2016: 292-306 - [c31]Yuan Zhao, Wuqiong Pan, Jingqiang Lin, Peng Liu, Cong Xue, Fangyu Zheng:
PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA. SAC 2016: 482-500 - [c30]Yuan Zhao, Jingqiang Lin, Wuqiong Pan, Cong Xue, Fangyu Zheng, Ziqiang Ma:
RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks. SEC 2016: 293-307 - [c29]Jing Yang, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing:
Extracting More Entropy for TRNGs Based on Coherent Sampling. SecureComm 2016: 694-709 - [i2]Shuangyi Zhu, Yuan Ma, Jingqiang Lin, Jia Zhuang, Jiwu Jing:
More Powerful and Reliable Second-level Statistical Randomness Tests for NIST SP 800-22. IACR Cryptol. ePrint Arch. 2016: 863 (2016) - [i1]Yuan Ma, Jingqiang Lin, Jiwu Jing:
On the Entropy of Oscillator-Based True Random Number Generators. IACR Cryptol. ePrint Arch. 2016: 1091 (2016) - 2015
- [j4]Jingqiang Lin, Wen Tao Zhu, Qiongxiao Wang, Nan Zhang, Jiwu Jing, Neng Gao:
RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility. IET Inf. Secur. 9(2): 136-147 (2015) - [j3]Manogna Thimma, Fang Liu, Jingqiang Lin, Bo Luo:
HyXAC: Hybrid XML Access Control Integrating View-Based and Query-Rewriting Approaches. IEEE Trans. Knowl. Data Eng. 27(8): 2190-2202 (2015) - [c28]Weiyu Jiang, Jingqiang Lin, Zhan Wang, Huorong Li, Lei Wang:
LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data. ACNS 2015: 215-239 - [c27]Tianyu Chen, Yuan Ma, Jingqiang Lin, Zhan Wang, Jiwu Jing:
An Efficiency Optimization Scheme for the On-the-Fly Statistical Randomness Test. CSCloud 2015: 515-517 - [c26]Wei Wang, Jingqiang Lin, Zhan Wang, Ze Wang, Luning Xia:
vBox: Proactively Establishing Secure Channels Between Wireless Devices Without Prior Knowledge. ESORICS (2) 2015: 332-351 - [c25]Yafei Ji, Luning Xia, Jingqiang Lin, Jian Zhou, Guozhu Zhang, Shijie Jia:
Chameleon: A Lightweight Method for Thwarting Relay Attacks in Near Field Communication. ICICS 2015: 346-355 - [c24]Shijie Jia, Luning Xia, Zhan Wang, Jingqiang Lin, Guozhu Zhang, Yafei Ji:
Extracting Robust Keys from NAND Flash Physical Unclonable Functions. ISC 2015: 437-454 - [c23]Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing, Jing Wang:
Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory. IEEE Symposium on Security and Privacy 2015: 3-19 - 2014
- [c22]Yuan Ma, Jingqiang Lin, Tianyu Chen, Changwei Xu, Zongbin Liu, Jiwu Jing:
Entropy Evaluation for Oscillator-Based True Random Number Generators. CHES 2014: 544-561 - [c21]Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang:
SEDB: Building Secure Database Services for Sensitive Data. ICICS 2014: 16-30 - [c20]Ming Shang, Jingqiang Lin, Xiaokun Zhang, Changwei Xu:
A game-theory analysis of the rat-group attack in smart grids. ISSNIP 2014: 1-6 - [c19]Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao:
Exploiting the Floating-Point Computing Power of GPUs for RSA. ISC 2014: 198-215 - [c18]Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing:
Copker: Computing with Private Keys without RAM. NDSS 2014 - [c17]Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Daren Zha:
EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems Against Faulty Clients. SecureComm (1) 2014: 305-322 - [c16]Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao:
Exploiting the Potential of GPUs for Modular Multiplication in ECC. WISA 2014: 295-306 - 2013
- [j2]Jingqiang Lin, Peng Liu, Jiwu Jing, Qiongxiao Wang:
Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes. Secur. Commun. Networks 6(5): 612-630 (2013) - 2012
- [j1]Jingqiang Lin, Jiwu Jing, Peng Liu:
Evaluating Intrusion-Tolerant Certification Authority Systems. Qual. Reliab. Eng. Int. 28(8): 825-841 (2012) - [c15]Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao:
RIKE: Using Revocable Identities to Support Key Escrow in PKIs. ACNS 2012: 48-65 - [c14]Jingqiang Lin, Peng Liu, Jiwu Jing:
Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality. GameSec 2012: 118-137 - [c13]Yuan Ma, Luning Xia, Jingqiang Lin, Jiwu Jing, Zongbin Liu, Xingjie Yu:
Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA. ICICS 2012: 105-118 - [c12]Jingqiang Lin, Bo Luo, Jiwu Jing, Xiaokun Zhang:
GRADE: Graceful Degradation in Byzantine Quorum Systems. SRDS 2012: 171-180 - [c11]Cunqing Ma, Jingqiang Lin, Yuewu Wang:
Efficient Missing Tag Detection in a Large RFID System. TrustCom 2012: 185-192 - [c10]Cunqing Ma, Jingqiang Lin, Yuewu Wang, Ming Shang:
Offline RFID Grouping Proofs with Trusted Timestamps. TrustCom 2012: 674-681 - 2011
- [c9]Chunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian:
An Efficient Group-Based Secret Sharing Scheme. ISPEC 2011: 288-301 - [c8]Chunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian, Mingli Sun:
Efficient Secret Sharing Schemes. STA 2011: 114-121 - 2010
- [c7]Qiongxiao Wang, Jiwu Jing, Jingqiang Lin:
A Secure Storage System Combining Secret Sharing Schemes and Byzantine Quorum Mechanisms. CIT 2010: 596-603 - [c6]Daren Zha, Jiwu Jing, Peng Liu, Jingqiang Lin, Xiaoqi Jia:
Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control. ICCSA (4) 2010: 468-481 - [c5]Pingjian Wang, Jingqiang Lin, Jiwu Jing, Yongquan Xie:
Mediated Hierarchical Identity-Based Combined Public Key Schemes. IITSI 2010: 614-618 - [c4]Jingqiang Lin, Peng Liu, Jiwu Jing, Qiongxiao Wang:
Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes. SecureComm 2010: 307-325
2000 – 2009
- 2008
- [c3]Jingjing Wu, Jiwu Jing, Jingqiang Lin:
A Decentralized Certification Authority Based on Real World Trust Relationships. CSSE (3) 2008: 1123-1126 - 2007
- [c2]Jingqiang Lin, Jiwu Jing, Peng Liu:
Framework for Intrusion Tolerant Certification Authority System Evaluation. SRDS 2007: 231-241 - 2003
- [c1]Jiwu Jing, Peng Liu, Dengguo Feng, Ji Xiang, Neng Gao, Jingqiang Lin:
ARECA: a highly attack resilient certification authority. SSRS@CCS 2003: 53-63
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-13 22:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint