Author of the publication

Security Analysis of Vendor Customized Code in Firmware of Embedded Device.

, , , , and . SecureComm, volume 198 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 722-739. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers., , , , and . Security and Communication Networks, 8 (4): 672-681 (2015)Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256., , , and . Journal of Systems and Software, 85 (11): 2451-2458 (2012)Legitimate-reader-only attack on MIFARE Classic., , , and . Mathematical and Computer Modelling, 58 (1-2): 219-226 (2013)On Improving the Performance of Public Key Encryption with Keyword Search., , , and . CDC, page 143-147. IEEE Computer Society, (2012)Differential Fault Analysis on the MD5 Compression Function., , , , , and . JCP, 8 (11): 2888-2894 (2013)A Highly Efficient Correlation Power Analysis on PRINT Cipher., , , and . CIS, page 442-446. IEEE Computer Society, (2012)Security Analysis of the Whirlpool Hash Function in the Cloud of Things., , , , , , , and . TIIS, 11 (1): 536-551 (2017)Side channel attack of multiplication in GF(q)-application to secure RSA-CRT., , , , , and . SCIENCE CHINA Information Sciences, 62 (3): 39105:1-39105:3 (2019)Why Data Deletion Fails? A Study on Deletion Flaws and Data Remanence in Android Systems., , , , and . ACM Trans. Embedded Comput. Syst., 16 (2): 61:1-61:22 (2017)A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison., , , , and . CoRR, (2019)