![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Xinjie Zhao 0001
Person information
- affiliation: The Institute of North Electronic Equipment, Beijing, China
- affiliation (former): Ordnance Engineering College, Shijiazhuang, China
Other persons with the same name
- Xinjie Zhao — disambiguation page
- Xinjie Zhao 0002 — Chinese Academy of Sciences, Dalian Institute of Chemical Physics, China
- Xinjie Zhao 0003 — Nankai University, Department of Electronics, Tianjin, China
- Xinjie Zhao 0004
— China Agricultural University, College of Humanities and Development Studies, Beijing, China
- Xinjie Zhao 0005 — Peking University, School of Software & Microelectronics, Beijing, China
- Xin-jie Zhao 0002 — Jiangsu University, School of automotive and traffic engineering, Zhenjiang, China
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j19]Xue Gong, Fan Zhang, Xin-jie Zhao, Jie Xiao, Shize Guo:
Key Schedule Guided Persistent Fault Attack. IEEE Trans. Inf. Forensics Secur. 20: 767-780 (2025) - 2023
- [j18]Fan Zhang, Run Huang, Tianxiang Feng, Xue Gong, Yulong Tao, Kui Ren, Xinjie Zhao, Shize Guo:
Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 519-542 (2023) - [c14]Guorui Xu, Fan Zhang, Xinjie Zhao, Yuan Chen, Shize Guo, Kui Ren:
Stalker: A Framework to Analyze Fragility of Cryptographic Libraries under Hardware Fault Models. DAC 2023: 1-6 - 2022
- [j17]Fan Zhang, Tianxiang Feng, Zhiqi Li, Kui Ren, Xinjie Zhao:
Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(2): 289-311 (2022) - 2021
- [j16]Guorui Xu
, Fan Zhang
, Bolin Yang
, Xinjie Zhao, Wei He
, Kui Ren
:
Pushing the Limit of PFA: Enhanced Persistent Fault Analysis on Block Ciphers. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6): 1102-1116 (2021) - 2020
- [j15]Fan Zhang, Yiran Zhang, Huilong Jiang, Xiang Zhu, Shivam Bhasin, Xinjie Zhao, Zhe Liu, Dawu Gu, Kui Ren:
Persistent Fault Attack in Practice. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 172-195 (2020)
2010 – 2019
- 2019
- [c13]Xiaoxuan Lou, Fan Zhang, Guorui Xu, Ziyuan Liang, Xinjie Zhao, Shize Guo, Kui Ren:
Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance. Inscrypt 2019: 480-496 - [c12]Yiran Zhang, Fan Zhang, Bolin Yang, Guorui Xu, Bin Shao, Xinjie Zhao, Kui Ren:
Persistent Fault Injection in FPGA via BRAM Modification. DSC 2019: 1-6 - 2018
- [j14]Ping Zhou, Tao Wang, Xiaoxuan Lou, Xinjie Zhao, Fan Zhang, Shize Guo:
Efficient flush-reload cache attack on scalar multiplication based signature algorithm. Sci. China Inf. Sci. 61(3): 039102:1-039102:3 (2018) - [j13]Xinjie Zhao, Fan Zhang, Shize Guo, Zheng Gong:
Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers. Sci. China Inf. Sci. 61(3): 039106:1-039106:3 (2018) - [j12]Fan Zhang
, Ziyuan Liang, Bolin Yang, Xinjie Zhao, Shize Guo, Kui Ren:
Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition. Frontiers Inf. Technol. Electron. Eng. 19(12): 1475-1499 (2018) - [j11]Fan Zhang, Xiaoxuan Lou, Xinjie Zhao, Shivam Bhasin, Wei He, Ruyi Ding, Samiya Qureshi, Kui Ren:
Persistent Fault Analysis on Block Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 150-172 (2018) - [c11]Fan Zhang, Yiran Zhang, Xinjie Zhao, Shize Guo, Ziyuan Liang, Samiya Qureshi:
Improved Differential Fault Analysis on LED with Constraint Equations: Towards Reaching Its Limit. ICPADS 2018: 646-653 - [c10]Fan Zhang, Xiaofei Dong, Xinjie Zhao, Yidi Wang, Samiya Qureshi, Yiran Zhang, Xiaoxuan Lou, Yongkang Tang:
Theoretical Round Modification Fault Analysis on AEGIS-128 with Algebraic Techniques. MASS 2018: 335-343 - 2017
- [j10]Fan Zhang, Xinjie Zhao, Wei He, Shivam Bhasin, Shize Guo:
Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers. Sci. China Inf. Sci. 60(4): 48102 (2017) - [j9]Liang Geng, Fan Zhang, Jizhong Shen, Wei He, Shivam Bhasin, Xinjie Zhao, Shize Guo:
Transistor level SCA-resistant scheme based on fluctuating power logic. Sci. China Inf. Sci. 60(10): 109401:1-109401:3 (2017) - [j8]Hao Chen, Tao Wang, Shize Guo, Xinjie Zhao, Fan Zhang, Jian Liu:
Improved Differential Fault Analysis of SOSEMANUK with Algebraic Techniques. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(3): 811-821 (2017) - [j7]Hao Chen, Tao Wang, Fan Zhang
, Xinjie Zhao, Wei He, Lumin Xu, Yunfei Ma:
Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher. Secur. Commun. Networks 2017: 8051728:1-8051728:15 (2017) - [c9]Fan Zhang, Liang Geng, Jizhong Shen, Shivam Bhasin, Xinjie Zhao, Shize Guo:
Improved low-entropy masking scheme for LED with mitigation against correlation-enhanced collision attacks. AsianHOST 2017: 49-54 - 2016
- [j6]Jing Huang, Bo Xi, Peng Li, Fan Zhang, Xinjie Zhao:
一种基于量子密码的卫星网络窃听攻击检测方法 (Method for Detecting Wiretapping Attack in Satellite Network Based on Quantum Cryptography). 计算机科学 43(7): 157-161 (2016) - [j5]Fan Zhang, Shize Guo, Xinjie Zhao, Tao Wang, Jian Yang, François-Xavier Standaert
, Dawu Gu:
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers. IEEE Trans. Inf. Forensics Secur. 11(5): 1039-1054 (2016) - 2014
- [j4]Shize Guo, Xinjie Zhao, Fan Zhang, Tao Wang, Zhijie Jerry Shi, François-Xavier Standaert
, Chujiao Ma:
Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations. IEEE Trans. Inf. Forensics Secur. 9(6): 999-1014 (2014) - [c8]Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Jerry Shi, Chujiao Ma, Dawu Gu:
Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering. FDTC 2014: 29-39 - 2013
- [j3]Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Zhe Liu, Jean-François Gallais:
A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES. Comput. Secur. 39: 173-189 (2013) - [j2]Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Hao Luo:
Enhanced Side-Channel Cube Attacks on PRESENT. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 332-339 (2013) - [j1]Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Huiying Liu, Keke Ji, Jing Huang:
Efficient Hamming weight-based side-channel cube attacks on PRESENT. J. Syst. Softw. 86(3): 728-743 (2013) - [c7]Yasha Chen, Xinjie Zhao, Wen Li, Jianpeng Zhao:
A New Architecture for Cloud Computing System Protection. CBD 2013: 46-50 - [c6]Xinjie Zhao, Jianxin Xu, Dipti Srinivasan
:
Freeway ramp metering by macroscopic traffic scheduling with particle swarm optimization. CIVTS 2013: 32-37 - [c5]Fan Zhang, Xinjie Zhao, Shize Guo, Tao Wang, Zhijie Shi:
Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers. COSADE 2013: 62-79 - [c4]Xinjie Zhao, Shize Guo, Fan Zhang, Zhijie Shi, Chujiao Ma, Tao Wang:
Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques. FDTC 2013: 41-51 - 2012
- [c3]Xin-jie Zhao, Fan Zhang, Shize Guo, Tao Wang, Zhijie Shi, Huiying Liu, Keke Ji:
MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation. COSADE 2012: 231-248 - [i8]Xin-jie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Keke Ji:
Algebraic Differential Fault Attacks on LED using a Single Fault Injection. IACR Cryptol. ePrint Arch. 2012: 347 (2012) - 2011
- [i7]Xin-jie Zhao, Tao Wang, Shize Guo:
Fault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PRINTcipher. IACR Cryptol. ePrint Arch. 2011: 86 (2011) - [i6]Xin-jie Zhao, Tao Wang, Shize Guo:
Improved Side Channel Cube Attacks on PRESENT. IACR Cryptol. ePrint Arch. 2011: 165 (2011) - 2010
- [c2]Jianxin Xu, Xinjie Zhao, Dipti Srinivasan
:
Fuzzy logic controller for freeway ramp metering with particle swarm optimization and PARAMICS simulation. FUZZ-IEEE 2010: 1-6 - [i5]Xin-jie Zhao, Tao Wang:
Further Improved Differential Fault Analysis on Camellia by Exploring Fault Width and Depth. IACR Cryptol. ePrint Arch. 2010: 26 (2010) - [i4]Xin-jie Zhao, Tao Wang:
Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment. IACR Cryptol. ePrint Arch. 2010: 56 (2010) - [i3]Xin-jie Zhao, Tao Wang, Jing-zhe Gao:
Multiple Bytes Differential Fault Analysis on CLEFIA. IACR Cryptol. ePrint Arch. 2010: 78 (2010)
2000 – 2009
- 2009
- [i2]Xin-jie Zhao, Tao Wang, Yuanyuan Zheng:
Cache Timing Attacks on Camellia Block Cipher. IACR Cryptol. ePrint Arch. 2009: 354 (2009) - [i1]Xin-jie Zhao, Tao Wang:
An Improved Differential Fault Attack on Camellia. IACR Cryptol. ePrint Arch. 2009: 585 (2009) - 2008
- [c1]Xin-jie Zhao, Tao Wang, Dong Mi, Yuanyuan Zheng, Zhaoyang Lun:
Robust First Two Rounds Access Driven Cache Timing Attack on AES. CSSE (3) 2008: 785-788
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint