default search action
Ming Tang 0002
Person information
- affiliation: Wuhan University, School of Cyber Science and Engineering, China
- affiliation (PhD 2007): Wuhan University, School of Computer, China
Other persons with the same name
- Ming Tang — disambiguation page
- Ming Tang 0001 — Chinese Academy of Sciences, National Laboratory of Pattern Recognition, Beijing, China (and 1 more)
- Ming Tang 0003 — Sichuan University, Business School, Chengdu, China
- Ming Tang 0004 — East China Normal University, School of Physics and Electronic Science, Shanghai, China (and 1 more)
- Ming Tang 0005 — Huazhong University of Science and Technology, Wuhan National Laboratory for Optoelectronics, China (and 4 more)
- Ming Tang 0006 — Southern University of Science and Technology, Department of Computer Science and Engineering, Shenzhen, China (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Botao Liu, Ming Tang:
MS-LW-TI: Primitive-Based First-Order Threshold Implementation for 4 × 4 S-boxes. IET Inf. Secur. 2024: 1-17 (2024) - [j31]Chong Xiao, Ming Tang:
Acnn: arbitrary trace attacks based on leakage area detection. Int. J. Inf. Sec. 23(4): 2991-3006 (2024) - [j30]Quancheng Wang, Ming Tang, Jianming Fu:
EavesDroid: Eavesdropping User Behaviors via OS Side Channels on Smartphones. IEEE Internet Things J. 11(3): 3979-3993 (2024) - [j29]Yanbin Li, Jiajie Zhu, Zhe Liu, Ming Tang, Shougang Ren:
Deep Learning Gradient Visualization-Based Pre-Silicon Side-Channel Leakage Location. IEEE Trans. Inf. Forensics Secur. 19: 2340-2355 (2024) - [c9]Han Wang, Ming Tang, Ke Xu, Quancheng Wang:
Cache Bandwidth Contention Leaks Secrets. DATE 2024: 1-6 - [c8]Ke Xu, Ming Tang, Quancheng Wang, Han Wang:
Exploitation of Security Vulnerability on Retirement. HPCA 2024: 1-14 - [c7]Quancheng Wang, Ming Tang, Ke Xu, Han Wang:
Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities. HPCA 2024: 409-423 - 2023
- [j28]Chong Xiao, Ming Tang, Sylvain Guilley:
Exploiting the microarchitectural leakage of prefetching activities for side-channel attacks. J. Syst. Archit. 139: 102877 (2023) - [j27]Yuzhe Gu, Ming Tang, Quancheng Wang, Han Wang, Haili Ding:
One more set: Mitigating conflict-based cache side-channel attacks by extending cache set. J. Syst. Archit. 144: 102997 (2023) - [j26]Ke Xu, Ming Tang, Han Wang, Sylvain Guilley:
Reverse-Engineering and Exploiting the Frontend Bus of Intel Processor. IEEE Trans. Computers 72(2): 360-373 (2023) - [i7]Quancheng Wang, Ming Tang, Jianming Fu:
EavesDroid: Eavesdropping User Behaviors via OS Side-Channels on Smartphones. CoRR abs/2303.03700 (2023) - [i6]Quancheng Wang, Ming Tang, Han Wang, Yuzhe Gu:
BackCache: Mitigating Contention-Based Cache Timing Attacks by Hiding Cache Line Evictions. CoRR abs/2304.10268 (2023) - [i5]Han Wang, Ming Tang, Ke Xu, Quancheng Wang:
BandwidthBreach: Unleashing Covert and Side Channels through Cache Bandwidth Exploitation. CoRR abs/2306.01996 (2023) - [i4]Ke Xu, Ming Tang, Quancheng Wang, Han Wang:
New Covert and Side Channels Based on Retirement. CoRR abs/2307.12486 (2023) - 2022
- [j25]Yanbin Li, Yuxin Huang, Fuwei Jia, Qingsong Zhao, Ming Tang, Shougang Ren:
A gradient deconvolutional network for side-channel attacks. Comput. Electr. Eng. 98: 107686 (2022) - [j24]Yanbin Li, Jiajie Zhu, Ming Tang, Shougang Ren, Fusheng Wu:
TSCL: A time-space crossing location for side-channel leakage detection. Comput. Networks 216: 109242 (2022) - [j23]Yaru Wang, Ming Tang, Pengbo Wang, Botao Liu, Rui Tian:
The Levene test based-leakage assessment. Integr. 87: 182-193 (2022) - [j22]Pengbo Wang, Ming Tang, Shoukun Xiang, Yaru Wang, Botao Liu:
Gap between Prediction and Truth: A Case Study of False-Positives in Leakage Detection. Secur. Commun. Networks 2022: 6904232:1-6904232:13 (2022) - [j21]Yanbin Li, Jiajie Zhu, Yuxin Huang, Zhe Liu, Ming Tang:
Single-Trace Side-Channel Attacks on the Toom-Cook: The Case Study of Saber. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 285-310 (2022) - 2021
- [j20]Yidong Yuan, Yao Zhang, Yiqiang Zhao, Xige Zhang, Ming Tang:
Process Variation-Resistant Golden-Free Hardware Trojan Detection through a Power Side Channel. Secur. Commun. Networks 2021: 8839222:1-8839222:15 (2021) - [j19]Yanbin Li, Zhe Liu, Sylvain Guilley, Ming Tang:
Analysis of Multiplicative Low Entropy Masking Schemes Against Correlation Power Attack. IEEE Trans. Inf. Forensics Secur. 16: 4466-4481 (2021) - [c6]Yanbin Li, Yuxin Huang, Ming Tang, Shougang Ren, Huanliang Xu:
Adaptive Chosen Plaintext Side-Channel Attacks for Higher-Order Masking Schemes. WASA (2) 2021: 173-185 - 2020
- [j18]Yanbin Li, Ming Tang, Yuguang Li, Huanguo Zhang:
A pre-silicon logic level security verification flow for higher-order masking schemes against glitches on FPGAs. Integr. 70: 60-69 (2020) - [j17]Zhipeng Guo, Ming Tang, Emmanuel Prouff, Maixing Luo, Fei Yan:
Table Recomputation-Based Higher-Order Masking Against Horizontal Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(1): 34-44 (2020)
2010 – 2019
- 2019
- [j16]Fangfei Yang, Ming Tang, Ozgur Sinanoglu:
Stripped Functionality Logic Locking With Hamming Distance-Based Restore Unit (SFLL-hd) - Unlocked. IEEE Trans. Inf. Forensics Secur. 14(10): 2778-2786 (2019) - [c5]Yuguang Li, Ming Tang, Pengbo Wang, Yanbin Li, Shan Fu:
Practical Evaluation Methodology of Higher-Order Maskings at Different Operating Frequencies. ICICS 2019: 287-304 - 2018
- [j15]Yanbin Li, Ming Tang, Yuguang Li, Huanguo Zhang:
Several weaknesses of the implementation for the theoretically secure masking schemes under ISW framework. Integr. 60: 92-98 (2018) - [j14]Ming Tang, Yanbin Li, Dongyan Zhao, Yuguang Li, Fei Yan, Huanguo Zhang:
Leak Point Locating in Hardware Implementations of Higher-Order Masking Schemes. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(12): 3008-3019 (2018) - [j13]Ming Tang, Pengbo Wang, Xiaoqi Ma, Wenjie Chang, Huanguo Zhang, Guojun Peng, Jean-Luc Danger:
An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation. IEEE Trans. Inf. Forensics Secur. 13(12): 3008-3018 (2018) - [p1]Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Axel Legay, Ming Tang:
Physical Security Versus Masking Schemes. Cyber-Physical Systems Security 2018: 269-284 - 2017
- [j12]Ming Tang, Zhipeng Guo, Annelie Heuser, Yanzhen Ren, Jie Li, Jean-Luc Danger:
PFD - A Flexible Higher-Order Masking Scheme. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 36(8): 1327-1339 (2017) - [j11]Ming Tang, Zhenlong Qiu, Zhipeng Guo, Yi Mu, Xinyi Huang, Jean-Luc Danger:
A Generic Table Recomputation-Based Higher-Order Masking. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 36(11): 1779-1789 (2017) - [c4]Sylvain Guilley, Annelie Heuser, Ming Tang, Olivier Rioul:
Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition. SECITC 2017: 12-27 - 2016
- [j10]Shaohua Tang, Weijian Li, Jianhao Wu, Zheng Gong, Ming Tang:
Power analysis attacks against FPGA implementation of KLEIN. Secur. Commun. Networks 9(18): 5849-5857 (2016) - 2015
- [j9]Yanzhen Ren, Tingting Cai, Ming Tang, Lina Wang:
AMR Steganalysis Based on the Probability of Same Pulse Position. IEEE Trans. Inf. Forensics Secur. 10(9): 1801-1811 (2015) - 2014
- [j8]Ming Tang, Zhenlong Qiu, Hongbo Peng, Xiaobo Hu, Yi Mu, Huanguo Zhang:
Toward reverse engineering on secret S-boxes in block ciphers. Sci. China Inf. Sci. 57(3): 1-18 (2014) - [j7]Ming Tang, Zhenlong Qiu, Weijie Li, Weijin Sun, Xiaobo Hu, Huanguo Zhang:
Power analysis based reverse engineering on the secret round function of block ciphers. Concurr. Comput. Pract. Exp. 26(8): 1531-1545 (2014) - 2013
- [c3]Ming Tang, Weijin Sun, Si Gao, Yuan Wu, Hongbo Peng, Zhenlong Qiu, Xin Wang:
On Design of Nonlinear Operations and Round Functions of Block Ciphers with Resistance to ASCAs. INCoS 2013: 226-232 - 2012
- [j6]Ming Tang, Zhenlong Qiu, Si Gao, Yi Mu, Shubo Liu, Huanguo Zhang, Yingzhen Jin:
Polar differential power attacks and evaluation. Sci. China Inf. Sci. 55(7): 1588-1604 (2012) - [j5]Ming Tang, Zhenlong Qiu, Min Yang, Pingpan Cheng, Si Gao, Shubo Liu, Qingshu Meng:
Evolutionary ciphers against differential power analysis and differential fault analysis. Sci. China Inf. Sci. 55(11): 2555-2569 (2012) - [c2]Ming Tang, Zhenlong Qiu, Weijie Li, Shubo Liu, Huanguo Zhang:
Power Analysis Based Reverse Engineering on the Secret Round Function of Block Ciphers. ICDKE 2012: 175-188 - [i3]Ming Tang, Pingpan Cheng, Zhenlong Qiu:
Differential Power Analysis on ZUC Algorithm. IACR Cryptol. ePrint Arch. 2012: 299 (2012) - 2011
- [j4]Houzhen Wang, Huanguo Zhang, Zhang-yi Wang, Ming Tang:
Extended multivariate public key cryptosystems with secure encryption function. Sci. China Inf. Sci. 54(6): 1161-1171 (2011) - [j3]Huanguo Zhang, Chunlei Li, Ming Tang:
Capability of evolutionary cryptosystems against differential cryptanalysis. Sci. China Inf. Sci. 54(10): 1991-2000 (2011) - [j2]Huanguo Zhang, Chunlei Li, Ming Tang:
Evolutionary cryptography against multidimensional linear cryptanalysis. Sci. China Inf. Sci. 54(12): 2565-2577 (2011) - [i2]Ming Tang, Xiaorong Wang, Zhenlong Qiu, Si Gao, Huanguo Zhang, Qianhong Wu:
DPA Leakage Evaluation and Countermeasure Plug-in. IACR Cryptol. ePrint Arch. 2011: 77 (2011) - 2010
- [j1]Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang:
Evolution Cipher against Differential Power Attack. J. Digit. Content Technol. its Appl. 4(7): 177-189 (2010) - [i1]Ming Tang, Qingshu Meng, Huanguo Zhang, Si Gao, Qin Dou, Fei Shen, Du Li:
Evolutionary Cipher against Differential Power Attack. IACR Cryptol. ePrint Arch. 2010: 167 (2010)
2000 – 2009
- 2009
- [c1]Ming Tang, Conglu Li, Yue Yu, Guo-ping Zhang, Huanguo Zhang:
Research and Implementation of Evolution Cipher Chip. ISCID (1) 2009: 32-35
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-08 02:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint