What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yuan Ma
Google Scholar
22
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Revisiting Prediction-Based Min-Entropy Estimation: Toward Interpretability, Reliability, and Applicability.
Dongchi Han
Yuan Ma
Tianyu Chen
Shijie Jia
Na Lv
Fangyu Zheng
Xianhui Lu
2024
journals/tifs
ZeroShield: Transparently Mitigating Code Page Sharing Attacks With Zero-Cost Stand-By.
Mingyu Wang
Fangyu Zheng
Jingqiang Lin
Fangjie Jiang
Yuan Ma
2024
conf/acsac
CryptoPyt: Unraveling Python Cryptographic APIs Misuse with Precise Static Taint Analysis.
Xiangxin Guo
Shijie Jia
Jingqiang Lin
Yuan Ma
Fangyu Zheng
Guangzheng Li
Bowen Xu
Yueqiang Cheng
Kailiang Ji
2023
conf/icisc
Enhancing Prediction Entropy Estimation of RNG for On-the-Fly Test.
Yuan Ma
Weisong Gu
Tianyu Chen
Na Lv
Dongchi Han
Shijie Jia
2023
conf/icisc
Side-Channel Analysis on Lattice-Based KEM Using Multi-feature Recognition - The Case Study of Kyber.
Yuan Ma
Xinyue Yang
An Wang
Congming Wei
Tianyu Chen
Haotong Xu
2023
conf/esorics
JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications.
Bowen Xu
Shijie Jia
Jingqiang Lin
Fangyu Zheng
Yuan Ma
Limin Liu
Xiaozhuo Gu
Li Song
2022
conf/acsac
CryptoGo: Automatic Detection of Go Cryptographic API Misuses.
Wenqing Li
Shijie Jia
Limin Liu
Fangyu Zheng
Yuan Ma
Jingqiang Lin
2021
journals/tifs
DPF-ECC: A Framework for Efficient ECC With Double Precision Floating-Point Computing Power.
Lili Gao
Fangyu Zheng
Rong Wei
Jiankuo Dong
Niall Emmart
Yuan Ma
Jingqiang Lin
Charles C. Weems
2020
journals/tifs
On the Analysis and Improvement of Min-Entropy Estimation on Time-Varying Data.
Shuangyi Zhu
Yuan Ma
Xusheng Li
Jing Yang
Jingqiang Lin
Jiwu Jing
2019
journals/tifs
Entropy Estimation for ADC Sampling-Based True Random Number Generators.
Yuan Ma
Tianyu Chen
Jingqiang Lin
Jing Yang
Jiwu Jing
2017
journals/tosc
Analysis and Improvement of Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources.
Shuangyi Zhu
Yuan Ma
Tianyu Chen
Jingqiang Lin
Jiwu Jing
2017
conf/acns
A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers.
Chenyang Tu
Lingchen Zhang
Zeyi Liu
Neng Gao
Yuan Ma
2017
conf/icics
An Efficiency Optimization Scheme for the On-the-Fly Statistical Randomness Test.
Jiahui Shen
Tianyu Chen
Lei Wang
Yuan Ma
2017
conf/ctrsa
On the Entropy of Oscillator-Based True Random Number Generators.
Yuan Ma
Jingqiang Lin
Jiwu Jing
2016
conf/ccs
Leakage Fingerprints: A Non-negligible Vulnerability in Side-Channel Analysis.
Zeyi Liu
Neng Gao
Chenyang Tu
Jian Zhou
Yuan Ma
Yuan Zhao
2016
conf/icics
Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields.
Yuan Ma
Qinglong Zhang
Zongbin Liu
Chenyang Tu
Jingqiang Lin
2016
conf/asiacrypt
More Powerful and Reliable Second-Level Statistical Randomness Tests for NIST SP 800-22.
Shuangyi Zhu
Yuan Ma
Jingqiang Lin
Jia Zhuang
Jiwu Jing
2016
conf/sacrypt
Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks.
Zeyi Liu
Neng Gao
Chenyang Tu
Yuan Ma
Zongbin Liu
2015
conf/icics
QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations.
Chenyang Tu
Jian Zhou
Neng Gao
Zeyi Liu
Yuan Ma
Zongbin Liu
2014
conf/ches
Entropy Evaluation for Oscillator-Based True Random Number Generators.
Yuan Ma
Jingqiang Lin
Tianyu Chen
Changwei Xu
Zongbin Liu
Jiwu Jing
2013
conf/sacrypt
A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over \mathrm p.
Yuan Ma
Zongbin Liu
Wuqiong Pan
Jiwu Jing
2012
conf/icics
Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA.
Yuan Ma
Luning Xia
Jingqiang Lin
Jiwu Jing
Zongbin Liu
Xingjie Yu
Coauthors
An Wang
(1)
Bowen Xu
(2)
Changwei Xu
(1)
Charles C. Weems
(1)
Chenyang Tu
(5)
Congming Wei
(1)
Dongchi Han
(2)
Fangjie Jiang
(1)
Fangyu Zheng
(6)
Guangzheng Li
(1)
Haotong Xu
(1)
Jia Zhuang
(1)
Jiahui Shen
(1)
Jian Zhou
(2)
Jiankuo Dong
(1)
Jing Yang
(2)
Jingqiang Lin
(13)
Jiwu Jing
(8)
Kailiang Ji
(1)
Lei Wang
(1)
Li Song
(1)
Lili Gao
(1)
Limin Liu
(2)
Lingchen Zhang
(1)
Luning Xia
(1)
Mingyu Wang
(1)
Na Lv
(2)
Neng Gao
(4)
Niall Emmart
(1)
Qinglong Zhang
(1)
Rong Wei
(1)
Shijie Jia
(5)
Shuangyi Zhu
(3)
Tianyu Chen
(7)
Weisong Gu
(1)
Wenqing Li
(1)
Wuqiong Pan
(1)
Xiangxin Guo
(1)
Xianhui Lu
(1)
Xiaozhuo Gu
(1)
Xingjie Yu
(1)
Xinyue Yang
(1)
Xusheng Li
(1)
Yuan Ma
(22)
Yuan Zhao
(1)
Yueqiang Cheng
(1)
Zeyi Liu
(1)
Zeyi Liu
(3)
Zongbin Liu
(6)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to