Author of the publication

Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features.

, , , , , , , and . ICICS, volume 11999 of Lecture Notes in Computer Science, page 430-446. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection and Analysis of Cryptographic Data Inside Software., , , and . ISC, volume 7001 of Lecture Notes in Computer Science, page 182-196. Springer, (2011)Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning., , , , , , and . WISEC, page 1-11. ACM, (2018)SMARTSHIELD: Automatic Smart Contract Protection Made Easy., , , , , and . SANER, page 23-34. IEEE, (2020)NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification., , , , , , , and . RAID, page 309-321. USENIX Association, (2019)APPCOMMUNE: Automated Third-Party Libraries De-duplicating and Updating for Android Apps., , , , and . SANER, page 344-354. IEEE, (2019)EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts., , , and . SANER, page 116-126. IEEE, (2020)Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis., , , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 252-263. Springer, (2012)Rethinking the security of IoT from the perspective of developer customized device-cloud interaction., , and . SAC, page 210-213. ACM, (2022)Android Malware Forensics: Reconstruction of Malicious Events., , and . ICDCS Workshops, page 552-558. IEEE Computer Society, (2012)Linear Cryptanalysis of ARIA Block Cipher., , , , and . ICICS, volume 7043 of Lecture Notes in Computer Science, page 242-254. Springer, (2011)