当前位置: X-MOL首页全球导师 国内导师 › 丁瑶玲

个人简介

2021/07-至今,北京理工大学,网络空间安全学院,特别副研究员 2019/07-2021/07,北京理工大学,计算机学院,博士后 2011/09-2019/07,清华大学,计算机系,博士 2007/09-2011/07,吉林大学,计算机科学与技术系,学士 研究成果 作为负责人承担国家自然科学基金、信息安全国家重点实验室开放课题、密码科学技术国家重点实验室开放课题、河南省网络密码技术重点实验室开放课题等4项国家级或省部级科研项目,在IEEE TIFS、Information Sciences、Future Generation Computer Systems等重要期刊或会议上发表学术论文10余篇。 主持课题 2021.01 - 2023.12,国家自然科学基金(青年项目):面向分组密码算法硬件防护的智能侧信道分析方法研究,62002021,24万元,主持 2020.07 - 2022.07,密码科学技术国家重点实验室开放课题(面上课题):新型分组密码的安全实现与侧信道分析评估,10万元,主持 2021.01 - 2022.12,信息安全国家重点实验室开放课题基金:随机数发生器芯片的物理攻击与防护技术研究,2021-ZD-08,5万元,主持 2021.01 - 2022.12,河南省网络密码技术重点实验室研究课题:面向密码算法并行实现的遗传算法相关能量分析实用化方法探究,LNCT2020-A09,3万元,主持 2019.12 - 2021.06,数据通信科学技术研究所技术服务项目:芯片物理安全性测评实验(第二期),20万元,主持 2020.08 - 2021.10,数据通信科学技术研究所技术服务项目:芯片硬件木马侧信道分析检测实验,10万元,主持

研究领域

密码学,侧信道分析与防护,对称密码分析

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

An Wang, Yuan Li, Yaoling Ding*, Liehuang Zhu, and Yongjuan Wang. Efficient Framework for Genetic-Algorithm-Based Correlation Power Analysis. IEEE Transactions on Information Forensics and Security (TIFS), 16: p. 4882-4894, 2021. (SCI) Ning Shang, An Wang*, Yaoling Ding*, Keke Gai, Liehuang Zhu, and Guoshuang Zhang. A Machine Learning based Golden-free Detection Method for Command-activated Hardware Trojan. Information Sciences, 540: p. 292-307, 2020. (SCI) Yaoling Ding, Ying Shi, An Wang*, Yongjuan Wang, and Guoshuang Zhang. Block-oriented Correlation Power Analysis with Bitwise Linear Leakage: An Artificial Intelligence Approach based on Genetic Algorithms. Future Generation Computer Systems, 106: p. 34-42, 2020. (SCI) Yaoling Ding, Xiaoyun Wang*, Ning Wang, and Wei Wang. Improved Automatic Search of Impossible Differentials for Camellia with FL/FL?1 Layers. Science China Information Sciences, 61(3): p. 1-3, 2018. (SCI) Yaoling Ding, Liehuang Zhu, An Wang*, Yuan Li, Yongjuan Wang, Siu Ming Yiu, and Keke Gai. A Multiple Sieve Approach Based on Artificial Intelligent Techniques and Correlation Power Analysis. ACM Transactions on Multimedia Computing, Communications, and Applications, 17(2): p. 1–21, 2021. (SCI) Xin Liu, An Wang*, Liehuang Zhu, Yaoling Ding*, Zeyuan Lyu, and Zongyue Wang. SCARE and power attack on AES-like block ciphers with secret S-box. Frontiers of Computer Science, 2021. (SCI) Yaoling Ding, Jingyuan Zhao, Leibo Li, and Hongbo Yu*. Impossible Differential Analysis on Round-Reduced PRINCE. Journal of Information Science & Engineering, 33(4), 2017. (SCI) Yaoling Ding, Ying Shi, An Wang*, Xuexin Zheng, Zongyue Wang, and Guoshuang Zhang. Adaptive Chosen-plaintext Collision Attack on Masked AES in Edge Computing. IEEE Access, 7: p. 63217-63229, 2019. (SCI) 王安, 谷睿, 丁瑶玲*, 等. 基于持续性故障的分组密码算法 S 盒表逆向分析. 电子学报, 51(3): 537, 2023. (CCF A类中文期刊) 丁瑶玲, 李璐, and 贾珂婷*. 基于不可能差分的 SHA3-512 约减轮区分攻击. 密码学报, 4(6): p. 545–557, 2017. (CCF B类中文期刊) Yaoling Ding, Keting Jia*, An Wang, and Ying Shi. Impossible Differential Analysis on 8-Round PRINCE. in Proceedings of the 9th International Conference on Computer Engineering and Networks, 2021. (EI) 司恩泽, 王安*, 祝烈煌, 丁瑶玲*, 陈财森, and 丁诗军. 相关能量分析中的后向检错方案. 密码学报, 8(1): p. 28-39, 2020. (CCF B类中文期刊) 王安, 董永银, 祝烈煌, 张宇, and 丁瑶玲*. 一种针对分组密码软件的 APT 后门及其防范. 密码学报, 8(1): p. 65-75, 2020. (CCF B类中文期刊) Zhihui Chu, Huaifeng Chen, Xiaoyun Wang*, Lu Li, Xiaoyang Dong, Yaoling Ding, and Yonglin Hao. Improved integral attacks without full codebook. IET Information Security, 12(6): p. 513-520, 2018. (SCI) An Wang, Man Chen, Zongyue Wang, and Yaoling Ding. Overcoming significant noise: Correlation-template-induction attack. in Information Security Practice and Experience - 8th International Conference, ISPEC 2012. (EI) Ning Shang, Jinpeng Zhang, Yaoling Ding, Caisen Chen, and An Wang*. Homological Fault Attack on AES Block Cipher and Its Countermeasures. in Proceedings of the 9th International Conference on Computer Engineering and Networks. 2021. (EI) Xiaoya Yang, Yongchuan Niu, Qingping Tang, Jiawei Zhang, Yaoling Ding, and An Wang*. Near and Far Collision Attack on Masked AES. in 10th International Conference on Computer Engineering and Networks, CENet 2020. 2020. (EI)

推荐链接
down
wechat
bug