default search action
Chenglu Jin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Zheng Yang, Chenglu Jin, Xuelian Cao, Marten van Dijk, Jianying Zhou:
Optimizing Proof of Aliveness in Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 21(4): 3610-3628 (2024) - [j14]Xuelian Cao, Zheng Yang, Jianting Ning, Chenglu Jin, Rongxing Lu, Zhiming Liu, Jianying Zhou:
Dynamic Group Time-Based One-Time Passwords. IEEE Trans. Inf. Forensics Secur. 19: 4897-4913 (2024) - [j13]Qingzhi Liu, Yuchen Huang, Chenglu Jin, Xiaohan Zhou, Ying Mao, Cagatay Catal, Long Cheng:
Privacy and Integrity Protection for IoT Multimodal Data Using Machine Learning and Blockchain. ACM Trans. Multim. Comput. Commun. Appl. 20(6): 153:1-153:18 (2024) - [c14]Zachary DiMeglio, Jenna Bustami, Deniz Gurevin, Chenglu Jin, Marten van Dijk, Omer Khan:
Masked Memory Primitive for Key Insulated Schemes. HOST 2024: 293-303 - [i23]Sirui Shen, Chenglu Jin:
Reading It like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks. IACR Cryptol. ePrint Arch. 2024: 1035 (2024) - 2023
- [j12]Marten van Dijk, Chenglu Jin:
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model. J. Cryptol. 36(4): 35 (2023) - [j11]Chenglu Jin, Zheng Yang, Tao Xiang, Sridhar Adepu, Jianying Zhou:
HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things. IEEE Trans. Inf. Forensics Secur. 18: 1080-1094 (2023) - [i22]Niloufar Sayadi, Phuong Ha Nguyen, Marten van Dijk, Chenglu Jin:
Breaking XOR Arbiter PUFs without Reliability Information. CoRR abs/2312.01256 (2023) - 2022
- [j10]Chenglu Jin, Wayne P. Burleson, Marten van Dijk, Ulrich Rührmair:
Programmable access-controlled and generic erasable PUF design and its applications. J. Cryptogr. Eng. 12(4): 413-432 (2022) - [e2]Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, Sudipta Chattopadhyay, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Weizhi Meng, Stjepan Picek, Jun Shao, Chunhua Su, Cong Wang, Yury Zhauniarovich, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7 [contents] - [i21]Deniz Gurevin, Chenglu Jin, Phuong Ha Nguyen, Omer Khan, Marten van Dijk:
Secure Remote Attestation with Strong Key Insulation Guarantees. CoRR abs/2201.01834 (2022) - [i20]Marten van Dijk, Chenglu Jin:
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and its Relation to the Random Oracle Model. IACR Cryptol. ePrint Arch. 2022: 1069 (2022) - [i19]Zheng Yang, Chenglu Jin, Jianting Ning, Zengpeng Li, Tien Tuan Anh Dinh, Jianying Zhou:
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location. IACR Cryptol. ePrint Arch. 2022: 1280 (2022) - 2021
- [j9]Michael Linares, Nishant Aswani, Gary Mac, Chenglu Jin, Fei Chen, Nikhil Gupta, Ramesh Karri:
Hack3D: Crowdsourcing the Assessment of Cybersecurity in Digital Manufacturing. Computer 54(11): 58-67 (2021) - [j8]Priyanka Mahesh, Akash Tiwari, Chenglu Jin, Panganamala R. Kumar, A. L. Narasimha Reddy, Satish T. S. Bukkapatnam, Nikhil Gupta, Ramesh Karri:
A Survey of Cybersecurity of Digital Manufacturing. Proc. IEEE 109(4): 495-516 (2021) - [j7]Zheng Yang, Zhiting Bao, Chenglu Jin, Zhe Liu, Jianying Zhou:
PLCrypto: A Symmetric Cryptographic Library for Programmable Logic Controllers. IACR Trans. Symmetric Cryptol. 2021(3): 170-217 (2021) - [c13]Zheng Yang, Chenglu Jin, Jianting Ning, Zengpeng Li, Anh Dinh, Jianying Zhou:
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location. ACSAC 2021: 497-512 - [c12]Zheng Yang, Chao Yin, Chenglu Jin, Jianting Ning, Jianying Zhou:
Lightweight Delegated Authentication with Identity Fraud Detection for Cyber-physical Systems. CPSS@AsiaCCS 2021: 17-28 - [e1]Jianying Zhou, Chuadhry Mujeeb Ahmed, Lejla Batina, Sudipta Chattopadhyay, Olga Gadyatskaya, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Mihalis Maniatakos, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Masaki Shimaoka, Chunhua Su, Cong Wang:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5 [contents] - [i18]Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen:
Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak. IACR Cryptol. ePrint Arch. 2021: 602 (2021) - [i17]Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen:
Bilinear Map Based One-Time Signature Scheme with Secret Key Exposure. IACR Cryptol. ePrint Arch. 2021: 925 (2021) - 2020
- [c11]Chenglu Jin, Wayne P. Burleson, Marten van Dijk, Ulrich Rührmair:
Erasable PUFs: Formal Treatment and Generic Design. ASHES@CCS 2020: 21-33 - [c10]Zheng Yang, Chenglu Jin, Yangguang Tian, Junyu Lai, Jianying Zhou:
LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical Systems. AsiaCCS 2020: 719-731 - [i16]Michael Linares, Nishant Aswani, Gary Mac, Chenglu Jin, Fei Chen, Nikhil Gupta, Ramesh Karri:
HACK3D: Evaluating Cybersecurity of Additive Manufacturing by Crowdsourcing. CoRR abs/2005.04368 (2020) - [i15]Chenglu Jin, Vasudev Gohil, Ramesh Karri, Jeyavijayan Rajendran:
Security of Cloud FPGAs: A Survey. CoRR abs/2005.04867 (2020) - [i14]Priyanka Mahesh, Akash Tiwari, Chenglu Jin, Panganamala R. Kumar, A. L. Narasimha Reddy, Satish T. S. Bukkapatnam, Nikhil Gupta, Ramesh Karri:
A Survey of Cybersecurity and Resilience of Digital Manufacturing. CoRR abs/2006.05042 (2020)
2010 – 2019
- 2019
- [j6]Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, Marten van Dijk:
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(4): 243-290 (2019) - [j5]Syed Kamran Haider, Chenglu Jin, Masab Ahmad, Devu Manikantan Shila, Omer Khan, Marten van Dijk:
Advancing the State-of-the-Art in Hardware Trojans Detection. IEEE Trans. Dependable Secur. Comput. 16(1): 18-32 (2019) - [j4]Chenglu Jin, Marten van Dijk:
Secure and Efficient Initialization and Authentication Protocols for SHIELD. IEEE Trans. Dependable Secur. Comput. 16(1): 156-173 (2019) - [c9]Chenglu Jin, Zheng Yang, Marten van Dijk, Jianying Zhou:
Proof of aliveness. ACSAC 2019: 1-16 - [i13]Chenglu Jin, Zheng Yang, Sridhar Adepu, Jianying Zhou:
HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data. IACR Cryptol. ePrint Arch. 2019: 450 (2019) - 2018
- [c8]Marten van Dijk, Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr:
Weak-Unforgeable Tags for Secure Supply Chain Management. Financial Cryptography 2018: 80-98 - [c7]Chenglu Jin, Saeed Valizadeh, Marten van Dijk:
Snapshotter: Lightweight intrusion detection and prevention system for industrial control systems. ICPS 2018: 824-829 - [i12]Syed Kamran Haider, Chenglu Jin, Marten van Dijk:
Comments on "Defeating HaTCh: Building Malicious IP Cores". CoRR abs/1804.04783 (2018) - [i11]Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, Marten van Dijk:
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks. IACR Cryptol. ePrint Arch. 2018: 350 (2018) - [i10]Yansong Gao, Chenglu Jin, Jeeson Kim, Hussein Nili, Xiaolin Xu, Wayne P. Burleson, Omid Kavehei, Marten van Dijk, Damith Chinthana Ranasinghe, Ulrich Rührmair:
Efficient Erasable PUFs from Programmable Logic and Memristors. IACR Cryptol. ePrint Arch. 2018: 358 (2018) - [i9]Chenglu Jin, Marten van Dijk, Michael K. Reiter, Haibin Zhang:
PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion. IACR Cryptol. ePrint Arch. 2018: 1171 (2018) - 2017
- [j3]Chenglu Jin, Charles Herder, Ling Ren, Phuong Ha Nguyen, Benjamin Fuller, Srinivas Devadas, Marten van Dijk:
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise. Cryptogr. 1(3): 23 (2017) - [c6]Chenglu Jin, Lingyu Ren, Xubin Liu, Peng Zhang, Marten van Dijk:
Mitigating Synchronized Hardware Trojan Attacks in Smart Grids. SPSR-SG@CPSWeek 2017: 35-40 - [c5]Wei Yan, Chenglu Jin, Fatemeh Tehranipoor, John A. Chandy:
Phase calibrated ring oscillator PUF design and implementation on FPGAs. FPL 2017: 1-8 - [c4]Hoda Maleki, Reza Rahaeimehr, Chenglu Jin, Marten van Dijk:
New clone-detection approach for RFID-based supply chains. HOST 2017: 122-127 - [c3]Syed Kamran Haider, Chenglu Jin, Marten van Dijk:
Advancing the state-of-the-art in hardware Trojans design. MWSCAS 2017: 823-826 - [i8]Raihan Sayeed Khan, Nadim Kanan, Chenglu Jin, Jake Scoggin, Nafisa Noor, Sadid Muneer, Faruk Dirisaglik, Phuong Ha Nguyen, Helena Silva, Marten van Dijk, Ali Gokirmak:
Intrinsically Reliable and Lightweight Physical Obfuscated Keys. CoRR abs/1703.07427 (2017) - [i7]Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Marten van Dijk:
MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks. IACR Cryptol. ePrint Arch. 2017: 572 (2017) - [i6]Marten van Dijk, Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr:
Weak-Unforgeable Tags for Secure Supply Chain Management. IACR Cryptol. ePrint Arch. 2017: 1221 (2017) - 2016
- [j2]Xiaofei Guo, Chenglu Jin, Chi Zhang, Athanasios Papadimitriou, David Hély, Ramesh Karri:
Can Algorithm Diversity in Stream Cipher Implementation Thwart (Natural and) Malicious Faults? IEEE Trans. Emerg. Top. Comput. 4(3): 363-373 (2016) - [i5]Syed Kamran Haider, Chenglu Jin, Marten van Dijk:
Advancing the State-of-the-Art in Hardware Trojans Design. CoRR abs/1605.08413 (2016) - 2015
- [j1]Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, Ramesh Karri:
Security analysis of concurrent error detection against differential fault analysis. J. Cryptogr. Eng. 5(3): 153-169 (2015) - [c2]Xiaofei Guo, Naghmeh Karimi, Francesco Regazzoni, Chenglu Jin, Ramesh Karri:
Simulation and analysis of negative-bias temperature instability aging on power analysis attacks. HOST 2015: 124-129 - [i4]Chenglu Jin, Marten van Dijk:
Secure and Efficient Initialization and Authentication Protocols for SHIELD. IACR Cryptol. ePrint Arch. 2015: 210 (2015) - [i3]Chenglu Jin, Xiaolin Xu, Wayne P. Burleson, Ulrich Rührmair, Marten van Dijk:
PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management. IACR Cryptol. ePrint Arch. 2015: 1052 (2015) - 2014
- [c1]Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, Ramesh Karri:
NREPO: Normal basis Recomputing with Permuted Operands. HOST 2014: 118-123 - [i2]Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, Ramesh Karri:
NREPO: Normal Basis Recomputing with Permuted Operands. IACR Cryptol. ePrint Arch. 2014: 497 (2014) - [i1]Syed Kamran Haider, Chenglu Jin, Masab Ahmad, Devu Manikantan Shila, Omer Khan, Marten van Dijk:
HaTCh: Hardware Trojan Catcher. IACR Cryptol. ePrint Arch. 2014: 943 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint