李阳研究生导师介绍
姓名李阳 性 别:  行政职务 :
专业技术职务副教授 办公电话 导师类别硕士生导师
最后学历博士毕业 最后学位博士 最后毕业学校日本电气通信大学
电子邮件liyang@nuaa.edu.cn  
工作单位计算机科学与技术学院    
学科研究方向一:
专业名称计算机科学与技术 (招收硕士研究生)                                                                  学科代码11081200
网络空间安全,信息安全,密码实现安全,密钥恢复攻击,物联网设备安全等
学科研究方向三:
专业名称航天仿生科学与技术 (招收硕士研究生) 学科代码0825J1
个人简历(学历、学术经历及社会兼职):


研究经历:
2004/09-2008/07 本科   哈尔滨工程大学
2009/04-2011/03 硕士   电气通信大学,日本
2011/04-2012/12 博士   电气通信大学,日本
2013/01-2013/03 博士后  电气通信大学,日本
2013/04-2015/03 助教   电气通信大学,日本
2015/04-至今  副教授  南京航空航天大学

学术兼职:
SPACE2015  学术委员会成员
CHES 2016  学术委员会成员


发表学术论文,出版专著情况:
Book, Book Chapters:

1.Kazuo Sakiyama, Yu Sasaki, and Yang Li, “Security of Block Ciphers: From Algorithm Design to Hardware Implementation,” ISBN 978-1-118-66001-0, Wiley, Jul., 2015.

2.Junko Takahashi, Toshinori Fukunaga, Shigeto Gomisawa, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Fault Injection and Key Retrieval Experiments on Evaluation Board,” Chapter in Marc Joye and Michael Tunstall editors, Fault Analysis in Cryptography , Springer, 012, 2012, XVI, 354 p.

Jounals:

1. Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta, Daisuke Fujimoto, Makoto Nagata, Toshihiro Katashita, Jean-Luc Danger, and Takafumi Aoki, “A Silicon-level Countermeasure against Fault Sensitivity Analysis and Its Evaluation,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., Vol.23, No.8, pp.1429-1438, (Aug., 2015).

2. Toshiki Nakasone, Yang Li, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama, “New Side-Channel Analysis Using Clockwise Collision Leakage Model and Weak Keys on Parallelized AES Hardware (In Japanese),” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., (Nov. 2014).

3. Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Beno??ot G?l’rard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomn?l’, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage,Werner Schindler, Marc St?? uttinger, Nicolas Veyrat-Charvillon, MatthieuWalle, AntoineWurcker, “Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest,” Journal of Cryptographic Engineering (Mar. 2014).

4. Kazuo Sakiyama, Yang Li, Shigeto Gomisawa, Yu-ichi Hayashi, Mitsugu Iwamoto, Naofumi Homma, Takafumi Aoki, Kazuo Ohta, “Practical DFA Strategy for AES Under Limited-Access Conditions,” Journal of Information Processing (Feb. 2014).

5 . Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “A New Type of Fault-Based Attack: Fault Behavior Analysis,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E96-A, No.1,pp 177-184,Jan. 2013. (SCI: 000314080500020, 2013 IF: 0.226, 0 time cited)

6. Ayaka Koike, Yang Li, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, “New Fault Sensitivity Analysis for Multiple Factors (In Japanese),” The Journal of the IEICE A Vol.J95-A No.10 pp.751-755, (Oct. 2012). (INSPEC:13591366)

7. Kazuo Sakiyama, Yang Li, Mitsugu Iwamoto, and Kazuo Ohta, “Information-Theoretic Approach to Optimal Differential Fault Analysis,” IEEE Trans. Inf. Forensic Secur., Vol.7, No.1, pp.109-120, (Feb., 2012). (SCI: 000299438100011, 2013 IF: 2.065, 1 Time Cited)

8 . Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “New Fault-Based Side-Channel Attack using Fault Sensitivity,” IEEE Trans. Inf. Forensic Secur., Vol.7, No.1, pp.88-97, (Feb., 2012). (SCI: 000299438100009, 2013 IF: 2.065, 3 Time Cited)

9 . Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “Toward Effective Countermeasures Against An Improved Fault Sensitivity Analysis,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E95-A, No.1, pp.234-241, (Jan., 2012). (SCI: 000299588300022, 2013 IF: 0.226, 1 time cited)

10 . Yang Li, Kazuo Sakiyama, Shinichi Kawamura, and Kazuo Ohta, “Power Analysis against a DPAresistant S-box Implementation Based on the Fourier Transform,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E94-A, No.1, pp.191-199, (Jan., 2011). (SCI: 000293818300022, 2013 IF:
0.226, 1 time cited)

Refereed Conference Papers (with Formal Proceedings)

1. Yang Li, Shugo Mikami, Dai Watanabe, Kazuo Ohta, Kazuo SAKIYAMA, “Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication,” In 2014 RFIDsec Asia (RFIDsec Asia’ 14), (Nov. 2014).

2. Yang Li, Toshiki Nakasone, Kazuo Sakiyama, “Software and Hardware Co-Verification for Privacy- Enhanced Passive UHF RFID Tag,” In 2014 IEEE International Symposium on Electromagnetic Compatibility (EMC’ 14), IEEE, (Aug. 2014).

3. Yang Li, Toshiki Nakasone, Kazuo Ohta, Kazuo Sakiyama, “Privacy-Mode Switching: Toward Flexible Privacy Protection for RFID Tags in Internet of Things,” In Consumer Communications & Networking Conference (CCNC’ 14), IEEE, (Jan. 2014).

4. Yang Li, Yu-Ichi Hayashi, Arisa Matsubara, Naofumi Homma, Takafumi Aoki, Kazuo Ohta and Kazuo Sakiyama, “Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts,” In Proc. the Sixth International Symposium on Foundations & Practice of Security (FPS’13), LNCS, (Oct. 2013).

5. Toshiki Nakasone, Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “Exploration of the CC-EMA Attack Towards Efficient Evaluation of EM Information Leakage,” In Proc. EMC Europe 2013, IEEE (Sep., 2013).

6. Yu Sasaki, Yang Li, Hikaru Sakamoto and Kazuo Sakiyama, “Coupon Collector’s Problem for Fault Analysis – High Tolerance for Noisy Fault Injections,” In Proc. Financial Cryptography and Data Security 2013 (FC’ 13), LNCS, (Apr. 2013).

7. Yang Li, Sho Endo, Nicolas Debande, Naofumi Homma, Takafumi Aoki, Thanh-Ha Le, Jean-Luc Danger, Kazuo Ohta and Kazuo Sakiyama, “Exploring the Relations Between Fault Sensitivity and Power Consumption,” In Proc. Fourth International Workshop on Constructive Side-Channel Analysis and Security Design (COSADE’13), LNCS, (Mar. 2013).

8. Nakasone Toshiki, Yang Li, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta and Kazuo Sakiyama, “Key- Dependent Weakness of AES-Based Ciphers Under Clockwise Collision Distinguisher,” In Proc. the 15th Annual International Conference on Information Security and Cryptology (ICISC’ 12), LNCS, (Dec. 2012).

9. Yang Li, Kazuo Ohta and Kazuo Sakiyama, “An Extension of Fault Sensitivity Analysis Based on Clockwise Collision,” In Proc. the 8th China International Conference on Information Security and Cryptology (Inscrypt’ 12), LNCS, (Dec. 2012).

10. Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta, and Takafumi Aoki, “An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks,” In Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’ 12), IEEE, pp.95-102, (Sep., 2012).

11. Yu-ichi Hayashi, Shigeto Gomisawa, Yang Li, Naofumi Homma, Kazuo Sakiyama, Takafumi Aoki, and Kazuo Ohta, “Intentional Electromagnetic Interference for Fault Analysis on AES Block Cipher IC,” In Proc. International Workshop on Electromagnetic Compatibility of Integrated Circuits (EMCCOMPO’ 11), IEEE, pp.235-240, (Nov., 2011).

12. Amir Moradi, Oliver Mischke, Christof Paar, Yang Li, Kazuo Ohta, Kazuo Sakiyama, “On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attack in a Combined Setting,” In Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES’ 11), LNCS 6917, Springer- Verlag, pp.292-311, (Sep., 2011).

13. Hikaru Sakamoto, Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems,” In Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’ 11), IEEE, pp.11-20, (Sep., 2011).

14. Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “Revisit Fault Sensitivity Analysis on WDDL-AES,” In Proc. International Symposium on Hardware-Oriented Security and Trust (HOST’ 11), IEEE, pp.148- 153, (Jun., 2011).

15. Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, and Kazuo Ohta, “New Approach of Super-Sbox Analysis on AES-Based Permutations: Applications to ECHO and Grostl,” In Proc. Advances in Cryptology (ASIACRYPT’ 10), LNCS 6477, Springer-Verlag, pp.38-55, (Dec., 2010).

16. Daisuke Nakatsu, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Combination of SW Countermeasure and CPU Modification on FPGA Against Power Analysis,” In Proc. International Workshop on Information Security Applications (WISA’ 10), LNCS 6513, Springer-Verlag, pp.258-272, (Aug., 2010).

17. Yang Li, Kazuo


科研成果获奖及专利:

承担的科研项目情况:
华为技术有限公司,故障注入技术相关项目
国家自然科学基金青年项目
江苏省自然科学基金
江苏省博士后科研资助计划
中国博士后科学基金面上资助
指导研究生情况:

欢迎对网络空间安全,密码设备安全、物联网设备安全研究感兴趣的高年级本科生以及打算报考研究生的同学与我联系。要求有一定的编程能力、较好的英语读写能力和数学基础!
备注:

详细情况见个人主页www.liyang-hp.com每年招收2名计算机科学与技术专业的硕士研究生。招收的学生除了接受我的科研指导外,将同时接受他老师的指导,如王箭教授,朱友文副教授,团队的老师和学生每周开展学术讨论,详情可通过邮件咨询,邮件地址为 li.yang@nuaa.edu.cn(学校邮箱)。