Zhijie Shi
List of publications from the DBLP Bibliography Server - FAQ
2008 | ||
---|---|---|
17 | EE | Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhijie Jerry Shi: Making register file resistant to power analysis attacks. ICCD 2008: 577-582 |
16 | EE | Fan Zhang, Zhijie Jerry Shi: An Efficient Window-Based Countermeasure to Power Analysis of ECC Algorithms. ITNG 2008: 120-126 |
15 | EE | Fan Zhang, Zhijie Jerry Shi, Bing Wang: Chord-Based Key Establishment Schemes for Sensor Networks. ITNG 2008: 731-737 |
14 | EE | Hai Yan, Zhijie Jerry Shi, Jun-Hong Cui: DBR: Depth-Based Routing for Underwater Sensor Networks. Networking 2008: 72-86 |
2007 | ||
13 | EE | Yunsi Fei, Zhijie Jerry Shi: Microarchitectural support for program code integrity monitoring in application-specific instruction set processors. DATE 2007: 815-820 |
12 | EE | Hai Lin, Xuan Guan, Yunsi Fei, Zhijie Jerry Shi: Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors. ICCD 2007: 187-193 |
11 | EE | Hai Yan, Shengli Zhou, Zhijie Jerry Shi, Baosheng Li: A DSP implementation of OFDM acoustic modem. Underwater Networks 2007: 89-92 |
2006 | ||
10 | EE | Hai Yan, Zhijie Jerry Shi: Studying Software Implementations of Elliptic Curve Cryptography. ITNG 2006: 78-83 |
2005 | ||
9 | EE | Ruby B. Lee, Xiao Yang, Zhijie Shi: Single-Cycle Bit Permutations with MOMR Execution. J. Comput. Sci. Technol. 20(5): 577-585 (2005) |
2004 | ||
8 | EE | Ruby B. Lee, Xiao Yang, Zhijie Shi: Validating Word-Oriented Processors for Bit and Multi-word Operations. Asia-Pacific Computer Systems Architecture Conference 2004: 473-488 |
7 | EE | Ruby B. Lee, Zhijie Shi, Yiqun Lisa Yin, Ronald L. Rivest, Matthew J. B. Robshaw: On Permutation Operations in Cipher Design. ITCC (2) 2004: 569-577 |
2003 | ||
6 | EE | Zhijie Shi, Xiao Yang, Ruby B. Lee: Arbitrary Bit Permutations in One or Two Cycles. ASAP 2003: 237- |
5 | EE | Ruby B. Lee, David K. Karig, John Patrick McGregor, Zhijie Shi: Enlisting Hardware Architecture to Thwart Malicious Code Injection. SPC 2003: 237-252 |
2002 | ||
4 | EE | Ruby B. Lee, A. Murat Fiskiran, Zhijie Shi, Xiao Yang: Refining Instruction Set Architecture for High-Performance Multimedia Processing in Constrained Environments. ASAP 2002: 253-264 |
3 | EE | Zhijie Shi, Ruby B. Lee: Subword Sorting with Versatile Permutation Instructions. ICCD 2002: 234-241 |
2001 | ||
2 | EE | Ruby B. Lee, Zhijie Shi, Xiao Yang: Cryptography Efficient Permutation Instructions for Fast Software. IEEE Micro 21(6): 56-69 (2001) |
2000 | ||
1 | EE | Zhijie Shi, Ruby B. Lee: Bit Permutation Instructions for Accelerating Software Cryptography. ASAP 2000: 138-148 |
1 | Jun-Hong Cui | [14] |
2 | Jianwei Dai | [17] |
3 | Yunsi Fei | [12] [13] |
4 | A. Murat Fiskiran | [4] |
5 | Xuan Guan | [12] |
6 | David K. Karig | [5] |
7 | Ruby B. Lee | [1] [2] [3] [4] [5] [6] [7] [8] [9] |
8 | Baosheng Li | [11] |
9 | Hai Lin | [12] |
10 | John Patrick McGregor | [5] |
11 | Ronald L. Rivest | [7] |
12 | Matthew J. B. Robshaw | [7] |
13 | Bing Wang | [15] |
14 | Lei Wang | [17] |
15 | Shuo Wang | [17] |
16 | Hai Yan | [10] [11] [14] |
17 | Xiao Yang | [2] [4] [6] [8] [9] |
18 | Yiqun Lisa Yin | [7] |
19 | Fan Zhang | [15] [16] [17] |
20 | Shengli Zhou | [11] |