dblp.uni-trier.dewww.uni-trier.de

Zhijie Jerry Shi

Zhijie Shi

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
17EEShuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhijie Jerry Shi: Making register file resistant to power analysis attacks. ICCD 2008: 577-582
16EEFan Zhang, Zhijie Jerry Shi: An Efficient Window-Based Countermeasure to Power Analysis of ECC Algorithms. ITNG 2008: 120-126
15EEFan Zhang, Zhijie Jerry Shi, Bing Wang: Chord-Based Key Establishment Schemes for Sensor Networks. ITNG 2008: 731-737
14EEHai Yan, Zhijie Jerry Shi, Jun-Hong Cui: DBR: Depth-Based Routing for Underwater Sensor Networks. Networking 2008: 72-86
2007
13EEYunsi Fei, Zhijie Jerry Shi: Microarchitectural support for program code integrity monitoring in application-specific instruction set processors. DATE 2007: 815-820
12EEHai Lin, Xuan Guan, Yunsi Fei, Zhijie Jerry Shi: Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors. ICCD 2007: 187-193
11EEHai Yan, Shengli Zhou, Zhijie Jerry Shi, Baosheng Li: A DSP implementation of OFDM acoustic modem. Underwater Networks 2007: 89-92
2006
10EEHai Yan, Zhijie Jerry Shi: Studying Software Implementations of Elliptic Curve Cryptography. ITNG 2006: 78-83
2005
9EERuby B. Lee, Xiao Yang, Zhijie Shi: Single-Cycle Bit Permutations with MOMR Execution. J. Comput. Sci. Technol. 20(5): 577-585 (2005)
2004
8EERuby B. Lee, Xiao Yang, Zhijie Shi: Validating Word-Oriented Processors for Bit and Multi-word Operations. Asia-Pacific Computer Systems Architecture Conference 2004: 473-488
7EERuby B. Lee, Zhijie Shi, Yiqun Lisa Yin, Ronald L. Rivest, Matthew J. B. Robshaw: On Permutation Operations in Cipher Design. ITCC (2) 2004: 569-577
2003
6EEZhijie Shi, Xiao Yang, Ruby B. Lee: Arbitrary Bit Permutations in One or Two Cycles. ASAP 2003: 237-
5EERuby B. Lee, David K. Karig, John Patrick McGregor, Zhijie Shi: Enlisting Hardware Architecture to Thwart Malicious Code Injection. SPC 2003: 237-252
2002
4EERuby B. Lee, A. Murat Fiskiran, Zhijie Shi, Xiao Yang: Refining Instruction Set Architecture for High-Performance Multimedia Processing in Constrained Environments. ASAP 2002: 253-264
3EEZhijie Shi, Ruby B. Lee: Subword Sorting with Versatile Permutation Instructions. ICCD 2002: 234-241
2001
2EERuby B. Lee, Zhijie Shi, Xiao Yang: Cryptography Efficient Permutation Instructions for Fast Software. IEEE Micro 21(6): 56-69 (2001)
2000
1EEZhijie Shi, Ruby B. Lee: Bit Permutation Instructions for Accelerating Software Cryptography. ASAP 2000: 138-148

Coauthor Index

1Jun-Hong Cui [14]
2Jianwei Dai [17]
3Yunsi Fei [12] [13]
4A. Murat Fiskiran [4]
5Xuan Guan [12]
6David K. Karig [5]
7Ruby B. Lee [1] [2] [3] [4] [5] [6] [7] [8] [9]
8Baosheng Li [11]
9Hai Lin [12]
10John Patrick McGregor [5]
11Ronald L. Rivest [7]
12Matthew J. B. Robshaw [7]
13Bing Wang [15]
14Lei Wang [17]
15Shuo Wang [17]
16Hai Yan [10] [11] [14]
17Xiao Yang [2] [4] [6] [8] [9]
18Yiqun Lisa Yin [7]
19Fan Zhang [15] [16] [17]
20Shengli Zhou [11]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)