Selected publications

Most of the papers are copyrighted by ACM or IEEE. They are posted here for your personal use, to ensure timely dissemination of research work with no commercial purpose.

Copyright © 20xx by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page.  Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted.  To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee.  Request permissions from Publications Dept., ACM, Inc., fax +1 (212) 869-0481, or permissions@acm.org.

©20xx IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

Book chapters:

  • R. B. Lee, R. L. Rivest, M. J. B. Robshaw, Z. J. Shi, and Y. L. Yin, “Permutation operations in block ciphers”, accepted for publication in Embedded Cryptographic Hardware: Design and Security, Nadia Nedjah and Luiza de Macedo Mourelle, eds., Nova Science Publishers, NY, USA, ISBN 1-59454-145-0, February 2005. [ PDF (formatted for A4 paper)]
  • Z. Zhou, S. Ibrahim, H. Yan, J. Cui, R. Ammar, and Z. Shi, Enhancing underwater acoustic sensor networks using surface radios: issues, challenges and solutions. Chapter in Sensor Networks: Where Theory Meets Practice, (Gianluigi Ferrari, ed), Springer, pp. 283-307, March 2010.
  • Z. Shi, B. Wang, F. Zhang, CBKE: Chord-based Key Establishment Schemes for Wireless Sensor Networks, Chapter in Handbook on Sensor Networks, (Xiao, Chen and Li, eds.), pp.  399-418, World Scientific Publishing Company, August 2010.[PDF]
  • Z. Shi, C. Ma, J. Cote, and B. Wang, “Hardware implementation of hash functions,” Chapter in Introduction to Hardware Security and Trust, (Tehranipoor and Wang, eds.), July 2011.

Journal papers

  • R. B. Lee, Z. Shi, and X. Yang, “Efficient permutation instructions for fast software cryptography,” IEEE Micro, vol. 21, no. 6, pp. 56-69, December 2001. [PDF]
  • Z. J. Shi, X. Yang, and R. B. Lee, “Alternative application-specific processor architecture for fast arbitrary bit permutations,” International Journal of Embedded Systems (IJES). [PDF]
  • R. B. Lee, X. Yang, and Z. J. Shi, “Single-cycle bit permutations with MOMR execution,” Journal of Computer Science and Technology, vol. 20, no. 5, pp. 577-585, September 2005. [PDF]
  • H. Yan and Z. Shi, “Software Implementations of Elliptic Curve Cryptography”, International Journal of Network Security, vol. 7, no. 2, September 2008. [PDF]
  • P. Xie, Z. Zhou, N.C. Nicolaou, A. See, J-H Cui, and Z. Shi, “Efficient Vector-Based Forwarding for Underwater Sensor Networks,” EURASIP Journal of Wireless Communication and Networking, vol. 2010, 13 pages, 2010.
  • P. Xie, Z. Zhou, Z. Peng, J. Cui, and Z. Shi, “SDRT: A Reliable Data Transfer Protocol for Underwater Acoustic Sensor Networks,” Ad Hoc Networks, vol 8, no. 7, pp. 708-722, September 2010.
  • H. Lin, Y. Fei, X. Guan, and Z. Shi, “Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-specific Instruction Set Processors,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, pp. 1519 – 1532, vol. 18, no. 11, November 2010. [PDF]
  • R.Z. Zhou, J.Z. Peng, J-H. Cui and Z. Shi, “Efficient Multipath Communication for Time-Critical Applications in Underwater Acoustic Sensor Networks,” IEEE/ACM Transactions on Network, vol. 19, no. 1, pp. 28-41, February 2011.
  • Z. Zhou, Z. Peng, J. Cui, Z. Shi, and A. Bagtzoglou, “Scalable Localization with Mobility Prediction for Underwater Sensor Networks,” IEEE Transaction on mobile computing (TMC), vol. 10, no. 3, pp. 335-348, March 2011.
  • Hai Yan, Lei Wan, Shengli Zhou, Zhijie Shi, Jun-Hong Cui, Jie Huanga, and Hao Zhou, “DSP based receiver implementation for OFDM acoustic modems,” Physical Communication, September 2011. [PDF]
  • L. Wan, Zhaohui Wang, Shengli Zhou, T.C. Yang and Zhijie Shi, “Performance Comparison of Doppler Scale Estimation Methods for Underwater Acoustic OFDM,” Journal of Electrical and Computer Engineering, Special Issue on Underwater Communications and Networks, doi:10.1155/2012/703243, 2012.
  • Xian Chen, Yoo-Ah Kim, Bing Wang, Wei Wei, Zhijie Shi and Yuan Song, “Fault-tolerant Monitor Placement for Out-of-band Wireless Sensor Network Monitoring,” Elsevier Journal of Ad Hoc Networks, Vol. 10, No. 1, pp. 62-74, January 2012.
  • X. Zhao, S. Guo, T. Wang, F. Zhang and Z. Shi, "Fault-Propagate Pattern based DFA on PRESENT and PRINTcipher," Wuhan University Journal of Natural Sciences. Vol. 17, No. 6, pp. 485-493, October 2012. [PDF]
  • Xinjie Zhao, Shize Guo, Fan Zhang,  Tao Wang,  Zhijie Shi, and Hao Luo, “Enhanced Side-Channel Cube Attacks on PRESENT,” IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E96-A,  No.1,  pp.332-339, January 2013. [PDF]
  • Xinjie Zhao, Shize Guo, Fan Zhang,  Tao Wang,  Zhijie Shi, Huiying Liu, Keke Ji, and Jing Huang, “Efficient Hamming weight-based side-channel cube attacks on PRESENT,” Elsevier Journal of Systems and Software, vol. 86, no. 3, pp. 728-743, March 2013. [PDF]
  • Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Zhe Liu, Jean-François Gallais. A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES. Elsevier Computers and Security, vol. 39, Part B, pp. 173–189, November 2013. DOI: 10.1016/j.bbr.2011.03.031. [PDF]

Conference papers:

·       L. Wan, H. Zhou, X. Xu, Y. Huang, S. Zhou, Z. Shi, and J. Cui, “Field Tests of Adaptive Modulation and Coding for Underwater Acoustic OFDM,” Proceedings of ACM International Conference on UnderWater Networks (WUWNET 2013), Short Paper, November 2013.

·       M. Zuba, M. Fagan, J. Cui, and Z. Shi, “A Vulnerability Study of Geographic Routing in Underwater Acoustic Networks,” Proceedings of IEEE Conference on Communications and Network Security (CNS 2013), October 2013.

·       X. Zhao, S. Guo, F. Zhang, Z. Shi, T. Wang, and C. Ma, “Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques,” Proceedings of the Tenth Workshop on Fault Diagnosis and Tolerance in Cryptography, August 2013. [PDF]

·       F. Zhang, Xinjie Zhao, S. Guo, T. Wang, Z. Shi, “Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers,” Proceedings of Third International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE), LNCS 7275, March 2013. [PDF]

·       Juan Carlos Martinez Santos, Y. Fei, Z. Shi, “Static secure page allocation for light-weight dynamic information flow tracking”, Proceedings of International Conferences on Compilers, Architecture & Synthesis for Embedded Systems (CASES) 2012, pp. 27-36, August 2012.

·       L. Wan, S. Hurst, Z.-H. Wang, S. Zhou, Z. Shi, and S. Roy, “Joint linear precoding and non-binary LDPC coding for underwater acoustic OFDM,” in Proceedings of IEEE/MTS OCEANS conference, October 2012.

·       Xinjie Zhao, Fan Zhang, Shize Guo, Tao Wang, Zhijie Shi, Huiying Liu, Keke Ji, “MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation,” Proceedings of Third International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE), LNCS 7275, pp, 231-248, May 2012, Darmstadt, Germany, best paper award. [PDF]

·       M. Zuba, Z. Shi, Z. Peng, and J.-H. Cui, “Launching Denial-of-Service Jamming Attacks in Underwater Sensor Networks,” Proceedings of The Second ACM International Workshop on UnderWater Networks (WUWNET), Short Paper, December 2011.

·       Z. Fan and Z. Shi, “Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool,” Proceedings of International Conference on Information Technology: New Generations (ITNG 2011), pp. 359-365, April 2011. [PDF]

·       J. Cote, B. Wang, W. Zeng, and Z. Shi, “Capability and Fidelity of Mote-class Wireless Sniffers,” Proceedings of GLOBECOM  2010, pp. 1-6, December 2010. [PDF]

·       H. Yan, S. Zhou, Z. Shi, J.-H. Cui, L. Wan, J. Huang, and H. Zhou, “DSP implementation of SISO and MIMO OFDM acoustic modems,” Proceedings of MTS/IEEE OCEANS Conference, May 2010. [PDF]

·       J. C. M. Santos, Y. Fei, and Z. Shi, “PIFT: Efficient Dynamic Information Flow Tracking Using Secure Page Allocation,” Proceedings of the 4th Workshop on Embedded Systems Security, article 6, pp. 58-65, October 2009. [PDF]

·       W. Zeng, X. Chen, Z. Bu, W. Wei, B. Wang, and Z. Shi, “Delay monitoring and abnormal delay detection using sniffers for wireless sensor networks,” Proceedings of Military Communications Conference (MILCOM), pp. 1-8, October 2009. [PDF]

·       Z. Peng, Z. Zhou, J. Cui, and Z. Shi, “Aqua-Net: A Network Solution to Underwater Networks,” Proceedings of OCEANS, pp. 1-7, October 2009. [PDF]

·       P. Xie, J. Sun, H. Yan, T. Hu, J. Cui, Z. Shi, Y. Fei, and S. Zhou, “Aqua-Sim: An NS-2 Based Simulator for Underwater Sensor Networks,” Proceedings of OCEANS, pp. 1-7, October 2009. [PDF]

·       P. Xie, Z. Zhou, Z. Peng, J. Cui, Z. Shi, “Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks,” Proceedings of WASA, pp. 305-314, 2009. [PDF]

·       H. Yan, Z. Shi, and Y. Fei, “Efficient Implementation of Elliptic Curve Cryptography on DSP for Underwater Sensor Networks,” Proceedings of ODES 2009, pp. 7-15, March 2009. [PDF]

·       S. Wang, F. Zhang, J. Dai, Z. Shi, L, Wang, “Making Register File Resistant to Power Analysis Attacks,” Proceedings of ICCD 2008, October 2008. [PDF]

·       H. Yan, Z. Shi, and J. Cui, “DBR: Depth-based routing for underwater sensor networks,” Proceedings of IFIP Networking 2008, pp. 72-86, May 2008. [PDF]

·       F. Zhang and Z. Shi, “An Efficient Window-Based Countermeasure to Power Analysis of ECC Algorithms,” Proceedings of International Conference on Information Technology: New Generations (ITNG 2008), pp. 120-126, April 2008. [PDF]

·       F. Zhang, Z. Shi, and B. Wang, “Chord-based Key Establishment Schemes for Sensor Networks,” Proceedings of International Conference on Information Technology: New Generations (ITNG 2008), pp. 731-737, April 2008. [PDF]

·       H. Lin, X. Guan, Y. Fei, and Z. Shi, “Compiler-directed Architecture Support for Program Code Integrity Monitoring in Application-specific Instruction Set Processors,” Proceedings of ICCD 2007, pp. 187-193, October 2007. [PDF]

·       H. Yan, S. Zhou, Z. Shi, and B. Li, “A DSP implementation of  OFDM acoustic modem,” Proceedings of The Second ACM International Workshop on UnderWater Networks (WUWNET), pp. 89-92, September 2007. [PDF]

·     Y. Fei and Z. Shi, “Microarchitectural support for program code integrity monitoring in application-specific instruction set processors,” Proceedings of DATE 2007, pp. 815-820, April 2007. [PDF]

·     Y. Fei and Z. Shi, “Embedding program code integrity monitoring in application-specific instruction set processors,” Proceedings of BARC 2007, pp. 77-82, February 2007. [PDF]

·     Z. J. Shi and F. Zhang, “New attacks on randomized ECC algorithms,” Proceedings of EITC 2006, pp. 22-25, August 2006. [PDF]

·     H. Yan and Z. Shi, “Studying software implementations of Elliptic Curve Cryptography,” Proceedings of ITNG 2006, pp. 78-83, April 2006. [PDF]

·     Z. Shi and Y. Fei, “Exploring architectural challenges in scalable underwater wireless sensor networks,” Proceedings of Annual Boston Area Computer Architecture Workshop (BARC) 2006, pp. 38-42, February 2006. [PDF] [TALK]

·     Z. J. Shi, “Subword permutations with MIX instructions,” Proceedings of 39th Asilomar Conference on Signals, Systems, and Computers, pp. 1637-1641, November 2005. [PDF]

·     Y. Hilewitz, Z. J. Shi, and R. B. Lee, Comparing Fast Implementations of Bit Permutation Instructions, Proceedings of the 38th Annual Asilomar Conference on Signals, Systems, and Computers, pp. 1856 – 1863, November 2004. [PDF]

·     R. B. Lee, X. Yang, and Z. J. Shi, Validating Word-oriented Processors for Bit and Multi-Word Operations, Proceedings of the Asia-Pacific Computer Systems Architecture Conference (ACSAC), pp. 473-488, September 2004. [PDF]

·     R. B. Lee, R. L. Rivest, M. J. B. Robshaw, Z. J. Shi, and Y. L. Yin, “On permutation operations in cipher design,” Proceedings of the International Conference on Information Technology (ITCC), vol. 2, pp. 569-577, April 2004. [PDF]

·     Z. J. Shi and R. B. Lee, “Implementation complexity of bit permutation instructions,” Proceedings of the Asilomar Conference on Signals, Systems, and Computers, pp. 879-886, November 2003 (Nominated for Best Student Paper Award). [PDF]

·     J. P. McGregor, D. K. Karig, Z. J. Shi, and R. B. Lee, “A Processor architecture defense against buffer overflow attacks,” Proceedings of the IEEE International Conference on Information Technology: Research and Education (ITRE 2003), pp. 243-250, August 2003 (Best Student Paper Award). [PDF]

·     Z. Shi, X. Yang and R. B. Lee, “Arbitrary bit permutations in one or two cycles,” Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP 2003), pp. 237-247, June 2003. [PDF]

·     R. B. Lee, D. K. Karig, J. P. McGregor, and Z. Shi, “Enlisting hardware architecture to thwart malicious code injection,” Proceedings of the International Conference on Security in Pervasive Computing (SPC-2003), LNCS 2802, pp. 237-252, Springer Verlag, March 2003. [PDF]

·     Z. Shi and R. B. Lee, “Subword sorting with versatile permutation instructions,” Proceedings of the International Conference on Computer Design (ICCD 2002), pp. 234-241, September 2002. [PDF]

·     R. B. Lee, Z. Shi, and X. Yang, “How a processor can permute n bits in O(1) cycles,” Proceedings of Hot Chips 14 - A Symposium on High Performance Chips, August 2002. [Presentation PDF]

·     R. B. Lee, A. M. Fiskiran, Z. Shi, and X. Yang, “Refining instruction set architecture for high-performance multimedia processing in constrained environments,” Proceedings of the 13th International Conference on Application-Specific Systems, Architectures and Processors (ASAP 2002), pp. 253-264, July 2002. [PDF] [PDF from proceedings]

·     Z. Shi and R. B. Lee, “Bit permutation instructions for accelerating software cryptography,” Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP 2000), pp. 138-148, July 2000. [PDF]

More publications and many other papers published by the research group PALMS can be found on PALMS's publication page.

Presentations:

  • Ruby B. Lee and Zhijie Shi, Configurable Security Modules for System-on-Chip Designs, Invited speaker, Emerging Information Technology Conference, November 2002. [Presentation PDF]

 

Thesis:

  • Z. J. Shi, Bit Permutation Instructions: Architecture, Implementation, and Cryptographic Properties, Ph.D. thesis, Princeton University, June 2004. [PDF]

Public technical reports:

 

 


This page was last updated on October 16, 2011.