[1] TAng M, Qiu Zhenlong, et al. A Generic Table Recomputation-based Higher-Order Masking. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2017, 36(11): 1779-1789. (SCI, CCF A)
[2] TAng Ming, Guo Zhipeng, et al. PFD—A Flexible Higher-Order Masking Scheme[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2017, 36(8): 1327-1339. (SCI, CCF A)
[3] TAng Ming, Li Yanbin, et al. Leak point locating in hardware implementations of higher-order masking schemes. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2018, 37(12): 3008-3019. (SCI, CCF A)
[4] TAng Ming, Wang Pengbo, et al. An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation. IEEE Transactions on Information Forensics and Security, 2018, 13(12): 3008-3018. (SCI, CCF A)
[5] GUo Zhipeng, Tang Ming, et al. Table Re-computation-based Higher Order Masking against Horizontal Attacks[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2018. (SCI, CCF A)
[6] YAng Fangfei, Tang Ming, et al. Stripped Functionality Logic Locking with Hamming Distance Based Restore Unit (SFLL-hd)–Unlocked[J]. IEEE Transactions on Information Forensics and Security, 2019. (SCI, CCF A)
[7] TAng Ming, Qiu Zhenlong, et al. Evolutionary ciphers against differential power analysis and differential fault analysis. Science China Information Sciences,2012, 55(11): 2555-2569. (SCI, CCF B)
[8] TAng Ming, Qiu Zhenlong, et al. Polar differential power attacks and evaluation, Science China Information Sciences, 2012, 55(7): 1588-1604. (SCI, CCF B)
[9] TAng Ming, Qiu Zhenlong, et al. Toward reverse engineering on secret S-boxes in block ciphers. Science China Information Sciences, 2014, 57(3): 1-18. (SCI, CCF B)
[10]LI Yanbin, Tang Ming, et al. Several weaknesses of the implementation for the theoretically secure masking schemes under ISW framework. Integration, the VLSI Journal, 2018, 60: 92-98. (SCI, CCF C)
[11]TAng Ming, Qiu Zhenlong, et al. Reverse Engineering Analysis Based on Differential Fault Analysis Against Secret S-boxes, China Communications, 2012, 9(10): 10-22. (SCI)
[12]TAng Ming, Qiu Zhenlong, et al. Power analysis based reverse engineering on the secret round function of block ciphers, Concurrency and CompuTAtion-Practice & Experience, 2014, 26(8): 1531-1545. (SCI)
[13]TAng Ming, Luo Maixing, et al. Side-Channel Attacks in a Real Scenario, Tsinghua Science and Technology. Tsinghua Science and Technology, 2018, 23(5): 586-598. (SCI).
[14]TAng Ming, Li YuGuang, et al. A Generic TC-Based Method to Find the Weakness in Different Phases of Masking Schemes. Tsinghua Science and Technology, 2018, 23(5): 574-585.(SCI)
[15]TAng Ming, Sun Weijin, et al. On Design of Nonlinear Operations and Round Functions of Block Ciphers with ResisTAnce to ASCAs,2013 5th International Conference on Intelligent Networking and Collaborative Systems. IEEE, 2013: 226-232. (会议论文)
[16]Ming Tang, Zhenlong Qiu, et al,Power analysis based reverse engineering on the secret round function of block ciphers,International Conference on Data and Knowledge Engineering. Springer, Berlin, Heidelberg, 2012: 175-188. (会议论文)
[17]李延斌, 唐明, 等. 分组密码抗ASCA安全性研究. 计算机学报, 2016, 39(3):468-477.
[18]唐明,李延斌, 等. 高阶掩码防护的设计实现安全性研究. 计算机学报, 2018, 41(2): 323-335.
[19]郭志鹏, 唐明, 等. 基于软件指令定位的新型高阶侧信道分析方法. 计算机学报, 2019, 42(05):3-15.
[20]唐明, 王欣, 等. 针对轻量化掩码方案的功耗分析方法. 密码学报, 2014 (1): 51-63.
[21]唐明, 王蓬勃, 等. 一种高效的基于高阶 DPA 的掩码安全性评价方案. 密码学报, 2018, 5(4): 411-420.
[22]唐明, 高剑, 等.嵌入式平台下 ZUC 算法的侧信道频域攻击. 山东大学学报 (理学版) , 2014, 49(09): 29-34.
[23]唐明, 孙伟晋等. 针对随机时间片对抗的PA分析方法研究,Betway必威手机版学报(理学版),2013 (5): 481-485.
[24]唐明, 彭红波, 胡晓波, 等. 针对 RSM 轻量防护方法的能量分析. Betway必威手机版学报 (理学版), 2016, 62(3): 235-241.
[25]唐明, 王欣, 胡晓波, 等. 基于聚类分析的轻量化掩码分析方法. Betway必威手机版学报 (理学版), 2016, 62(3): 230-234.
[26]唐明,李煜光, 成超等. 针对高阶掩码的侧信道分析中组合函数优化方案. 武大学报 (理学版). 2018, 06: 485-490.
[27]罗买兴, 刘亮, 杨国峰, 等. 针对随机延迟防护的安全性评价方法研究. 武大学报 (理学版). 2018, 06: 491-500.
专著:
(1) 唐明,李莉,杜瑞颖,张焕国,密码编码学与网络安全,电子工业出版社,2014。
(2) 唐明,王后珍,韩海清,李春雷,童言,杨启,张焕国,计算机安全与密码学,电子工业出版社,2010。
国家、省市级科技奖励以及发明专利:
(1) 唐明,伍前红,高思,窦青,沈菲,李渡,演化S盒对抗旁路式攻击的方法,授权,2012.6.27, 中国,CN201010181237.6。
(2) 唐明,伍前红,张焕国,高思,窦青,沈菲,李渡,张驭宇,王国熹,一种利用DPA曲线极性进行密钥提取的方法及系统,2013.6.19,中国,CN201010239907.5。
(3) 唐明,伍前红,邱镇龙,高思,程平攀,赵黎,卢春红,一种DPA安全性评测与对抗方法及其装置,2014.4.2,中国,CN201110127718.3。
(4) 唐明,邓慧,伍前红,沈菲,张欣雨,邱镇龙,一种针对Twofish加密芯片的DFA分析方法及系统,2014.4.16,中国,CN201110137171.5。
(5) 唐明,杨建康,孙伟晋,陈彦昊,李伟杰,一种用于感应电路旁路信号的敏感元装置及其检测方法,2015.4.15,中国,CN201210299908.8。
(6) 唐明,邱镇龙,彭红波,孙伟晋,王欣,李延斌,向潇,通用式加密设备功耗捕获系统及方法,2015.11.18,中国,CN201310519603.8。
(7) 唐明,邱镇龙,彭红波,孙伟晋,王欣,李延斌,向潇,通用式加密设备功耗捕获系统及方法,2015.11.18,中国,CN201310519603.8。
(8) 唐明,邱镇龙,彭红波,孙伟晋,王欣,李延斌,向潇,一种面向侧信道分析的智能密码系统,2017.3.29,中国,CN201410127721.9。
(9) 唐明,邱镇龙,孙乐昊,高剑,张昭麒,王蓬勃,一种面向嵌入式平台的侧信道分析系统及方法,2017.3.29,中国,CN201410154709.7。
(10)唐明,邱镇龙,孙乐昊,高剑,王蓬勃,张昭麒,张焕国,一种面向移动通信平台的即时通信软件侧信道测试系统,2017.7.25,中国,CN201410282524.4。
(11)唐明,邱镇龙,郭志鹏,一种抗任意阶侧信道攻击的掩码防护方法及系统,2019.4.12,中国,CN201610588636.1。
(12)唐明,郭志鹏,李煜光,李延斌,王蓬勃,一种复杂度可变的任意阶掩码防护方法,2019.3.19,中国,CN201610584188.8。