<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://nueess.coe.neu.edu/nueess/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://nueess.coe.neu.edu/nueess/index.php?feed=atom&amp;target=LaoJian&amp;title=Special%3AContributions</id>
		<title>NUEESS - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="http://nueess.coe.neu.edu/nueess/index.php?feed=atom&amp;target=LaoJian&amp;title=Special%3AContributions"/>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Special:Contributions/LaoJian"/>
		<updated>2026-05-15T14:10:02Z</updated>
		<subtitle>From NUEESS</subtitle>
		<generator>MediaWiki 1.15.5-7</generator>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-08-02T04:54:53Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;/* Models */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis attack is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly. The two most widely developed techniques for power analysis attacks are DPA (Differential Power Analysis) and CPA (Correlation Power Analysis).&lt;br /&gt;
&lt;br /&gt;
==Models==&lt;br /&gt;
&lt;br /&gt;
Both DPA and CPA shares a common assumption, which is, a cryptographic system will consume power when its output state changes. This assumption is reasonable, since most modern cryptographic systems are implemented based on semiconductor technology. Output state change means there are electrons charged to, or discharged from the semiconductor transistors, causing current flow and resulting in power consumption. This kind of output state change is also called transition. We will take [http://en.wikipedia.org/wiki/Data_Encryption_Standard DES] (Data Encryption Standard) as an example to illustrate the DPA and CPA procedure.&lt;br /&gt;
&lt;br /&gt;
The classical DPA on DES attacks 1 single bit of the transition from 15th round output {R15} and 16 round output {R16}, which is R15 XOR R16 as shown in the figure on the right.&lt;br /&gt;
&lt;br /&gt;
==Evaluations==&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-08-02T04:50:13Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;/* Models */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis attack is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly. The two most widely developed techniques for power analysis attacks are DPA (Differential Power Analysis) and CPA (Correlation Power Analysis).&lt;br /&gt;
&lt;br /&gt;
==Models==&lt;br /&gt;
&lt;br /&gt;
Both DPA and CPA shares a common assumption, which is, a cryptographic system will consume power when its output state changes. This assumption is reasonable, since most modern cryptographic systems are implemented based on semiconductor technology. Output state change means there are electrons charged to, or discharged from the semiconductor transistors, causing current flow and resulting in power consumption. This kind of output state change is also called transition. We will take [http://en.wikipedia.org/wiki/Data_Encryption_Standard DES] (Data Encryption Standard) as an example to illustrate the DPA and CPA procedure.&lt;br /&gt;
&lt;br /&gt;
The classical DPA on DES attacks 1 single bit of the transition from 15th round output {R15} and 16 round output {R16}, which is R15 XOR R16 as shown in the figure on the right.&lt;br /&gt;
&amp;lt;math&amp;gt;R15 \lor r16&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Evaluations==&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-08-02T04:50:02Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;/* Models */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis attack is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly. The two most widely developed techniques for power analysis attacks are DPA (Differential Power Analysis) and CPA (Correlation Power Analysis).&lt;br /&gt;
&lt;br /&gt;
==Models==&lt;br /&gt;
&lt;br /&gt;
Both DPA and CPA shares a common assumption, which is, a cryptographic system will consume power when its output state changes. This assumption is reasonable, since most modern cryptographic systems are implemented based on semiconductor technology. Output state change means there are electrons charged to, or discharged from the semiconductor transistors, causing current flow and resulting in power consumption. This kind of output state change is also called transition. We will take [http://en.wikipedia.org/wiki/Data_Encryption_Standard DES] (Data Encryption Standard) as an example to illustrate the DPA and CPA procedure.&lt;br /&gt;
&lt;br /&gt;
The classical DPA on DES attacks 1 single bit of the transition from 15th round output {R15} and 16 round output {R16}, which is R15 XOR R16 as shown in the figure on the right.&lt;br /&gt;
&amp;lt;math&amp;gt;R15 \or r16&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Evaluations==&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-08-02T04:49:24Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;/* Models */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis attack is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly. The two most widely developed techniques for power analysis attacks are DPA (Differential Power Analysis) and CPA (Correlation Power Analysis).&lt;br /&gt;
&lt;br /&gt;
==Models==&lt;br /&gt;
&lt;br /&gt;
Both DPA and CPA shares a common assumption, which is, a cryptographic system will consume power when its output state changes. This assumption is reasonable, since most modern cryptographic systems are implemented based on semiconductor technology. Output state change means there are electrons charged to, or discharged from the semiconductor transistors, causing current flow and resulting in power consumption. This kind of output state change is also called transition. We will take [http://en.wikipedia.org/wiki/Data_Encryption_Standard DES] (Data Encryption Standard) as an example to illustrate the DPA and CPA procedure.&lt;br /&gt;
&lt;br /&gt;
The classical DPA on DES attacks 1 single bit of the transition from 15th round output {R15} and 16 round output {R16}, which is R15 XOR R16 as shown in the figure on the right.&lt;br /&gt;
&amp;lt;math&amp;gt;R15 \oplus r16&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Evaluations==&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-08-02T04:29:07Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;/* Models */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis attack is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly. The two most widely developed techniques for power analysis attacks are DPA (Differential Power Analysis) and CPA (Correlation Power Analysis).&lt;br /&gt;
&lt;br /&gt;
==Models==&lt;br /&gt;
&lt;br /&gt;
Both DPA and CPA shares a common assumption, which is, a cryptographic system will consume power when its output state changes. This assumption is reasonable, since most modern cryptographic systems are implemented based on semiconductor technology. Output state change means there are electrons charged to, or discharged from the semiconductor transistors, causing current flow and resulting in power consumption. This kind of output state change is also called transition. We will take [http://en.wikipedia.org/wiki/Data_Encryption_Standard DES] (Data Encryption Standard) as an example to illustrate the DPA and CPA procedure.&lt;br /&gt;
&lt;br /&gt;
The classical DPA on DES attacks 1 single bit of the transition from 15th round output {R15} and 16 round output {R16}, which is R15 XOR R16 as shown in the figure on the right.&lt;br /&gt;
&lt;br /&gt;
==Evaluations==&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-08-02T04:25:34Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;/* Models */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis attack is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly. The two most widely developed techniques for power analysis attacks are DPA (Differential Power Analysis) and CPA (Correlation Power Analysis).&lt;br /&gt;
&lt;br /&gt;
==Models==&lt;br /&gt;
&lt;br /&gt;
Both DPA and CPA shares a common assumption, which is, a cryptographic system will consume power when its output state changes. This assumption is reasonable, since most modern cryptographic systems are implemented based on semiconductor technology. Output state change means there are electrons charged to, or discharged from the semiconductor transistors, causing current flow and resulting in power consumption. This kind of output state change is also called transition. We will take [http://en.wikipedia.org/wiki/Data_Encryption_Standard DES] (Data Encryption Standard) as an example to illustrate the DPA and CPA procedure.&lt;br /&gt;
&lt;br /&gt;
The classical DPA on DES attacks 1 single bit of the transition from 15th round output {R15} and 16 round output {R16}, which is a 32-bit vector R15 XOR R16.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;math&amp;gt;\min \qquad J = \frac{{C_{{k_n}}^{}}}{{U_{{k_n}}^{}}} + (I - \sum\limits_{i = 1}^I {s_i^{{k_n}}} ){P_T} &lt;br /&gt;
&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Evaluations==&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-08-02T04:21:24Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;/* Models */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis attack is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly. The two most widely developed techniques for power analysis attacks are DPA (Differential Power Analysis) and CPA (Correlation Power Analysis).&lt;br /&gt;
&lt;br /&gt;
==Models==&lt;br /&gt;
&lt;br /&gt;
Both DPA and CPA shares a common assumption, which is, a cryptographic system will consume power when its output state changes. This assumption is reasonable, since most modern cryptographic systems are implemented based on semiconductor technology. Output state change means there are electrons charged to, or discharged from the semiconductor transistors, causing current flow and resulting in power consumption. This kind of output state change is also called transition. We will take [http://en.wikipedia.org/wiki/Data_Encryption_Standard DES] (Data Encryption Standard) as an example to illustrate the DPA and CPA procedure.&lt;br /&gt;
&lt;br /&gt;
The classical DPA on DES attacks 1 single bit of the transition from 15th round output {R15} and 16 round output {R16}, which is &amp;lt;math&amp;gt;R15 \oplus R16&amp;lt;/math&amp;gt;,&lt;br /&gt;
&lt;br /&gt;
==Evaluations==&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-08-02T04:20:04Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;/* Models */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis attack is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly. The two most widely developed techniques for power analysis attacks are DPA (Differential Power Analysis) and CPA (Correlation Power Analysis).&lt;br /&gt;
&lt;br /&gt;
==Models==&lt;br /&gt;
&lt;br /&gt;
Both DPA and CPA shares a common assumption, which is, a cryptographic system will consume power when its output state changes. This assumption is reasonable, since most modern cryptographic systems are implemented based on semiconductor technology. Output state change means there are electrons charged to, or discharged from the semiconductor transistors, causing current flow and resulting in power consumption. This kind of output state change is also called transition. We will take [http://en.wikipedia.org/wiki/Data_Encryption_Standard DES] (Data Encryption Standard) as an example to illustrate the DPA and CPA procedure.&lt;br /&gt;
&lt;br /&gt;
The classical DPA on DES attacks 1 single bit of the transition from 15th round output {R15} and 16 round output {R16}, which is disjunction &amp;lt;math&amp;gt;p \oplus q&amp;lt;/math&amp;gt;,&lt;br /&gt;
&lt;br /&gt;
&amp;lt;math&amp;gt;\begin{matrix}&lt;br /&gt;
p \oplus q &amp;amp; = &amp;amp; (p \land \lnot q) \lor (\lnot p \land q)&lt;br /&gt;
\end{matrix}&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Evaluations==&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-08-02T04:19:25Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;/* Models */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis attack is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly. The two most widely developed techniques for power analysis attacks are DPA (Differential Power Analysis) and CPA (Correlation Power Analysis).&lt;br /&gt;
&lt;br /&gt;
==Models==&lt;br /&gt;
&lt;br /&gt;
Both DPA and CPA shares a common assumption, which is, a cryptographic system will consume power when its output state changes. This assumption is reasonable, since most modern cryptographic systems are implemented based on semiconductor technology. Output state change means there are electrons charged to, or discharged from the semiconductor transistors, causing current flow and resulting in power consumption. This kind of output state change is also called transition. We will take [http://en.wikipedia.org/wiki/Data_Encryption_Standard DES] (Data Encryption Standard) as an example to illustrate the DPA and CPA procedure.&lt;br /&gt;
&lt;br /&gt;
The classical DPA on DES attacks 1 single bit of the transition from 15th round output {R15} and 16 round output {R16}, which is disjunction &amp;lt;math&amp;gt;p \oplus q&amp;lt;/math&amp;gt;,&lt;br /&gt;
&lt;br /&gt;
==Evaluations==&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-08-02T04:19:06Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;/* Models */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis attack is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly. The two most widely developed techniques for power analysis attacks are DPA (Differential Power Analysis) and CPA (Correlation Power Analysis).&lt;br /&gt;
&lt;br /&gt;
==Models==&lt;br /&gt;
&lt;br /&gt;
Both DPA and CPA shares a common assumption, which is, a cryptographic system will consume power when its output state changes. This assumption is reasonable, since most modern cryptographic systems are implemented based on semiconductor technology. Output state change means there are electrons charged to, or discharged from the semiconductor transistors, causing current flow and resulting in power consumption. This kind of output state change is also called transition. We will take [http://en.wikipedia.org/wiki/Data_Encryption_Standard DES] (Data Encryption Standard) as an example to illustrate the DPA and CPA procedure.&lt;br /&gt;
&lt;br /&gt;
The classical DPA on DES attacks 1 single bit of the transition from 15th round output {R15} and 16 round output {R16}, which is &amp;lt;math&amp;gt; R15 \oplus R16&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Evaluations==&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-08-02T04:13:46Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;/* Models */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis attack is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly. The two most widely developed techniques for power analysis attacks are DPA (Differential Power Analysis) and CPA (Correlation Power Analysis).&lt;br /&gt;
&lt;br /&gt;
==Models==&lt;br /&gt;
&lt;br /&gt;
Both DPA and CPA shares a common assumption, which is, a cryptographic system will consume power when its output state changes. This assumption is reasonable, since most modern cryptographic systems are implemented based on semiconductor technology. Output state change means there are electrons charged to, or discharged from the semiconductor transistors, causing current flow and resulting in power consumption. This kind of output state change is also called transition. We will take [http://en.wikipedia.org/wiki/Data_Encryption_Standard DES] (Data Encryption Standard) as an example to illustrate the DPA and CPA procedure.&lt;br /&gt;
&lt;br /&gt;
The classical DPA on DES attacks 1 single bit of the transition from 15th round output {R15} and 16 round output {R16}, which is &amp;lt;math&amp;gt;R15 \oplus R16&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Evaluations==&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-08-01T21:33:15Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;/* Models */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis attack is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly. The two most widely developed techniques for power analysis attacks are DPA (Differential Power Analysis) and CPA (Correlation Power Analysis).&lt;br /&gt;
&lt;br /&gt;
==Models==&lt;br /&gt;
&lt;br /&gt;
Both DPA and CPA shares a common assumption, which is, a cryptographic system will consume power when its output state changes. This assumption is reasonable, since most modern cryptographic systems are implemented based on semiconductor technology. Output state change means there are electrons charged to, or discharged from the semiconductor transistors, causing current flow and resulting in power consumption. This kind of output state change is also called transition. We will take [http://en.wikipedia.org/wiki/Data_Encryption_Standard DES] (Data Encryption Standard) as an example to illustrate the DPA and CPA procedure.&lt;br /&gt;
&lt;br /&gt;
The classical DPA on DES attacks 1 single bit of the transition from 15th round output and 16 round output.&lt;br /&gt;
&lt;br /&gt;
==Evaluations==&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-08-01T19:58:52Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;/* Models */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis attack is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly. The two most widely developed techniques for power analysis attacks are DPA (Differential Power Analysis) and CPA (Correlation Power Analysis).&lt;br /&gt;
&lt;br /&gt;
==Models==&lt;br /&gt;
&lt;br /&gt;
Both DPA and CPA shares a common assumption, which is, a cryptographic system will consume power when its output state changes. This assumption is reasonable, since most modern cryptographic systems are implemented based on semiconductor technology. Output state change means there are electrons charged to, or discharged from the semiconductor transistors, causing current flow and resulting in power consumption. This kind of output state change is also called transition. We will take [http://en.wikipedia.org/wiki/Data_Encryption_Standard DES] (Data Encryption Standard) as an example to illustrate the DPA and CPA procedure.&lt;br /&gt;
&lt;br /&gt;
==Evaluations==&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-08-01T19:57:57Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;/* Models */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis attack is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly. The two most widely developed techniques for power analysis attacks are DPA (Differential Power Analysis) and CPA (Correlation Power Analysis).&lt;br /&gt;
&lt;br /&gt;
==Models==&lt;br /&gt;
&lt;br /&gt;
Both DPA and CPA shares a common assumption, which is, a cryptographic system will consume power when its output state changes. This assumption is reasonable, since most modern cryptographic systems are implemented based on semiconductor technology. Output state change means there are electrons charged to, or discharged from the semiconductor transistors, causing current flow and resulting in power consumption. This kind of output state change is also called transition. We will take DES (Data Encryption Standard) as an example to illustrate the DPA and CPA procedure.&lt;br /&gt;
&lt;br /&gt;
==Evaluations==&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-08-01T19:55:50Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;/* General */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis attack is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly. The two most widely developed techniques for power analysis attacks are DPA (Differential Power Analysis) and CPA (Correlation Power Analysis).&lt;br /&gt;
&lt;br /&gt;
==Models==&lt;br /&gt;
&lt;br /&gt;
Both DPA and CPA shares a common assumption, which is, a cryptographic system will consume power when its output state changes. This assumption is reasonable, since most modern cryptographic systems are implemented based on semiconductor technology. Output state change means there are electrons charged to, or discharged from the semiconductor transistors, causing current flow and resulting in power consumption. This kind of output state change is also called transition.&lt;br /&gt;
&lt;br /&gt;
==Evaluations==&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-08-01T19:36:15Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;/* Models */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis attack is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly. The two most widely developed techniques for power analysis attacks are DPA (differential power analysis) and CPA (correlation power analysis).&lt;br /&gt;
&lt;br /&gt;
==Models==&lt;br /&gt;
&lt;br /&gt;
Both DPA and CPA shares a common assumption, which is, a cryptographic system will consume power when its output state changes. This assumption is reasonable, since most modern cryptographic systems are implemented based on semiconductor technology. Output state change means there are electrons charged to, or discharged from the semiconductor transistors, causing current flow and resulting in power consumption. This kind of output state change is also called transition.&lt;br /&gt;
&lt;br /&gt;
==Evaluations==&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-05-30T19:03:40Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis attack is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly. The two most widely developed techniques for power analysis attacks are DPA (differential power analysis) and CPA (correlation power analysis).&lt;br /&gt;
&lt;br /&gt;
==Models==&lt;br /&gt;
&lt;br /&gt;
==Evaluations==&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-05-30T19:01:21Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis attack is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly. The two most widely developed techniques for power analysis attacks are DPA (differential power analysis) and CPA (correlation power analysis).&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-05-30T18:58:12Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly.&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-05-30T18:37:38Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information. There are several attack methods, among which the power analysis is of our particular interest.&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-05-30T18:36:05Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information.&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-05-30T18:32:32Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage information and the targeted intermediate values, such as round keys.&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-05-30T18:12:24Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack]&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations</id>
		<title>Side-channel attacks, countermeasures, and evaluations</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Side-channel_attacks,_countermeasures,_and_evaluations"/>
				<updated>2012-05-30T18:11:39Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;Created page with &amp;quot;[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack]&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack]&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Jian_Lao</id>
		<title>Jian Lao</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Jian_Lao"/>
				<updated>2012-05-29T15:18:24Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Jian Lao&lt;br /&gt;
&lt;br /&gt;
PhD Candidate&lt;br /&gt;
&lt;br /&gt;
Department of Electrical and Computer Engineering&lt;br /&gt;
&lt;br /&gt;
Northeastern University&lt;br /&gt;
&lt;br /&gt;
360 Huntington Avenue&lt;br /&gt;
&lt;br /&gt;
Boston, MA 02115&lt;br /&gt;
&lt;br /&gt;
Email: jlao AT ece.neu.edu &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Education ==&lt;br /&gt;
*Ph.D. Candidate: [http://www.ece.neu.edu/ece Department of Electrical and Computer Engineering], [http://www.northeastern.edu/ Northeastern University], USA, current&lt;br /&gt;
:Advisor: [http://www.ece.neu.edu/ece/index.php/component/content/170?task=view Prof. Yunsi Fei]&lt;br /&gt;
&lt;br /&gt;
*M.S.: [http://www.soe.ucsc.edu School of Engineering], [http://www.ucsc.edu University of California, Santa Cruz], USA, 2011&lt;br /&gt;
&lt;br /&gt;
*M.S.: [http://eecs.pku.edu.cn School of Electronics Engineering and Computer Science], [http://english.pku.edu.cn Peking University], China, 2009&lt;br /&gt;
&lt;br /&gt;
*B.S.:  [http://eecs.pku.edu.cn School of Electronics Engineering and Computer Science], [http://english.pku.edu.cn Peking University], China, 2006&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Research ==&lt;br /&gt;
&lt;br /&gt;
*Side channel attack&lt;br /&gt;
*Computer architecture and security&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Jian_Lao</id>
		<title>Jian Lao</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Jian_Lao"/>
				<updated>2012-05-29T14:59:11Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Jian Lao&lt;br /&gt;
&lt;br /&gt;
PhD Candidate&lt;br /&gt;
&lt;br /&gt;
Department of Electrical and Computer Engineering&lt;br /&gt;
&lt;br /&gt;
Northeastern University&lt;br /&gt;
&lt;br /&gt;
360 Huntington Avenue&lt;br /&gt;
&lt;br /&gt;
Boston, MA 02115&lt;br /&gt;
&lt;br /&gt;
Email: jlao AT ece.neu.edu &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Education ==&lt;br /&gt;
*Ph.D. Candidate: [http://www.ece.neu.edu/ece Department of Electrical and Computer Engineering], [http://www.northeastern.edu/ Northeastern University], USA, current&lt;br /&gt;
:Advisor: [http://www.ece.neu.edu/ece/index.php/component/content/170?task=view Prof. Yunsi Fei]&lt;br /&gt;
&lt;br /&gt;
*M.S.: [http://www.soe.ucsc.edu School of Engineering], [http://www.ucsc.edu University of California, Santa Cruz], USA, 2011&lt;br /&gt;
&lt;br /&gt;
*M.S.: [http://eecs.pku.edu.cn School of Electronics Engineering and Computer Science], [http://english.pku.edu.cn Peking University], China, 2009&lt;br /&gt;
&lt;br /&gt;
*B.S.:  [http://eecs.pku.edu.cn School of Electronics Engineering and Computer Science], [http://english.pku.edu.cn Peking University], China, 2006&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Jian_Lao</id>
		<title>Jian Lao</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Jian_Lao"/>
				<updated>2012-05-29T14:58:34Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;/* Education */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Yu Han&lt;br /&gt;
&lt;br /&gt;
PhD Candidate&lt;br /&gt;
&lt;br /&gt;
Department of Electrical and Computer Engineering&lt;br /&gt;
&lt;br /&gt;
Northeastern University&lt;br /&gt;
&lt;br /&gt;
360 Huntington Avenue&lt;br /&gt;
&lt;br /&gt;
Boston, MA 02115&lt;br /&gt;
&lt;br /&gt;
Email: yhan AT ece.neu.edu &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jian Lao&lt;br /&gt;
&lt;br /&gt;
PhD Candidate&lt;br /&gt;
&lt;br /&gt;
Department of Electrical and Computer Engineering&lt;br /&gt;
&lt;br /&gt;
Northeastern University&lt;br /&gt;
&lt;br /&gt;
360 Huntington Avenue&lt;br /&gt;
&lt;br /&gt;
Boston, MA 02115&lt;br /&gt;
&lt;br /&gt;
Email: jlao AT ece.neu.edu &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Education ==&lt;br /&gt;
*Ph.D. Candidate: [http://www.ece.neu.edu/ece Department of Electrical and Computer Engineering], [http://www.northeastern.edu/ Northeastern University], USA, current&lt;br /&gt;
:Advisor: [http://www.ece.neu.edu/ece/index.php/component/content/170?task=view Prof. Yunsi Fei]&lt;br /&gt;
&lt;br /&gt;
*M.S.: [http://www.soe.ucsc.edu School of Engineering], [http://www.ucsc.edu University of California, Santa Cruz], USA, 2011&lt;br /&gt;
&lt;br /&gt;
*M.S.: [http://eecs.pku.edu.cn School of Electronics Engineering and Computer Science], [http://english.pku.edu.cn Peking University], China, 2009&lt;br /&gt;
&lt;br /&gt;
*B.S.:  [http://eecs.pku.edu.cn School of Electronics Engineering and Computer Science], [http://english.pku.edu.cn Peking University], China, 2006&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Jian_Lao</id>
		<title>Jian Lao</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Jian_Lao"/>
				<updated>2012-05-29T14:57:48Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;/* Education */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Yu Han&lt;br /&gt;
&lt;br /&gt;
PhD Candidate&lt;br /&gt;
&lt;br /&gt;
Department of Electrical and Computer Engineering&lt;br /&gt;
&lt;br /&gt;
Northeastern University&lt;br /&gt;
&lt;br /&gt;
360 Huntington Avenue&lt;br /&gt;
&lt;br /&gt;
Boston, MA 02115&lt;br /&gt;
&lt;br /&gt;
Email: yhan AT ece.neu.edu &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Education ==&lt;br /&gt;
*Ph.D. Candidate: [http://www.ece.neu.edu/ece Department of Electrical and Computer Engineering], [http://www.northeastern.edu/ Northeastern University], USA, current&lt;br /&gt;
:Advisor: [http://www.ece.neu.edu/ece/index.php/component/content/170?task=view Prof. Yunsi Fei]&lt;br /&gt;
&lt;br /&gt;
*M.S.: [http://www.soe.ucsc.edu School of Engineering], [http://www.ucsc.edu University of California, Santa Cruz], USA, 2011&lt;br /&gt;
&lt;br /&gt;
*M.S.: [http://eecs.pku.edu.cn School of Electronics Engineering and Computer Science], [http://english.pku.edu.cn Peking University], China, 2009&lt;br /&gt;
&lt;br /&gt;
*B.S.:  [http://eecs.pku.edu.cn School of Electronics Engineering and Computer Science], [http://english.pku.edu.cn Peking University], China, 2006&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	<entry>
		<id>http://nueess.coe.neu.edu/nueess/index.php/Jian_Lao</id>
		<title>Jian Lao</title>
		<link rel="alternate" type="text/html" href="http://nueess.coe.neu.edu/nueess/index.php/Jian_Lao"/>
				<updated>2012-05-29T14:56:43Z</updated>
		
		<summary type="html">&lt;p&gt;LaoJian:&amp;#32;Created page with &amp;quot;== Education == *Ph.D. Candidate: [http://www.ece.neu.edu/ece Department of Electrical and Computer Engineering], [http://www.northeastern.edu/ Northeastern University], USA, cur…&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Education ==&lt;br /&gt;
*Ph.D. Candidate: [http://www.ece.neu.edu/ece Department of Electrical and Computer Engineering], [http://www.northeastern.edu/ Northeastern University], USA, current&lt;br /&gt;
:Advisor: [http://www.ece.neu.edu/ece/index.php/component/content/170?task=view Prof. Yunsi Fei]&lt;br /&gt;
&lt;br /&gt;
*M.S.: [http://www.soe.ucsc.edu School of Engineering], [http://www.ucsc.edu University of California, Santa Cruz], USA, 2011&lt;br /&gt;
&lt;br /&gt;
*M.S.: [http://eecs.pku.edu.cn School of Electronics Engineering and Computer Science], [http://english.pku.edu.cn Peking University], China, 2009&lt;br /&gt;
&lt;br /&gt;
*B.S.:  [http://eecs.pku.edu.cn School of Electronics Engineering and Computer Science], [http://english.pku.edu.cn Peking University], China, 2006&lt;/div&gt;</summary>
		<author><name>LaoJian</name></author>	</entry>

	</feed>