**Email:** junfeng.fan@esat.kuleuven.be

**Address:**

Office: 01.47

Phone: +32 (0)16 32 10 44

K.U.Leuven, ESAT/COSIC

Kasteelpark Arenberg 10, bus 2446

Belgium

## Welcome!

** **

**Bio**

**Research**

**Publications**

[ International Journals ]

J. Fan, L. Batina, and I. Verbauwhede, "Implementation of Hyperelliptic Curve Cryptography Using a Unified Multiplier and Inverter," to appear in Integration, the VLSI journal, 24 pages, 2011

M. Knezevic, K. Kobayashi, J. Ikegami, S. Matsuo, A. Satoh, U. Kocabas, J. Fan, T. Katashita, T. Sugawara, K. Sakiyama, I. Verbauwhede, K. Ohta, N. Homma, and T. Aoki, "Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates,"

*IEEE Transactions on Very Large Scale Integration (VLSI) Systems*PP(99), pp. 1-13, 2011.

K. Sakiyama, M. Knezevic, J. Fan, B. Preneel, and I. Verbauwhede, "Tripartite Modular Multiplication," to appear in Integration, the VLSI journal, 14 pages, 2011.

J. Fan, K. Sakiyama, and I. Verbauwhede, "Elliptic Curve Cryptography on Embedded Multicore Systems," In

*Workshop on Embedded Systems Security - WESS 2007*, pp. 17-22, 2007.

[ Book Chapters ]

M. Knezevic, L. Batina, E. De Mulder, J. Fan, B. Gierlichs, Y. K. Lee, R. Maes, and I. Verbauwhede, "Signal Processing for Cryptography and Security Applications," In

*Handbook of Signal Processing Systems*, S. S. Bhattacharyya, E. F. Deprettere, R. Leupers, and J. Takala (eds.), Springer, pp. 161-177, 2010.

[ Refereed Conference Papers ]

J. Fan, B. Gierlichs, and F. Vercauteren, "To Infinity and Beyond: Combined Attack on ECC using Points of Low Order," In

*Cryptographic Hardware and Embedded Systems - CHES 2011*, Lecture Notes in Computer Science, B. Preneel, and T. Takagi (eds.), Springer-Verlag, 16 pages, 2011.

R. C. Cheung, S. Duquesne, J. Fan, N. Guillermin, I. Verbauwhede, and G. Xiaoxu Yao, "FPGA Implementations of Pairing using Residue Number System and Lazy Reduction," In

*Cryptographic Hardware and Embedded Systems - CHES 2011*, Lecture Notes in Computer Science, B. Preneel, and T. Takagi (eds.), Springer-Verlag, 21 pages, 2011.

D. Karaklajic, J. Fan, and I. Verbauwhede, "Systematic Security Evaluation Method Agains C Safe-Error Attacks," In

*4th IEEE International Workshop on Hardware-Oriented Security and Trust - HOST 2011*, IEEE, pp. 63-66, 2011.

D. Karaklajic, J. Fan, J. Schmidt, and I. Verbauwhede, "Low-cost Fault Detection Method for ECC using Montgomery Powering Ladder," In

*Design, Automation and Test in Europe (DATE 2011)*, IEEE, pp. 1016-1021, 2011.

J. Fan, D. V. Bailey, L. Batina, T. Guneysu, C. Paar, and I. Verbauwhede, "Breaking Elliptic Curves Cryptosystems using Reconfigurable Hardware," In

*2010th International Conference on Field Programmable Logic and Applications (FPL 2010)*, IEEE, pp. 133-138, 2010.

J. Fan, J. Hermans, and F. Vercauteren, "On the claimed privacy of EC-RAC III," In

*Workshop on RFID Security 2010*, Lecture Notes in Computer Science 6370, S. B. örs (ed.), pp. 66-74, 2010.

J. Fan, X. Guo, E. De Mulder, P. Schaumont, B. Preneel, and I. Verbauwhede, "State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures," In

*3rd IEEE International Workshop on Hardware-Oriented Security and Trust - HOST 2010*, IEEE, pp. 76-87, 2010.

K. Kobayashi, J. Ikegami, M. Knezevic, X. Guo, S. Matsuo, S. Huang, L. Nazhandali, U. Kocabas, J. Fan, A. Satoh, I. Verbauwhede, K. Sakiyama, and K. Ohta, "Prototyping Platform for Performance Evaluation of SHA-3 Candidates," In

*3rd IEEE International Workshop on Hardware-Oriented Security and Trust - HOST 2010*, IEEE, pp. 60-63, 2010.

J. Fan, F. Vercauteren, and I. Verbauwhede, "Faster Fp-arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves," In

*Cryptographic Hardware and Embedded Systems - CHES 2009*, Lecture Notes in Computer Science 5747, C. Clavier, and K. Gaj (eds.), Springer-Verlag, pp. 240-253, 2009.

X. Guo, J. Fan, P. Schaumont, and I. Verbauwhede, "Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security," In

*Cryptographic Hardware and Embedded Systems - CHES 2009*, Lecture Notes in Computer Science 5747, C. Clavier, and K. Gaj (eds.), Springer-Verlag, pp. 289-303, 2009.

J. Fan, and I. Verbauwhede, "A digit-serial architecture for inversion and multiplication in GF(2m)," In

*IEEE Workshop on Signal Processing Systems: Design and Implementation (SIPS 2008)*, IEEE, pp. 7-12, 2008.

J. Fan, L. Batina, and I. Verbauwhede, "HECC Goes Embedded: An Area-efficient Implementation of HECC," In

*Selected Areas in Cryptography, 15th Annual International Workshop, SAC 2008*, Lecture Notes in Computer Science 5381, R. Avanzi, L. Keliher, and F. Sica (eds.), Springer-Verlag, pp. 387--400, 2008.

J. Fan, L. Batina, K. Sakiyama, and I. Verbauwhede, "FPGA Design for Algebraic Tori Based Public Key Cryptography," In

*Design, Automation and Test in Europe (DATE 2008)*, IEEE, pp. 1292-1297, 2008.

M. Knezevic, K. Sakiyama, J. Fan, and I. Verbauwhede, "Modular Reduction in GF(2^n) Without Pre-Computational Phase," In

*International Workshop on the Arithmetic of Finite Fields (WAIFI 2008)*, Lecture Notes in Computer Science 5130, Ç. K. Koç, J. Luis Imana, and J. Von zur Gathen (eds.), Springer-Verlag, pp. 77-87, 2008.

J. Fan, K. Sakiyama, and I. Verbauwhede, "Montgomery Modular Multiplication Algorithm on Multi-Core Systems," In

*IEEE Workshop on Signal Processing Systems: Design and Implementation (SIPS 2007)*, IEEE, pp. 261-266, 2007.

[ Internal Reports ]

J. Fan, "Hardware Evaluation of The Hash Function Hamsi," COSIC internal report, 5 pages, 2009.

D. Karaklajic, J. Fan, and I. Verbauwhede, "The Devil is in Details: A Safe-Error Attack on a Tiny ECC Processor," COSIC internal report, 14 pages, 2011.

**Talks**