Folgen
Weijia Wang
Titel
Zitiert von
Zitiert von
Jahr
Ridge-based DPA: Improvement of differential power analysis for nanoscale chips
W Wang, Y Yu, FX Standaert, J Liu, Z Guo, D Gu
IEEE Transactions on Information Forensics and Security 13 (5), 1301-1316, 2017
412017
SAND: An AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
S Chen, Y Fan, L Sun, Y Fu, H Zhou, Y Li, M Wang, W Wang, C Guo
Designs, Codes and Cryptography, 1-44, 2022
292022
Efficient and private computations with code-based masking
W Wang, P Méaux, G Cassiers, FX Standaert
IACR Transactions on Cryptographic Hardware and Embedded Systems, 128-171, 2020
252020
Inner product masking for bitslice ciphers and security order amplification for linear leakages
W Wang, FX Standaert, Y Yu, S Pu, J Liu, Z Guo, D Gu
Smart Card Research and Advanced Applications: 15th International Conference …, 2017
252017
A power analysis on SMS4 using the chosen plaintext method
S Wang, D Gu, J Liu, Z Guo, W Wang, S Bao
2013 Ninth International Conference on Computational Intelligence and …, 2013
212013
Trace augmentation: What can be done even before preprocessing in a profiled sca?
S Pu, Y Yu, W Wang, Z Guo, J Liu, D Gu, L Wang, J Gan
Smart Card Research and Advanced Applications: 16th International Conference …, 2018
172018
Weakness in 802.11 w and an improved mechanism on protection of management frame
W Wang, H Wang
2011 International Conference on Wireless Communications and Signal …, 2011
172011
Towards low-latency implementation of linear layers
Q Liu, W Wang, Y Fan, L Wu, L Sun, M Wang
Cryptology ePrint Archive, 2022
112022
Provable security of SP networks with partial non-linear layers
C Guo, FX Standaert, W Wang, X Wang, Y Yu
IACR Transactions on Symmetric Cryptology, 353-388, 2021
82021
Ridge-based profiled differential power analysis
W Wang, Y Yu, FX Standaert, D Gu, X Sen, C Zhang
Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA …, 2017
82017
Pushing the limits: Searching for implementations with the smallest area for lightweight s-boxes
Z Lu, W Wang, K Hu, Y Fan, L Wu, M Wang
Progress in Cryptology–INDOCRYPT 2021: 22nd International Conference on …, 2021
72021
Packed multiplication: how to amortize the cost of side-channel masking?
W Wang, C Guo, FX Standaert, Y Yu, G Cassiers
International Conference on the Theory and Application of Cryptology and …, 2020
62020
Efficient side-channel secure message authentication with better bounds
C Guo, FX Standaert, W Wang, Y Yu
Cryptology ePrint Archive, 2019
62019
Evaluation and improvement of generic-emulating DPA attacks
W Wang, Y Yu, J Liu, Z Guo, FX Standaert, D Gu, S Xu, R Fu
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
62015
Improved Power Analysis Attacks on Falcon
S Zhang, X Lin, Y Yu, W Wang
Annual International Conference on the Theory and Applications of …, 2023
52023
More inputs makes difference: implementations of linear layers using gates with more than two inputs
Q Liu, W Wang, L Sun, Y Fan, L Wu, M Wang
Cryptology ePrint Archive, 2022
42022
Side-channel analysis for the authentication protocols of CDMA cellular networks
C Zhang, JR Liu, DW Gu, WJ Wang, XJ Lu, Z Guo, HN Lu
Journal of Computer Science and Technology 34, 1079-1095, 2019
42019
Provable order amplification for code-based masking: How to avoid non-linear leakages due to masked operations
W Wang, Y Yu, FX Standaert
IEEE Transactions on Information Forensics and Security 14 (11), 3069-3082, 2019
42019
Similar operation template attack on RSA-CRT as a case study
S Xu, X Lu, K Zhang, Y Li, L Wang, W Wang, H Gu, Z Guo, J Liu, D Gu
Science China Information Sciences 61, 1-17, 2018
42018
Efficient private circuits with precomputation
W Wang, F Ji, J Zhang, Y Yu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 286-309, 2023
32023
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20