Wen Wang
Wen Wang
Intel Labs
Bestätigte E-Mail-Adresse bei yale.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Round 1 Classic McEliece: Conservative Code-Based Cryptography
DJ Bernstein, T Chou, T Lange, I von Maurich, R Misoczki, ...
NIST PQC Standardization Process - 1st Round, 2017, 2017
76*2017
FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes
W Wang, J Szefer, R Niederhagen
International Conference on Post-Quantum Cryptography (PQCrypto), 2018, 2018
412018
XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V
W Wang, B Jungk, J Wälde, S Deng, N Gupta, J Szefer, R Niederhagen
Selected Areas in Cryptography (SAC), 2019, 2019
23*2019
FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes
W Wang, J Szefer, R Niederhage
Conference on Cryptographic Hardware and Embedded Systems (CHES), 2017, 2017
192017
Growth of Bi2Se3 and Bi2Te3 on Amorphous Fused Silica by MBE
TH L. J. Collins-McIntyre, W. Wang, B. Zhou, Y. L. Chen
Phys. Status Solidi B, 2015
18*2015
Parameterized hardware accelerators for lattice-based cryptography and their application to the HW/SW co-design of qtesla
W Wang, S Tian, B Jungk, N Bindel, P Longa, J Szefer
IACR transactions on cryptographic hardware and embedded systems 2020 (3), 2020
122020
Optimized polynomial multiplier over commutative rings on FPGAs: A case study on BIKE
J Hu, W Wang, RCC Cheung, H Wang
2019 International Conference on Field-Programmable Technology (ICFPT), 231-234, 2019
102019
Solving Large Systems of Linear Equations over GF(2) on FPGAs.
W Wang, J Szefer, R Niederhagen
International Conference on Reconfigurable Computing and FPGAs (ReConFig), 2016, 2016
72016
Design and Implementation of Open-Source SATA III Core for Stratix V FPGAs
S Guha, W Wang, S Ibraheem, B Mahesh, J Szefer
International Conference on Field-Programmable Technology (FPT), 2016, 2016
32016
The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3.
P Longa, W Wang, J Szefer
IACR Cryptol. ePrint Arch. 2020, 1457, 2020
22020
Merge-exchange sort based discrete Gaussian sampler with fixed memory access pattern
S Tian, W Wang, J Szefer
2019 International Conference on Field-Programmable Technology (ICFPT), 126-134, 2019
22019
Round 2 Classic McEliece: Conservative Code-Based Cryptography
DJ Bernstein, T Chou, T Lange, R Misoczki, R Niederhagen, E Persichetti, ...
NIST PQC Standardization Process - 2nd Round, 2019, 2019
2*2019
Classic McEliece: conservative code-based cryptography 29 November 2017
DJ Bernstein, T Chou, T Lange, R Misoczki, R Niederhagen, E Persichetti, ...
22017
Post-Quantum Secure Architectures for Automotive Hardware Secure Modules.
W Wang, M Stöttinger
IACR Cryptol. ePrint Arch. 2020, 26, 2020
12020
ASIC Accelerator in 28 nm for the Post-Quantum Digital Signature Scheme XMSS
P Mohan, W Wang, B Jungk, R Niederhagen, J Szefer, K Mai
2020 IEEE 38th International Conference on Computer Design (ICCD), 656-662, 2020
2020
Classic McEliece: conservative code-based cryptography 10 October 2020
T Chou, C Cid, S UiB, J Gilcher, T Lange, V Maram, R Misoczki, ...
2020
Pipeline-aware Logic Deduplication in High-Level Synthesis for Post-Quantum Cryptography Algorithms
C Kim, Y Lee, S Jeong, W Wang, J Szefer, H Kim
Proceedings of the 2020 ACM/SIGDA International Symposium on Field …, 2020
2020
Poster and Demo: FPGA-based Post-Quantum Secure Niederreiter Cryptosystem
W Wang, J Szefer, R Niederhagen
International Symposium on Hardware Oriented Security and Trust (HOST), 2018, 2018
2018
Post-Quantum Cryptography on FPGAs: The Niederreiter Cryptosystem: Extended Abstract
W Wang, J Szefer, R Niederhagen
Great Lakes Symposium on VLSI (GLSVLSI), 2018, 2018
2018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–19