Ridge-based DPA: Improvement of differential power analysis for nanoscale chips W Wang, Y Yu, FX Standaert, J Liu, Z Guo, D Gu IEEE Transactions on Information Forensics and Security 13 (5), 1301-1316, 2017 | 49 | 2017 |
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations S Chen, Y Fan, L Sun, Y Fu, H Zhou, Y Li, M Wang, W Wang, C Guo Designs, Codes and Cryptography, 1-44, 2022 | 44 | 2022 |
Efficient and private computations with code-based masking W Wang, P Méaux, G Cassiers, FX Standaert IACR Transactions on Cryptographic Hardware and Embedded Systems, 128-171, 2020 | 39 | 2020 |
Inner product masking for bitslice ciphers and security order amplification for linear leakages W Wang, FX Standaert, Y Yu, S Pu, J Liu, Z Guo, D Gu Smart Card Research and Advanced Applications: 15th International Conference …, 2017 | 28 | 2017 |
A power analysis on SMS4 using the chosen plaintext method S Wang, D Gu, J Liu, Z Guo, W Wang, S Bao 2013 Ninth International Conference on Computational Intelligence and …, 2013 | 21 | 2013 |
Improved power analysis attacks on falcon S Zhang, X Lin, Y Yu, W Wang Annual International Conference on the Theory and Applications of …, 2023 | 18 | 2023 |
Trace augmentation: What can be done even before preprocessing in a profiled sca? S Pu, Y Yu, W Wang, Z Guo, J Liu, D Gu, L Wang, J Gan Smart Card Research and Advanced Applications: 16th International Conference …, 2018 | 18 | 2018 |
Weakness in 802.11 w and an improved mechanism on protection of management frame W Wang, H Wang 2011 International Conference on Wireless Communications and Signal …, 2011 | 17 | 2011 |
Towards low-latency implementation of linear layers Q Liu, W Wang, Y Fan, L Wu, L Sun, M Wang IACR Transactions on Symmetric Cryptology, 158-182, 2022 | 16 | 2022 |
Pushing the limits: Searching for implementations with the smallest area for lightweight s-boxes Z Lu, W Wang, K Hu, Y Fan, L Wu, M Wang Progress in Cryptology–INDOCRYPT 2021: 22nd International Conference on …, 2021 | 11 | 2021 |
Compact instruction set extensions for kyber L Li, G Qin, Y Yu, W Wang IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2023 | 9 | 2023 |
More inputs makes difference: Implementations of linear layers using gates with more than two inputs Q Liu, W Wang, L Sun, Y Fan, L Wu, M Wang Cryptology ePrint Archive, 2022 | 9 | 2022 |
Provable security of SP networks with partial non-linear layers C Guo, FX Standaert, W Wang, X Wang, Y Yu IACR Transactions on Symmetric Cryptology, 353-388, 2021 | 8 | 2021 |
Ridge-based profiled differential power analysis W Wang, Y Yu, FX Standaert, D Gu, X Sen, C Zhang Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA …, 2017 | 8 | 2017 |
Efficient private circuits with precomputation W Wang, F Ji, J Zhang, Y Yu IACR Transactions on Cryptographic Hardware and Embedded Systems, 286-309, 2023 | 7 | 2023 |
Packed multiplication: how to amortize the cost of side-channel masking? W Wang, C Guo, FX Standaert, Y Yu, G Cassiers International Conference on the Theory and Application of Cryptology and …, 2020 | 7 | 2020 |
Provable order amplification for code-based masking: How to avoid non-linear leakages due to masked operations W Wang, Y Yu, FX Standaert IEEE Transactions on Information Forensics and Security 14 (11), 3069-3082, 2019 | 7 | 2019 |
Efficient side-channel secure message authentication with better bounds C Guo, FX Standaert, W Wang, Y Yu Cryptology ePrint Archive, 2019 | 7 | 2019 |
Evaluation and improvement of generic-emulating DPA attacks W Wang, Y Yu, J Liu, Z Guo, FX Standaert, D Gu, S Xu, R Fu Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015 | 7 | 2015 |
Automated generation of masked nonlinear components: From lookup tables to private circuits L Wu, Y Fan, B Preneel, W Wang, M Wang International Conference on Applied Cryptography and Network Security, 319-339, 2024 | 6* | 2024 |