Follow
Weijia Wang
Title
Cited by
Cited by
Year
Ridge-based DPA: Improvement of differential power analysis for nanoscale chips
W Wang, Y Yu, FX Standaert, J Liu, Z Guo, D Gu
IEEE Transactions on Information Forensics and Security 13 (5), 1301-1316, 2017
482017
SAND: An AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
S Chen, Y Fan, L Sun, Y Fu, H Zhou, Y Li, M Wang, W Wang, C Guo
Designs, Codes and Cryptography, 1-44, 2022
372022
Efficient and private computations with code-based masking
W Wang, P Méaux, G Cassiers, FX Standaert
IACR Transactions on Cryptographic Hardware and Embedded Systems, 128-171, 2020
342020
Inner product masking for bitslice ciphers and security order amplification for linear leakages
W Wang, FX Standaert, Y Yu, S Pu, J Liu, Z Guo, D Gu
Smart Card Research and Advanced Applications: 15th International Conference …, 2017
262017
A power analysis on SMS4 using the chosen plaintext method
S Wang, D Gu, J Liu, Z Guo, W Wang, S Bao
2013 Ninth International Conference on Computational Intelligence and …, 2013
212013
Trace augmentation: What can be done even before preprocessing in a profiled sca?
S Pu, Y Yu, W Wang, Z Guo, J Liu, D Gu, L Wang, J Gan
Smart Card Research and Advanced Applications: 16th International Conference …, 2018
182018
Weakness in 802.11 w and an improved mechanism on protection of management frame
W Wang, H Wang
2011 International Conference on Wireless Communications and Signal …, 2011
172011
Towards low-latency implementation of linear layers
Q Liu, W Wang, Y Fan, L Wu, L Sun, M Wang
Cryptology ePrint Archive, 2022
142022
Improved power analysis attacks on falcon
S Zhang, X Lin, Y Yu, W Wang
Annual International Conference on the Theory and Applications of …, 2023
132023
Pushing the limits: Searching for implementations with the smallest area for lightweight s-boxes
Z Lu, W Wang, K Hu, Y Fan, L Wu, M Wang
Progress in Cryptology–INDOCRYPT 2021: 22nd International Conference on …, 2021
102021
Provable security of SP networks with partial non-linear layers
C Guo, FX Standaert, W Wang, X Wang, Y Yu
IACR Transactions on Symmetric Cryptology, 353-388, 2021
82021
Ridge-based profiled differential power analysis
W Wang, Y Yu, FX Standaert, D Gu, X Sen, C Zhang
Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA …, 2017
72017
Evaluation and improvement of generic-emulating DPA attacks
W Wang, Y Yu, J Liu, Z Guo, FX Standaert, D Gu, S Xu, R Fu
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
72015
Packed multiplication: how to amortize the cost of side-channel masking?
W Wang, C Guo, FX Standaert, Y Yu, G Cassiers
International Conference on the Theory and Application of Cryptology and …, 2020
62020
Provable order amplification for code-based masking: How to avoid non-linear leakages due to masked operations
W Wang, Y Yu, FX Standaert
IEEE Transactions on Information Forensics and Security 14 (11), 3069-3082, 2019
62019
Efficient side-channel secure message authentication with better bounds
C Guo, FX Standaert, W Wang, Y Yu
Cryptology ePrint Archive, 2019
62019
Similar operation template attack on RSA-CRT as a case study
S Xu, X Lu, K Zhang, Y Li, L Wang, W Wang, H Gu, Z Guo, J Liu, D Gu
Science China Information Sciences 61, 1-17, 2018
62018
Compact Instruction Set Extensions for Kyber
L Li, G Qin, Y Yu, W Wang
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023
52023
More inputs makes difference: implementations of linear layers using gates with more than two inputs
Q Liu, W Wang, L Sun, Y Fan, L Wu, M Wang
Cryptology ePrint Archive, 2022
52022
Efficient private circuits with precomputation
W Wang, F Ji, J Zhang, Y Yu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 286-309, 2023
42023
The system can't perform the operation now. Try again later.
Articles 1–20