Ridge-based DPA: Improvement of differential power analysis for nanoscale chips W Wang, Y Yu, FX Standaert, J Liu, Z Guo, D Gu IEEE Transactions on Information Forensics and Security 13 (5), 1301-1316, 2017 | 48 | 2017 |
SAND: An AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations S Chen, Y Fan, L Sun, Y Fu, H Zhou, Y Li, M Wang, W Wang, C Guo Designs, Codes and Cryptography, 1-44, 2022 | 37 | 2022 |
Efficient and private computations with code-based masking W Wang, P Méaux, G Cassiers, FX Standaert IACR Transactions on Cryptographic Hardware and Embedded Systems, 128-171, 2020 | 34 | 2020 |
Inner product masking for bitslice ciphers and security order amplification for linear leakages W Wang, FX Standaert, Y Yu, S Pu, J Liu, Z Guo, D Gu Smart Card Research and Advanced Applications: 15th International Conference …, 2017 | 26 | 2017 |
A power analysis on SMS4 using the chosen plaintext method S Wang, D Gu, J Liu, Z Guo, W Wang, S Bao 2013 Ninth International Conference on Computational Intelligence and …, 2013 | 21 | 2013 |
Trace augmentation: What can be done even before preprocessing in a profiled sca? S Pu, Y Yu, W Wang, Z Guo, J Liu, D Gu, L Wang, J Gan Smart Card Research and Advanced Applications: 16th International Conference …, 2018 | 18 | 2018 |
Weakness in 802.11 w and an improved mechanism on protection of management frame W Wang, H Wang 2011 International Conference on Wireless Communications and Signal …, 2011 | 17 | 2011 |
Towards low-latency implementation of linear layers Q Liu, W Wang, Y Fan, L Wu, L Sun, M Wang Cryptology ePrint Archive, 2022 | 14 | 2022 |
Improved power analysis attacks on falcon S Zhang, X Lin, Y Yu, W Wang Annual International Conference on the Theory and Applications of …, 2023 | 13 | 2023 |
Pushing the limits: Searching for implementations with the smallest area for lightweight s-boxes Z Lu, W Wang, K Hu, Y Fan, L Wu, M Wang Progress in Cryptology–INDOCRYPT 2021: 22nd International Conference on …, 2021 | 10 | 2021 |
Provable security of SP networks with partial non-linear layers C Guo, FX Standaert, W Wang, X Wang, Y Yu IACR Transactions on Symmetric Cryptology, 353-388, 2021 | 8 | 2021 |
Ridge-based profiled differential power analysis W Wang, Y Yu, FX Standaert, D Gu, X Sen, C Zhang Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA …, 2017 | 7 | 2017 |
Evaluation and improvement of generic-emulating DPA attacks W Wang, Y Yu, J Liu, Z Guo, FX Standaert, D Gu, S Xu, R Fu Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015 | 7 | 2015 |
Packed multiplication: how to amortize the cost of side-channel masking? W Wang, C Guo, FX Standaert, Y Yu, G Cassiers International Conference on the Theory and Application of Cryptology and …, 2020 | 6 | 2020 |
Provable order amplification for code-based masking: How to avoid non-linear leakages due to masked operations W Wang, Y Yu, FX Standaert IEEE Transactions on Information Forensics and Security 14 (11), 3069-3082, 2019 | 6 | 2019 |
Efficient side-channel secure message authentication with better bounds C Guo, FX Standaert, W Wang, Y Yu Cryptology ePrint Archive, 2019 | 6 | 2019 |
Similar operation template attack on RSA-CRT as a case study S Xu, X Lu, K Zhang, Y Li, L Wang, W Wang, H Gu, Z Guo, J Liu, D Gu Science China Information Sciences 61, 1-17, 2018 | 6 | 2018 |
Compact Instruction Set Extensions for Kyber L Li, G Qin, Y Yu, W Wang IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023 | 5 | 2023 |
More inputs makes difference: implementations of linear layers using gates with more than two inputs Q Liu, W Wang, L Sun, Y Fan, L Wu, M Wang Cryptology ePrint Archive, 2022 | 5 | 2022 |
Efficient private circuits with precomputation W Wang, F Ji, J Zhang, Y Yu IACR Transactions on Cryptographic Hardware and Embedded Systems, 286-309, 2023 | 4 | 2023 |