Follow
Wei CHENG
Wei CHENG
Secure-IC & Télécom Paris & Institut Polytechnique de Paris
Verified email at telecom-paris.fr - Homepage
Title
Cited by
Cited by
Year
Optimizing inner product masking scheme by a coding theory approach
W Cheng, S Guilley, C Carlet, S Mesnager, JL Danger
IEEE Transactions on Information Forensics and Security 16, 220-235, 2020
302020
Electro-magnetic analysis of GPU-based AES implementation
Y Gao, H Zhang, W Cheng, Y Zhou, Y Cao
2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC), 1-6, 2018
272018
Effect of aging on PUF modeling attacks based on power side-channel observations
T Kroeger, W Cheng, S Guilley, JL Danger, N Karimi
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 454-459, 2020
242020
Information Leakages in Code-based Masking: A Unified Quantification Approach
W Cheng, S Guilley, C Carlet, JL Danger, S Mesnager
IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021 (3), 465-495, 2021
152021
Differential fault analysis on Midori
W Cheng, Y Zhou, L Sauvage
Information and Communications Security: 18th International Conference …, 2016
152016
Removing the field size loss from Duc et al.’s conjectured bound for masked encodings
J Béguinot, W Cheng, S Guilley, Y Liu, L Masure, O Rioul, FX Standaert
International Workshop on Constructive Side-Channel Analysis and Secure …, 2023
142023
Cross-PUF attacks on arbiter-PUFs through their power side-channel
T Kroeger, W Cheng, S Guilley, JL Danger, N Karimi
2020 IEEE International Test Conference (ITC), 1-5, 2020
132020
Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds
W Cheng, Y Liu, S Guilley, O Rioul
2022 IEEE International Symposium on Information Theory (ISIT), 654-659, 2022
122022
On conditional alpha-information and its application to side-channel analysis
Y Liu, W Cheng, S Guilley, O Rioul
2021 IEEE Information Theory Workshop (ITW), 1-6, 2021
112021
Detecting Faults in Inner Product Masking Scheme—IPM-FD: IPM with Fault Detection
W Cheng, C Carlet, K Goli, JL Danger, S Guilley
8th International Workshop on Security Proofs for Embedded Systems (PROOFS …, 2019
11*2019
Making obfuscated PUFs secure against power side-channel based modeling attacks
T Kroeger, W Cheng, S Guilley, JL Danger, N Karimi
2021 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2021
102021
Cache-collision attacks on GPU-based AES implementation with electro-magnetic leakages
Y Gao, W Cheng, H Zhang, Y Zhou
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
92018
Bent Sequences over Hadamard Codes for Physically Unclonable Functions
P Solé, W Cheng, S Guilley, O Rioul
2021 IEEE International Symposium on Information Theory, 2021
82021
Assessment and mitigation of power side-channel-based cross-PUF attacks on arbiter-PUFs and their derivatives
T Kroeger, W Cheng, S Guilley, JL Danger, N Karimi
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 30 (2), 187-200, 2022
72022
Mind the balance: Revealing the vulnerabilities in low entropy masking schemes
J Ming, Y Zhou, W Cheng, H Li, G Yang, Q Zhang
IEEE Transactions on Information Forensics and Security 15, 3694-3708, 2020
72020
Be my guess: Guessing entropy vs. success rate for evaluating side-channel attacks of secure chips
J Béguinot, W Cheng, S Guilley, O Rioul
2022 25th Euromicro Conference on Digital System Design (DSD), 496-503, 2022
62022
On Efficient and Secure Code-based Masking: A Pragmatic Evaluation
Q Wu, W Cheng, S Guilley, F Zhang, W Fu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 192-222, 2022
62022
Linear Programming Bounds on the Kissing Number of q-ary Codes
P Solé, Y Liu, W Cheng, S Guilley, O Rioul
2021 IEEE Information Theory Workshop (ITW), 1-5, 2021
62021
Revealing the weakness of addition chain based masked SBox implementations
J Ming, H Li, Y Zhou, W Cheng, Z Qiao
IACR Transactions on Cryptographic Hardware and Embedded Systems, 326-350, 2021
62021
Self-dual bent sequences for complex Hadamard matrices
M Shi, Y Li, W Cheng, D Crnković, D Krotov, P Solé
Designs, codes and cryptography 91 (4), 1453-1474, 2023
52023
The system can't perform the operation now. Try again later.
Articles 1–20