Chujiao Ma

According to our database1, Chujiao Ma authored at least 9 papers between 2013 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Hardware Root-of-Trust implementations in Trusted Execution Environments.
IACR Cryptol. ePrint Arch., 2023

2021
CARAF: Crypto Agility Risk Assessment Framework.
J. Cybersecur., 2021

2018
Error Tolerant ASCA on FPGA.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Algebraic Side-Channel Attack on Twofish.
J. Internet Serv. Inf. Secur., 2017

A Tolerant Algebraic Side-Channel Attack on AES Using CP.
Proceedings of the Principles and Practice of Constraint Programming, 2017

Influence of Error on Hamming Weights for ASCA.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2014
Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations.
IEEE Trans. Inf. Forensics Secur., 2014

Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering.
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014

2013
Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques.
Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013


  Loading...