Congming Wei

Orcid: 0000-0003-4029-0746

According to our database1, Congming Wei authored at least 24 papers between 2020 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
A UMAP-Based Clustering Side-Channel Analysis on Public-Key Cryptosystems.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., April, 2026

Locality Does Matter: An Assessment Metric Adapted for Cluster-Based Side-Channel Analysis on Public Key Cryptosystems.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., March, 2026

An Efficient Ensemble Framework to Assist Profiled Side-Channel Analysis by Machine Learning.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., January, 2026

Bridging Lab and Industry: Practical SPA-GPT on Cryptosystems Boosted by LSTM and Simulated Annealing.
IEEE Trans. Inf. Forensics Secur., 2026

2025
Make It Easy! Timing Leakage Analysis on Cryptographic Chips Based on Horizontal Leakage.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., October, 2025

An Intelligent Framework for Cluster-Based Side-Channel Analysis on Public-Key Cryptosystems.
IEEE Internet Things J., January, 2025

Release the Power of Rejected Signatures: An Efficient Side-Channel Attack on the ML-DSA Cryptosystem.
IEEE Trans. Inf. Forensics Secur., 2025

CL-SCA: A Contrastive Learning Approach for Profiled Side-Channel Analysis.
IEEE Trans. Inf. Forensics Secur., 2025

Release the Power of Rejected Signatures: An Efficient Side-Channel Attack on Dilithium.
IACR Cryptol. ePrint Arch., 2025

2024
Dual-Path Hybrid Residual Network for Profiled Side-Channel Analysis.
IEEE Trans. Circuits Syst. II Express Briefs, August, 2024

Time Is Not Enough: Timing Leakage Analysis on Cryptographic Chips via Plaintext-Ciphertext Correlation in Non-Timing Channel.
IEEE Trans. Inf. Forensics Secur., 2024

An efficient heuristic power analysis framework based on hill-climbing algorithm.
Inf. Sci., 2024

One Solves All: Exploring ChatGPT's Capabilities for Fully Automated Simple Power Analysis on Cryptosystems.
IACR Cryptol. ePrint Arch., 2024

CL-SCA: Leveraging Contrastive Learning for Profiled Side-Channel Analysis.
IACR Cryptol. ePrint Arch., 2024

Ultra Low-Latency Block Cipher uLBC.
IACR Commun. Cryptol., 2024

A Command-Activated Hardware Trojan Detection Method Based on LUNAR Framework.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024

2023
Differential-Aided Preimage Attacks On Round-Reduced Keccak.
Comput. J., December, 2023

Improved attacks against reduced-round Whirlwind.
Des. Codes Cryptogr., November, 2023

SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning.
IACR Cryptol. ePrint Arch., 2023

Side-Channel Analysis on Lattice-Based KEM Using Multi-feature Recognition - The Case Study of Kyber.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

2022
Using Convolutional Neural Network to Redress Outliers in Clustering Based Side-Channel Analysis on Cryptosystem.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

2021
Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems.
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021

Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
x-only coordinate: with application to secp256k1 " >Chosen base-point side-channel attack on Montgomery ladder with <i>x</i>-only coordinate: with application to secp256k1.
IET Inf. Secur., 2020


  Loading...