Hongsong Shi

According to our database1, Hongsong Shi authored at least 13 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Insecurity of SHA2 under the Differential Fault Characteristic of Boolean Functions.
IACR Cryptol. ePrint Arch., 2024

2023
Research on intelligent transportation and shared parking spaces inurban areas based on multi-source data integration.
Comput. Electr. Eng., September, 2023

2022
Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA.
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022

2021
Lattice-based weak curve fault attack on ECDSA.
IACR Cryptol. ePrint Arch., 2021

Lattice-Based Weak Curve Fault Attack on ECDSA.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

2020
x-only coordinate: with application to secp256k1 " >Chosen base-point side-channel attack on Montgomery ladder with <i>x</i>-only coordinate: with application to secp256k1.
IET Inf. Secur., 2020

Lattice-based Fault Attacks against Deterministic Signatures ECDSA and EdDSA.
IACR Cryptol. ePrint Arch., 2020

2018
Standards News.
IEEE Commun. Stand. Mag., 2018

2015
Mind Your Nonces Moving: Template-Based Partially-Sharing Nonces Attack on SM2 Digital Signature Algorithm.
Proceedings of the 10th ACM Symposium on Information, 2015

2011
On Optimal Secure Message Transmission by Public Discussion.
IEEE Trans. Inf. Theory, 2011

Optimal message transmission protocols with flexible parameters.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
More efficient DDH pseudorandom generators.
Des. Codes Cryptogr., 2010

2006
Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006


  Loading...