Hua Chen

Orcid: 0000-0002-0938-689X

Affiliations:
  • Chinese Academy of Sciences, Institute of Software, Beijing, China


According to our database1, Hua Chen authored at least 31 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Error Analysis of NIST SP 800-22 Test Suite.
IEEE Trans. Inf. Forensics Secur., 2023

Easily Overlooked Vulnerability in Implementation: Practical Fault Attack on ECDSA Round Counter.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2023

2022
Practical Side-Channel Attack on Masked Message Encoding in Latticed-Based KEM.
IACR Cryptol. ePrint Arch., 2022

Practical Side-Channel Attack on Message Encoding in Masked Kyber.
Proceedings of the IEEE International Conference on Trust, 2022

Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA.
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022

2021
Lattice-based weak curve fault attack on ECDSA.
IACR Cryptol. ePrint Arch., 2021

Do multiple infections lead to better security? A new study on CHES 2014 infective countermeasure.
Sci. China Inf. Sci., 2021

Lattice-Based Weak Curve Fault Attack on ECDSA.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

2020
A Framework for Evaluation and Analysis on Infection Countermeasures Against Fault Attacks.
IEEE Trans. Inf. Forensics Secur., 2020

Lattice-based Fault Attacks against Deterministic Signatures ECDSA and EdDSA.
IACR Cryptol. ePrint Arch., 2020

2019
A new discrete Fourier transform randomness test.
Sci. China Inf. Sci., 2019

A Worst-Case Entropy Estimation of Oscillator-Based Entropy Sources: When the Adversaries Have Access to the History Outputs.
Proceedings of the 18th IEEE International Conference On Trust, 2019

2018
Jitter Estimation with High Accuracy for Oscillator-Based TRNGs.
IACR Cryptol. ePrint Arch., 2018

Non-profiled Mask Recovery: the impact of Independent Component Analysis.
IACR Cryptol. ePrint Arch., 2018

Lattice-Based Fault Attacks Against ECMQV.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018

2016
My traces learn what you did in the dark: recovering secret signals without key guesses.
IACR Cryptol. ePrint Arch., 2016

Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

Improved Fault Analysis on SIMON Block Cipher Family.
Proceedings of the 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2016

Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Two Lattice-Based Differential Fault Attacks Against ECDSA with wNAF Algorithm.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Practical Lattice-Based Fault Attack and Countermeasure on SM2 Signature Algorithm.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2013
A General Method to Evaluate the Correlation of Randomness Tests.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

Integral Based Fault Attack on LBlock.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter?
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

Intersample ripple resulting from discrete-time feedforward control.
Proceedings of the American Control Conference, 2013

2007
Differential Fault Analysis on CLEFIA.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

An Effective Genetic Algorithm for Self-Inverse S-Boxes.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2004
Collision Attack and Pseudorandomness of Reduced-Round Camellia.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes.
Proceedings of the Information Security and Cryptology, 2004

An effective evolutionary strategy for bijective S-boxes.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

2003
UC-RBAC: A Usage Constrained Role-Based Access Control Model.
Proceedings of the Information and Communications Security, 5th International Conference, 2003


  Loading...