Si Gao

According to our database1, Si Gao authored at least 17 papers between 2010 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Non-profiled Mask Recovery: the impact of Independent Component Analysis.
IACR Cryptology ePrint Archive, 2018

2017
Direct Construction of Optimal Rotational-XOR Diffusion Primitives.
IACR Trans. Symmetric Cryptol., 2017

My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

2016
My traces learn what you did in the dark: recovering secret signals without key guesses.
IACR Cryptology ePrint Archive, 2016

Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

An Iris Recognition Method Based on Annule-energy Feature.
Proceedings of the Biometric Recognition - 10th Chinese Conference, 2015

2014
An Effective Iris Recognition Method Based on Scale Invariant Feature Transformation.
Proceedings of the Biometric Recognition - 9th Chinese Conference, 2014

2013
A General Method to Evaluate the Correlation of Randomness Tests.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

On Design of Nonlinear Operations and Round Functions of Block Ciphers with Resistance to ASCAs.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter?
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

2012
Evolutionary ciphers against differential power analysis and differential fault analysis.
SCIENCE CHINA Information Sciences, 2012

Polar differential power attacks and evaluation.
SCIENCE CHINA Information Sciences, 2012

2011
DPA Leakage Evaluation and Countermeasure Plug-in.
IACR Cryptology ePrint Archive, 2011

2010
Evolution Cipher against Differential Power Attack.
JDCTA, 2010

Evolutionary Cipher against Differential Power Attack.
IACR Cryptology ePrint Archive, 2010


  Loading...