Tao Wang

Affiliations:
  • Ordnance Engineering College, Hebei, China
  • Ordnance Engineering College, Shijiazhuang, China


According to our database1, Tao Wang authored at least 22 papers between 2008 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Efficient flush-reload cache attack on scalar multiplication based signature algorithm.
Sci. China Inf. Sci., 2018

2017
Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher.
Secur. Commun. Networks, 2017

基于AC算法的比特流频繁序列挖掘 (Frequent Pattern Mining in Bit Stream Based on AC Algorithm).
计算机科学, 2017

Improved Differential Fault Analysis of SOSEMANUK with Algebraic Techniques.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

2016
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers.
IEEE Trans. Inf. Forensics Secur., 2016

2014
Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations.
IEEE Trans. Inf. Forensics Secur., 2014

Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering.
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014

2013
Efficient Hamming weight-based side-channel cube attacks on PRESENT.
J. Syst. Softw., 2013

Enhanced Side-Channel Cube Attacks on PRESENT.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES.
Comput. Secur., 2013

Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques.
Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013

Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

2012
Algebraic Differential Fault Attacks on LED using a Single Fault Injection.
IACR Cryptol. ePrint Arch., 2012

MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

2011
Improved Side Channel Cube Attacks on PRESENT.
IACR Cryptol. ePrint Arch., 2011

Fault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PRINTcipher.
IACR Cryptol. ePrint Arch., 2011

2010
Multiple Bytes Differential Fault Analysis on CLEFIA.
IACR Cryptol. ePrint Arch., 2010

Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment.
IACR Cryptol. ePrint Arch., 2010

Further Improved Differential Fault Analysis on Camellia by Exploring Fault Width and Depth.
IACR Cryptol. ePrint Arch., 2010

2009
Cache Timing Attacks on Camellia Block Cipher.
IACR Cryptol. ePrint Arch., 2009

An Improved Differential Fault Attack on Camellia.
IACR Cryptol. ePrint Arch., 2009

2008
Robust First Two Rounds Access Driven Cache Timing Attack on AES.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008


  Loading...