Weiqiong Cao

According to our database1, Weiqiong Cao authored at least 14 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Blink: Breaking Lattice-Based Schemes Implemented in Parallel with Chosen-Ciphertext Attack.
IACR Cryptol. ePrint Arch., 2024

The Insecurity of SHA2 under the Differential Fault Characteristic of Boolean Functions.
IACR Cryptol. ePrint Arch., 2024

2023
Easily Overlooked Vulnerability in Implementation: Practical Fault Attack on ECDSA Round Counter.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2023

2022
Practical Side-Channel Attack on Masked Message Encoding in Latticed-Based KEM.
IACR Cryptol. ePrint Arch., 2022

Practical Side-Channel Attack on Message Encoding in Masked Kyber.
Proceedings of the IEEE International Conference on Trust, 2022

Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA.
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022

2021
Lattice-based weak curve fault attack on ECDSA.
IACR Cryptol. ePrint Arch., 2021

Do multiple infections lead to better security? A new study on CHES 2014 infective countermeasure.
Sci. China Inf. Sci., 2021

Lattice-Based Weak Curve Fault Attack on ECDSA.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

2020
Lattice-based Fault Attacks against Deterministic Signatures ECDSA and EdDSA.
IACR Cryptol. ePrint Arch., 2020

2018
Lattice-Based Fault Attacks Against ECMQV.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018

2016
My traces learn what you did in the dark: recovering secret signals without key guesses.
IACR Cryptol. ePrint Arch., 2016

2015
Two Lattice-Based Differential Fault Attacks Against ECDSA with wNAF Algorithm.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Practical Lattice-Based Fault Attack and Countermeasure on SM2 Signature Algorithm.
Proceedings of the Information and Communications Security - 17th International Conference, 2015


  Loading...