Zheng Guo

Affiliations:
  • Shanghai Jiao Tong University, School of Electronic Information and Electrical Engineering, China (PhD 2016)


According to our database1, Zheng Guo authored at least 26 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A nonprofiled side-channel analysis based on variational lower bound related to mutual information.
Sci. China Inf. Sci., January, 2023

2020
Ciphertext-only fault analysis on the Midori lightweight cryptosystem.
Sci. China Inf. Sci., 2020

2019
Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2019

Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks.
J. Comput. Sci. Technol., 2019

Side channel attack of multiplication in GF(<i>q</i>)-application to secure RSA-CRT.
Sci. China Inf. Sci., 2019

2018
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips.
IEEE Trans. Inf. Forensics Secur., 2018

Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network.
KSII Trans. Internet Inf. Syst., 2018

Similar operation template attack on RSA-CRT as a case study.
Sci. China Inf. Sci., 2018

2017
Dynamic data split: A crosstalk suppression scheme in TSV-based 3D IC.
Integr., 2017

Practical Partial-Nonce-Exposure Attack on ECC Algorithm.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Efficient and Constant Time Modular Inversions Over Prime Fields.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Boolean Matrix Masking for SM4 Block Cipher Algorithm.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

An Implementation of Trojan Side-Channel with a Masking Scheme.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA?
Proceedings of the Smart Card Research and Advanced Applications, 2017

2016
Evaluation and Improvement of Generic-Emulating DPA Attacks.
IACR Cryptol. ePrint Arch., 2016

Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages.
Proceedings of the Smart Card Research and Advanced Applications, 2016

2015
Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards.
Proceedings of the Computer Security - ESORICS 2015, 2015

A Circuit Design of SMS4 against Chosen Plaintext Attack.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

Fault detection and redundancy design for TSVs in 3D ICs.
Proceedings of the 2015 IEEE 11th International Conference on ASIC, 2015

2014
An Improved Side-Channel Attack Based on Support Vector Machine.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Differential power analysis of stream ciphers with LFSRs.
Comput. Math. Appl., 2013

A Power Analysis on SMS4 Using the Chosen Plaintext Method.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

A Block Cipher Circuit Design against Power Analysis.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Differential Fault Analysis on Lightweight Blockciphers with Statistical Cryptanalysis Techniques.
Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012

A Highly Efficient Correlation Power Analysis on PRINT Cipher.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2010
Correlation Power Analysis Against Stream Cipher MICKEY v2.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010


  Loading...