Hua Chen
Orcid: 0000-0002-0938-689XAffiliations:
- Chinese Academy of Sciences, Institute of Software, Beijing, China
According to our database1,
Hua Chen
authored at least 37 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., July, 2024
IACR Cryptol. ePrint Arch., 2024
The Insecurity of SHA2 under the Differential Fault Characteristic of Boolean Functions.
IACR Cryptol. ePrint Arch., 2024
2023
Easily Overlooked Vulnerability in Implementation: Practical Fault Attack on ECDSA Round Counter.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2023
Improving the Performance of CPA Attacks for Ciphers Using Parallel Implementation of S-Boxes.
IET Inf. Secur., 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022
2021
Do multiple infections lead to better security? A new study on CHES 2014 infective countermeasure.
Sci. China Inf. Sci., 2021
Proceedings of the ICT Systems Security and Privacy Protection, 2021
2020
A Framework for Evaluation and Analysis on Infection Countermeasures Against Fault Attacks.
IEEE Trans. Inf. Forensics Secur., 2020
IACR Cryptol. ePrint Arch., 2020
2019
A Worst-Case Entropy Estimation of Oscillator-Based Entropy Sources: When the Adversaries Have Access to the History Outputs.
Proceedings of the 18th IEEE International Conference On Trust, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs.
Sci. China Inf. Sci., 2018
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018
2016
My traces learn what you did in the dark: recovering secret signals without key guesses.
IACR Cryptol. ePrint Arch., 2016
Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
Proceedings of the 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2016
Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
2013
Proceedings of the Information Security Applications - 14th International Workshop, 2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter?
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013
Proceedings of the American Control Conference, 2013
2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2004
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the IEEE Congress on Evolutionary Computation, 2004
2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003