Tao Wang
Affiliations:- Ordnance Engineering College, Hebei, China
- Ordnance Engineering College, Shijiazhuang, China
According to our database1,
Tao Wang
authored at least 22 papers
between 2008 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2018
Efficient flush-reload cache attack on scalar multiplication based signature algorithm.
Sci. China Inf. Sci., 2018
2017
Secur. Commun. Networks, 2017
计算机科学, 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
2016
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers.
IEEE Trans. Inf. Forensics Secur., 2016
2014
Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations.
IEEE Trans. Inf. Forensics Secur., 2014
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014
2013
J. Syst. Softw., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES.
Comput. Secur., 2013
Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques.
Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013
Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013
2012
IACR Cryptol. ePrint Arch., 2012
MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012
2011
Fault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PRINTcipher.
IACR Cryptol. ePrint Arch., 2011
2010
IACR Cryptol. ePrint Arch., 2010
Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment.
IACR Cryptol. ePrint Arch., 2010
Further Improved Differential Fault Analysis on Camellia by Exploring Fault Width and Depth.
IACR Cryptol. ePrint Arch., 2010
2009
2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008