Wei Cheng

Orcid: 0000-0001-9433-7576

Affiliations:
  • Télécom Paris & Institut Polytechnique de Paris, Paris, France
  • Institute of Information Engineering, CAS, Beijing, China (former)


According to our database1, Wei Cheng authored at least 49 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Statistical Higher-Order Correlation Attacks Against Code-Based Masking.
IEEE Trans. Computers, October, 2024

Toward finding best linear codes for side-channel protections (extended version).
J. Cryptogr. Eng., April, 2024

Be My Guesses: The interplay between side-channel leakage metrics.
Microprocess. Microsystems, 2024

Formal Security Proofs via Doeblin Coefficients: Optimal Side-channel Factorization from Noisy Leakage to Random Probing.
IACR Cryptol. ePrint Arch., 2024

2023
Self-Dual Hadamard Bent Sequences.
J. Syst. Sci. Complex., April, 2023

Self-dual bent sequences for complex Hadamard matrices.
Des. Codes Cryptogr., April, 2023

DNA Code from Cyclic and Skew Cyclic Codes over F4[v]/⟨v3⟩.
Entropy, February, 2023

Reliability of Ring Oscillator PUFs with Reduced Helper Data.
Proceedings of the Advances in Information and Computer Security, 2023

Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic Implementations.
Proceedings of the IEEE Information Theory Workshop, 2023

Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma for Min-Entropy.
Proceedings of the IEEE International Symposium on Information Theory, 2023

Table Re-Computation Based Low Entropy Inner Product Masking Scheme.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

2022
Assessment and Mitigation of Power Side-Channel-Based Cross-PUF Attacks on Arbiter-PUFs and Their Derivatives.
IEEE Trans. Very Large Scale Integr. Syst., 2022

Optimizing Higher-Order Correlation Analysis Against Inner Product Masking Scheme.
IEEE Trans. Inf. Forensics Secur., 2022

Information Leakage in Code-Based Masking: A Systematic Evaluation by Higher-Order Attacks.
IEEE Trans. Inf. Forensics Secur., 2022

On Efficient and Secure Code-based Masking: A Pragmatic Evaluation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Side-Channel Expectation-Maximization Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings.
IACR Cryptol. ePrint Arch., 2022

Cross-PUF Attacks: Targeting FPGA Implementation of Arbiter-PUFs.
J. Electron. Test., 2022

Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Be My Guess: Guessing Entropy vs. Success Rate for Evaluating Side-Channel Attacks of Secure Chips.
Proceedings of the 25th Euromicro Conference on Digital System Design, 2022

Side-Channel Information Leakage of Code-Based Masked Implementations.
Proceedings of the 17th Canadian Workshop on Information Theory, 2022

2021
What can information guess? : Towards information leakage quantification in side-channel analysis. (Qu'est ce que l'information permet de deviner? : Vers une quantification des fuites d'informations dans l'analyse de canaux auxiliaires).
PhD thesis, 2021

Optimizing Inner Product Masking Scheme by a Coding Theory Approach.
IEEE Trans. Inf. Forensics Secur., 2021

Revealing the Weakness of Addition Chain Based Masked SBox Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Information Leakages in Code-based Masking: A Unified Quantification Approach.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Detecting faults in inner product masking scheme.
J. Cryptogr. Eng., 2021

On Conditional α-Information and its Application to Side-Channel Analysis.
CoRR, 2021

Categorizing all linear codes of IPM over ${\mathbb {F}}_{2^{8}}$.
Cryptogr. Commun., 2021

Linear Programming Bounds on the Kissing Number of q-ary Codes.
Proceedings of the IEEE Information Theory Workshop, 2021

On Conditional Alpha-Information and its Application to Side-Channel Analysis.
Proceedings of the IEEE Information Theory Workshop, 2021

Bent Sequences over Hadamard Codes for Physically Unclonable Functions.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret.
Proceedings of the IEEE International Symposium on Information Theory, 2021

APT: Efficient Side-Channel Analysis Framework against Inner Product Masking Scheme.
Proceedings of the 39th IEEE International Conference on Computer Design, 2021

Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

Enhancing the Resiliency of Multi-bit Parallel Arbiter-PUF and Its Derivatives Against Power Attacks.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2021

2020
Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes.
IEEE Trans. Inf. Forensics Secur., 2020

Efficient electro-magnetic analysis of a GPU bitsliced AES implementation.
Cybersecur., 2020

Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel.
Proceedings of the IEEE International Test Conference, 2020

Effect of Aging on PUF Modeling Attacks based on Power Side-Channel Observations.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

2019
Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection.
IACR Cryptol. ePrint Arch., 2019

2018
Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure.
IACR Cryptol. ePrint Arch., 2018

How Does Strict Parallelism Affect Security? A Case Study on the Side-Channel Attacks against GPU-based Bitsliced AES Implementation.
IACR Cryptol. ePrint Arch., 2018

Cache-Collision Attacks on GPU-Based AES Implementation with Electro-Magnetic Leakages.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Compact AES Hardware Implementation Secure Against 1st-Order Side-Channel Attacks.
Proceedings of the 36th IEEE International Conference on Computer Design, 2018

Electro-magnetic analysis of GPU-based AES implementation.
Proceedings of the 55th Annual Design Automation Conference, 2018

2017
Corrections to "Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexity".
IACR Cryptol. ePrint Arch., 2017

Manifold Learning Towards Masking Implementations: A First Study.
IACR Cryptol. ePrint Arch., 2017

How Far Can We Reach? Breaking RSM-Masked AES-128 Implementation Using Only One Trace.
IACR Cryptol. ePrint Arch., 2017

2016
Differential Fault Analysis on Midori.
Proceedings of the Information and Communications Security - 18th International Conference, 2016


  Loading...