Weijia Wang

Orcid: 0000-0001-6982-2537

Affiliations:
  • Shandong University, School of Cyber Science and Technology, Qingdao, China
  • Université catholique de Louvain, Louvain-la-Neuve, Belgium (former)
  • Shanghai Jiao Tong University, China (former, PhD)


According to our database1, Weijia Wang authored at least 36 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Compact Instruction Set Extensions for Dilithium.
ACM Trans. Embed. Comput. Syst., March, 2024

ISA Extensions of Shuffling Against Side-Channel Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., March, 2024

Compact Instruction Set Extensions for Kyber.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., March, 2024

Efficient Table-Based Masking with Pre-processing.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Leakage-Resilience of Circuit Garbling.
IACR Cryptol. ePrint Arch., 2024

On Constructing Pseudorandom Involutions: Feistel variants using a single round function.
IACR Cryptol. ePrint Arch., 2024

Automated Generation of Masked Nonlinear Components: - From Lookup Tables to Private Circuits.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024

2023
Shorter Linkable Ring Signature Based on Middle-Product Learning with Errors Problem.
Comput. J., December, 2023

Efficient Private Circuits with Precomputation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks.
IACR Cryptol. ePrint Arch., 2023

Improved Power Analysis Attacks on Falcon.
IACR Cryptol. ePrint Arch., 2023

An automated generation tool of hardware masked S-box: AGEMA<sup>+</sup>.
IACR Cryptol. ePrint Arch., 2023

Implementing Lattice-Based PQC on Resource-Constrained Processors: - A Case Study for Kyber/Saber's Polynomial Multiplication on ARM Cortex-M0/M0+\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$+$$\end{document}.
Proceedings of the Progress in Cryptology - INDOCRYPT 2023, 2023

2022
More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs.
IACR Trans. Symmetric Cryptol., 2022

Towards Low-Latency Implementation of Linear Layers.
IACR Trans. Symmetric Cryptol., 2022

Side-Channel Masking with Common Shares.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations.
Des. Codes Cryptogr., 2022

How Fast Can SM4 be in Software?
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

2021
Provable Security of SP Networks with Partial Non-Linear Layers.
IACR Trans. Symmetric Cryptol., 2021

Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes.
IACR Cryptol. ePrint Arch., 2021

Investigation for 8-bit SKINNY-like S-boxes, analysis and applications.
Cryptogr. Commun., 2021

Forced Independent Optimized Implementation of 4-Bit S-Box.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks.
IACR Trans. Symmetric Cryptol., 2020

Efficient and Private Computations with Code-Based Masking.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Packed Multiplication: How to Amortize the Cost of Side-channel Masking ?
IACR Cryptol. ePrint Arch., 2020

2019
Efficient Side-Channel Secure Message Authentication with Better Bounds.
IACR Trans. Symmetric Cryptol., 2019

Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations.
IEEE Trans. Inf. Forensics Secur., 2019

Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks.
J. Comput. Sci. Technol., 2019

2018
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips.
IEEE Trans. Inf. Forensics Secur., 2018

Similar operation template attack on RSA-CRT as a case study.
Sci. China Inf. Sci., 2018

2017
Ridge-Based Profiled Differential Power Analysis.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA?
Proceedings of the Smart Card Research and Advanced Applications, 2017

2016
Evaluation and Improvement of Generic-Emulating DPA Attacks.
IACR Cryptol. ePrint Arch., 2016

Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages.
Proceedings of the Smart Card Research and Advanced Applications, 2016

2013
A Power Analysis on SMS4 Using the Chosen Plaintext Method.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2011
Weakness in 802.11w and an improved mechanism on protection of management frame.
Proceedings of the 2011 International Conference on Wireless Communications & Signal Processing, 2011


  Loading...