Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA

    The deterministic ECDSA and EdDSA signature schemes have found plenty of applications since their publication, e.g., block chain and Internet of Thing, and have been stated in RFC 6979 and RFC 8032 by IETF res...

    Weiqiong Cao, Hongsong Shi, Hua Chen, Jiazhe Chen in Topics in Cryptology – CT-RSA 2022 (2022)

  2. No Access

    Chapter and Conference Paper

    Jitter Estimation with High Accuracy for Oscillator-Based TRNGs

    Ring oscillator-based true random number generators (RO-based TRNGs) are widely used to provide unpredictable random numbers for cryptographic systems. The unpredictability of the output numbers, which can be ...

    Shaofeng Zhu, Hua Chen, Limin Fan in Smart Card Research and Advanced Applicati… (2019)

  3. No Access

    Chapter and Conference Paper

    Lattice-Based Fault Attacks Against ECMQV

    ECMQV is a standardized key agreement protocol based on ECC with an additional implicit signature authentication. In this paper we investigate the vulnerability of ECMQV against fault attacks and propose two e...

    Weiqiong Cao, Hua Chen, **gyi Feng in Constructive Side-Channel Analysis and Sec… (2018)

  4. No Access

    Chapter and Conference Paper

    My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses

    In side channel attack (SCA) studies, it is widely believed that unprotected implementations leak information about the intermediate states of the internal cryptographic process. However, directly recovering t...

    Si Gao, Hua Chen, Wenling Wu, Limin Fan, Weiqiong Cao in Topics in Cryptology – CT-RSA 2017 (2017)

  5. No Access

    Chapter and Conference Paper

    Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round

    SPECK is a new family of lightweight block ciphers proposed by the U.S. National Security Agency in 2013. So far, there exist several fault analysis results on this family. In this paper, we propose an improve...

    **gyi Feng, Hua Chen, Si Gao, Limin Fan in Information Security and Cryptology – ICIS… (2017)

  6. No Access

    Chapter and Conference Paper

    Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers

    The past ten years have seen tremendous progress in the uptake of side channel analysis in various applications. Among them, Side Channel Analysis for Reverse Engineering (SCARE) is an especially fruitful area...

    Si Gao, Hua Chen, Wenling Wu, Limin Fan, **gyi Feng in Cryptology and Network Security (2016)

  7. No Access

    Chapter and Conference Paper

    A General Method to Evaluate the Correlation of Randomness Tests

    This paper discusses the correlation of the randomness tests. In this paper, we propose a new general method to evaluate the correlation of randomness tests. Firstly, we deduce the distribution that independen...

    Limin Fan, Hua Chen, Si Gao in Information Security Applications (2014)

  8. No Access

    Chapter and Conference Paper

    Integral Based Fault Attack on LBlock

    LBlock is a 32-round lightweight block cipher presented at ACNS2011. In this paper, the fault attack on LBlock is explored. The first fault attack on LBlock was presented at COSADE2012, which can reveal the ma...

    Hua Chen, Limin Fan in Information Security and Cryptology -- ICISC 2013 (2014)

  9. No Access

    Chapter and Conference Paper

    Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter?

    In the past decade, Padding Oracle Attacks (POAs) have become a major threat to PKCS#1 v1.5. Although the updated scheme (OAEP) has solved this problem, PKCS#1 v1.5 is still widely deployed in various real-lif...

    Si Gao, Hua Chen, Limin Fan in Cryptology and Network Security (2013)

  10. Chapter and Conference Paper

    Web-based Coordination for E-Commerce

    As the e-commerce environment becomes more pervasive and dynamic, coordination among companies are required more frequently than ever. We give the definition of coordination as well as the model of e-commerce ...

    **guo Zhang, Guihe Wang, Limin Fan in Integration and Innovation Orient to E-Soc… (2007)