Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Side-Channel Analysis on Lattice-Based KEM Using Multi-feature Recognition - The Case Study of Kyber

    Kyber, selected as the next-generation standard for key encapsulation mechanism in the third round of the NIST post-quantum cryptography standardization process, has naturally raised concerns regarding its res...

    Yuan Ma, **nyue Yang, An Wang, Congming Wei in Information Security and Cryptology – ICIS… (2024)

  2. No Access

    Chapter and Conference Paper

    A Command-Activated Hardware Trojan Detection Method Based on LUNAR Framework

    Hardware Trojans have become a major challenge to ICs due to their serious damage to the reliability and security. However, hardware Trojans can be activated in a variety of ways, making accurate activation of...

    Xue Yang, Congming Wei, Yaoling Ding in Applied Cryptography and Network Security … (2024)

  3. No Access

    Article

    Improved attacks against reduced-round Whirlwind

    The Whirlwind hash function was proposed by Barreto et al. (Des Codes Cryptogr 56(2–3):141–162, 2010, https://doi.org/10.1007/s10623-010-9391-y). In this paper, we...

    Congming Wei, Bingyou Dong, Jialiang Hua, **aoyang Dong in Designs, Codes and Cryptography (2023)

  4. No Access

    Chapter and Conference Paper

    Using Convolutional Neural Network to Redress Outliers in Clustering Based Side-Channel Analysis on Cryptosystem

    Blockchain, designed with cryptographic technology, is widely used in the financial area, such as digital billing and cross-border payments. Digital signature is the core technology in it. However, digital sig...

    An Wang, Shulin He, Congming Wei, Shaofei Sun in Smart Computing and Communication (2023)

  5. No Access

    Chapter and Conference Paper

    Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems

    In this paper, we present preimage attacks on 4-round Keccak-224/256 as well as 4-round Keccak[ \(r = 640,c = 160,l = 80\) ...

    Congming Wei, Chenhao Wu, **ming Fu in Information Security and Cryptology – ICIS… (2022)

  6. No Access

    Chapter and Conference Paper

    Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials

    Collision attacks on AES-like hashing (hash functions constructed by plugging AES-like ciphers or permutations into the famous PGV modes or their variants) can be reduced to the problem of finding a pair of in...

    **aoyang Dong, Zhiyu Zhang, Siwei Sun in Advances in Cryptology – ASIACRYPT 2021 (2021)