Author of the publication

Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round.

, , , , and . ICISC, volume 10157 of Lecture Notes in Computer Science, page 317-332. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lattice-Based Fault Attacks Against ECMQV., , , , and . COSADE, volume 10815 of Lecture Notes in Computer Science, page 101-116. Springer, (2018)Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers., , , , , and . CANS, volume 10052 of Lecture Notes in Computer Science, page 3-18. (2016)Two Lattice-Based Differential Fault Attacks Against ECDSA with wNAF Algorithm., , , , , , and . ICISC, volume 9558 of Lecture Notes in Computer Science, page 297-313. Springer, (2015)Fault Diagnosis of Permanent Magnet Synchronous Motor Based on Stacked Denoising Autoencoder., , , , , and . Entropy, 23 (3): 339 (2021)Do multiple infections lead to better security? A new study on CHES 2014 infective countermeasure., , , , , and . Sci. China Inf. Sci., (2021)Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round., , , , and . ICISC, volume 10157 of Lecture Notes in Computer Science, page 317-332. (2016)Learning Action Pattern for Activity Recognition., , , and . ES, page 13-17. IEEE, (2017)Practical Lattice-Based Fault Attack and Countermeasure on SM2 Signature Algorithm., , , , , , and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 62-70. Springer, (2015)The Non-Linear Influence of Built Environment on the School Commuting Metro Ridership: The Case in Wuhan, China., , , , , and . ISPRS Int. J. Geo Inf., 12 (5): 193 (2023)A Framework for Evaluation and Analysis on Infection Countermeasures Against Fault Attacks., , , , and . IEEE Trans. Inf. Forensics Secur., (2020)