default search action
Weijia Wang 0003
Person information
- unicode name: 王伟嘉
- affiliation: Shandong University, School of Cyber Science and Technology, Qingdao, China
- affiliation (former): Université catholique de Louvain, Louvain-la-Neuve, Belgium
- affiliation (former, PhD): Shanghai Jiao Tong University, China
Other persons with the same name
- Weijia Wang (aka: Wei-Jia Wang) — disambiguation page
- Weijia Wang 0001 — Flight Automatic Control Research Institute, Xi'an, China (and 1 more)
- Weijia Wang 0002 — University of California San Diego, Department of Electrical and Computer Engineering, CA, USA
- Weijia Wang 0004 — Air Force Engineering University, Air Traffic Control and Navigation College, Xi'an, China
- Wei-Jia Wang 0005 (aka: Weijia Wang 0005) — University of Electronic Science and Technology of China, School of Information and Software Engineering, Chengdu, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j19]Lu Li, Guofeng Qin, Yang Yu, Weijia Wang:
Compact Instruction Set Extensions for Kyber. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(3): 756-760 (2024) - [j18]Jiayun Zhou, Guofeng Qin, Lu Li, Chun Guo, Weijia Wang:
ISA Extensions of Shuffling Against Side-Channel Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(3): 761-773 (2024) - [j17]Juelin Zhang, Taoyun Wang, Yiteng Sun, Fanjie Ji, Bohan Wang, Lu Li, Yu Yu, Weijia Wang:
Efficient Table-Based Masking with Pre-processing. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 273-301 (2024) - [j16]Lu Li, Qi Tian, Guofeng Qin, Shuaiyu Chen, Weijia Wang:
Compact Instruction Set Extensions for Dilithium. ACM Trans. Embed. Comput. Syst. 23(2): 23:1-23:21 (2024) - 2023
- [j15]Hao Lin, Shi-Feng Sun, Mingqiang Wang, Joseph K. Liu, Weijia Wang:
Shorter Linkable Ring Signature Based on Middle-Product Learning with Errors Problem. Comput. J. 66(12): 2974-2989 (2023) - [j14]Weijia Wang, Fanjie Ji, Juelin Zhang, Yu Yu:
Efficient Private Circuits with Precomputation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 286-309 (2023) - 2022
- [j13]Shiyao Chen, Yanhong Fan, Ling Sun, Yong Fu, Haibo Zhou, Yongqing Li, Meiqin Wang, Weijia Wang, Chun Guo:
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations. Des. Codes Cryptogr. 90(1): 155-198 (2022) - [j12]Weijia Wang, Chun Guo, Yu Yu, Fanjie Ji, Yang Su:
Side-Channel Masking with Common Shares. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 290-329 (2022) - [j11]Qun Liu, Weijia Wang, Yanhong Fan, Lixuan Wu, Ling Sun, Meiqin Wang:
Towards Low-Latency Implementation of Linear Layers. IACR Trans. Symmetric Cryptol. 2022(1): 158-182 (2022) - [j10]Qun Liu, Weijia Wang, Ling Sun, Yanhong Fan, Lixuan Wu, Meiqin Wang:
More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs. IACR Trans. Symmetric Cryptol. 2022(2): 351-378 (2022) - 2021
- [j9]Yanhong Fan, Sihem Mesnager, Weijia Wang, Yongqing Li, Tingting Cui, Meiqin Wang:
Investigation for 8-bit SKINNY-like S-boxes, analysis and applications. Cryptogr. Commun. 13(5): 617-636 (2021) - [j8]Chun Guo, François-Xavier Standaert, Weijia Wang, Xiao Wang, Yu Yu:
Provable Security of SP Networks with Partial Non-Linear Layers. IACR Trans. Symmetric Cryptol. 2021(2): 353-388 (2021) - 2020
- [j7]Weijia Wang, Pierrick Méaux, Gaëtan Cassiers, François-Xavier Standaert:
Efficient and Private Computations with Code-Based Masking. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 128-171 (2020) - [j6]Yuan Gao, Chun Guo, Meiqin Wang, Weijia Wang, Jiejing Wen:
Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks. IACR Trans. Symmetric Cryptol. 2020(3): 305-326 (2020) - 2019
- [j5]Chi Zhang, Junrong Liu, Dawu Gu, Weijia Wang, Xiangjun Lu, Zheng Guo, Hai-Ning Lu:
Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks. J. Comput. Sci. Technol. 34(5): 1079-1095 (2019) - [j4]Weijia Wang, Yu Yu, François-Xavier Standaert:
Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations. IEEE Trans. Inf. Forensics Secur. 14(11): 3069-3082 (2019) - [j3]Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu:
Efficient Side-Channel Secure Message Authentication with Better Bounds. IACR Trans. Symmetric Cryptol. 2019(4): 23-53 (2019) - 2018
- [j2]Sen Xu, Xiangjun Lu, Kaiyu Zhang, Yang Li, Lei Wang, Weijia Wang, Haihua Gu, Zheng Guo, Junrong Liu, Dawu Gu:
Similar operation template attack on RSA-CRT as a case study. Sci. China Inf. Sci. 61(3): 032111:1-032111:17 (2018) - [j1]Weijia Wang, Yu Yu, François-Xavier Standaert, Junrong Liu, Zheng Guo, Dawu Gu:
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips. IEEE Trans. Inf. Forensics Secur. 13(5): 1301-1316 (2018)
Conference and Workshop Papers
- 2024
- [c14]Lixuan Wu, Yanhong Fan, Bart Preneel, Weijia Wang, Meiqin Wang:
Automated Generation of Masked Nonlinear Components: - From Lookup Tables to Private Circuits. ACNS Workshops (1) 2024: 319-339 - 2023
- [c13]Yuqing Zhao, Chun Guo, Weijia Wang:
Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks. CANS 2023: 101-125 - [c12]Shiduo Zhang, Xiuhan Lin, Yang Yu, Weijia Wang:
Improved Power Analysis Attacks on Falcon. EUROCRYPT (4) 2023: 565-595 - [c11]Lu Li, Mingqiang Wang, Weijia Wang:
Implementing Lattice-Based PQC on Resource-Constrained Processors: - A Case Study for Kyber/Saber's Polynomial Multiplication on ARM Cortex-M0/M0+\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$+$$\end{document}. INDOCRYPT (2) 2023: 153-176 - 2022
- [c10]Xin Miao, Chun Guo, Meiqin Wang, Weijia Wang:
How Fast Can SM4 be in Software? Inscrypt 2022: 3-22 - 2021
- [c9]Yanhong Fan, Weijia Wang, Zhihu Li, Zhenyu Lu, Siu-Ming Yiu, Meiqin Wang:
Forced Independent Optimized Implementation of 4-Bit S-Box. ACISP 2021: 151-170 - [c8]Zhenyu Lu, Weijia Wang, Kai Hu, Yanhong Fan, Lixuan Wu, Meiqin Wang:
Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes. INDOCRYPT 2021: 159-178 - 2020
- [c7]Weijia Wang, Chun Guo, François-Xavier Standaert, Yu Yu, Gaëtan Cassiers:
Packed Multiplication: How to Amortize the Cost of Side-Channel Masking? ASIACRYPT (1) 2020: 851-880 - 2017
- [c6]Sihang Pu, Yu Yu, Weijia Wang, Zheng Guo, Junrong Liu, Dawu Gu, Lingyun Wang, Jie Gan:
Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA? CARDIS 2017: 232-247 - [c5]Weijia Wang, Yu Yu, François-Xavier Standaert, Dawu Gu, Sen Xu, Chi Zhang:
Ridge-Based Profiled Differential Power Analysis. CT-RSA 2017: 347-362 - 2016
- [c4]Weijia Wang, François-Xavier Standaert, Yu Yu, Sihang Pu, Junrong Liu, Zheng Guo, Dawu Gu:
Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages. CARDIS 2016: 174-191 - 2015
- [c3]Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, François-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu:
Evaluation and Improvement of Generic-Emulating DPA Attacks. CHES 2015: 416-432 - 2013
- [c2]Shutong Wang, Dawu Gu, Junrong Liu, Zheng Guo, Weijia Wang, Sigang Bao:
A Power Analysis on SMS4 Using the Chosen Plaintext Method. CIS 2013: 748-752 - 2011
- [c1]Weijia Wang, Haihang Wang:
Weakness in 802.11w and an improved mechanism on protection of management frame. WCSP 2011: 1-4
Informal and Other Publications
- 2024
- [i11]Ruiyang Li, Yiteng Sun, Chun Guo, François-Xavier Standaert, Weijia Wang, Xiao Wang:
Leakage-Resilience of Circuit Garbling. IACR Cryptol. ePrint Arch. 2024: 1356 (2024) - 2023
- [i10]Shiduo Zhang, Xiuhan Lin, Yang Yu, Weijia Wang:
Improved Power Analysis Attacks on Falcon. IACR Cryptol. ePrint Arch. 2023: 224 (2023) - [i9]Lixuan Wu, Yanhong Fan, Bart Preneel, Weijia Wang, Meiqin Wang:
An automated generation tool of hardware masked S-box: AGEMA+. IACR Cryptol. ePrint Arch. 2023: 831 (2023) - [i8]Yuqing Zhao, Chun Guo, Weijia Wang:
Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks. IACR Cryptol. ePrint Arch. 2023: 1295 (2023) - 2022
- [i7]Qun Liu, Weijia Wang, Yanhong Fan, Lixuan Wu, Ling Sun, Meiqin Wang:
Towards Low-Latency Implementation of Linear Layers. IACR Cryptol. ePrint Arch. 2022: 231 (2022) - [i6]Qun Liu, Weijia Wang, Ling Sun, Yanhong Fan, Lixuan Wu, Meiqin Wang:
More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs. IACR Cryptol. ePrint Arch. 2022: 747 (2022) - 2021
- [i5]Shiyao Chen, Yanhong Fan, Ling Sun, Yong Fu, Haibo Zhou, Yongqing Li, Meiqin Wang, Weijia Wang, Chun Guo:
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations. IACR Cryptol. ePrint Arch. 2021: 1560 (2021) - [i4]Zhenyu Lu, Weijia Wang, Kai Hu, Yanhong Fan, Lixuan Wu, Meiqin Wang:
Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes. IACR Cryptol. ePrint Arch. 2021: 1644 (2021) - 2020
- [i3]Weijia Wang, Chun Guo, François-Xavier Standaert, Yu Yu, Gaëtan Cassiers:
Packed Multiplication: How to Amortize the Cost of Side-channel Masking ? IACR Cryptol. ePrint Arch. 2020: 1103 (2020) - 2019
- [i2]Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu:
Efficient Side-Channel Secure Message Authentication with Better Bounds. IACR Cryptol. ePrint Arch. 2019: 1424 (2019) - 2016
- [i1]Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, François-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu:
Evaluation and Improvement of Generic-Emulating DPA Attacks. IACR Cryptol. ePrint Arch. 2016: 294 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint