default search action
Wei Cheng 0003
Person information
- affiliation: Télécom Paris & Institut Polytechnique de Paris, Paris, France
- affiliation (former): Institute of Information Engineering, CAS, Beijing, China
Other persons with the same name
- Wei Cheng — disambiguation page
- Wei Cheng 0001 — University of Washington, School of Engineering and Technology, Tacoma, USA (and 2 more)
- Wei Cheng 0002 — NEC Laboratories America, Princeton, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Wei Cheng, Yi Liu, Sylvain Guilley, Olivier Rioul:
Toward finding best linear codes for side-channel protections (extended version). J. Cryptogr. Eng. 14(1): 131-145 (2024) - [j18]Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Be My Guesses: The interplay between side-channel leakage metrics. Microprocess. Microsystems 107: 105045 (2024) - [j17]Wei Cheng, Jingdian Ming, Sylvain Guilley, Jean-Luc Danger:
Statistical Higher-Order Correlation Attacks Against Code-Based Masking. IEEE Trans. Computers 73(10): 2364-2377 (2024) - [c23]Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Formal Security Proofs via Doeblin Coefficients: - Optimal Side-Channel Factorization from Noisy Leakage to Random Probing. CRYPTO (6) 2024: 389-426 - [i16]Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Formal Security Proofs via Doeblin Coefficients: Optimal Side-channel Factorization from Noisy Leakage to Random Probing. IACR Cryptol. ePrint Arch. 2024: 199 (2024) - 2023
- [j16]Minjia Shi, Yaya Li, Wei Cheng, Dean Crnkovic, Denis S. Krotov, Patrick Solé:
Self-dual bent sequences for complex Hadamard matrices. Des. Codes Cryptogr. 91(4): 1453-1474 (2023) - [j15]Om Prakash, Ashutosh Singh, Ram Krishna Verma, Patrick Solé, Wei Cheng:
DNA Code from Cyclic and Skew Cyclic Codes over F4[v]/⟨v3⟩. Entropy 25(2): 239 (2023) - [j14]Minjia Shi, Yaya Li, Wei Cheng, Dean Crnkovic, Denis S. Krotov, Patrick Solé:
Self-Dual Hadamard Bent Sequences. J. Syst. Sci. Complex. 36(2): 894-908 (2023) - [c22]Julien Béguinot, Wei Cheng, Sylvain Guilley, Yi Liu, Loïc Masure, Olivier Rioul, François-Xavier Standaert:
Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings. COSADE 2023: 86-104 - [c21]Jingdian Ming, Yongbin Zhou, Wei Cheng, Huizhong Li:
Table Re-Computation Based Low Entropy Inner Product Masking Scheme. DATE 2023: 1-6 - [c20]Julien Béguinot, Yi Liu, Olivier Rioul, Wei Cheng, Sylvain Guilley:
Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma for Min-Entropy. ISIT 2023: 654-659 - [c19]Yi Liu, Julien Béguinot, Wei Cheng, Sylvain Guilley, Loïc Masure, Olivier Rioul, François-Xavier Standaert:
Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic Implementations. ITW 2023: 81-86 - [c18]Julien Béguinot, Wei Cheng, Jean-Luc Danger, Sylvain Guilley, Olivier Rioul, Ville Yli-Mäyry:
Reliability of Ring Oscillator PUFs with Reduced Helper Data. IWSEC 2023: 36-56 - [i15]Julien Béguinot, Yi Liu, Olivier Rioul, Wei Cheng, Sylvain Guilley:
Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma for Min-Entropy. CoRR abs/2305.06276 (2023) - 2022
- [j13]Trevor Kroeger, Wei Cheng, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Cross-PUF Attacks: Targeting FPGA Implementation of Arbiter-PUFs. J. Electron. Test. 38(3): 261-277 (2022) - [j12]Qianmei Wu, Wei Cheng, Sylvain Guilley, Fan Zhang, Wei Fu:
On Efficient and Secure Code-based Masking: A Pragmatic Evaluation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 192-222 (2022) - [j11]Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Side-Channel Expectation-Maximization Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 774-799 (2022) - [j10]Wei Cheng, Sylvain Guilley, Jean-Luc Danger:
Information Leakage in Code-Based Masking: A Systematic Evaluation by Higher-Order Attacks. IEEE Trans. Inf. Forensics Secur. 17: 1624-1638 (2022) - [j9]Jingdian Ming, Yongbin Zhou, Wei Cheng, Huizhong Li:
Optimizing Higher-Order Correlation Analysis Against Inner Product Masking Scheme. IEEE Trans. Inf. Forensics Secur. 17: 3555-3568 (2022) - [j8]Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Assessment and Mitigation of Power Side-Channel-Based Cross-PUF Attacks on Arbiter-PUFs and Their Derivatives. IEEE Trans. Very Large Scale Integr. Syst. 30(2): 187-200 (2022) - [c17]Wei Cheng, Olivier Rioul, Yi Liu, Julien Béguinot, Sylvain Guilley:
Side-Channel Information Leakage of Code-Based Masked Implementations. CWIT 2022: 51-56 - [c16]Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Be My Guess: Guessing Entropy vs. Success Rate for Evaluating Side-Channel Attacks of Secure Chips. DSD 2022: 496-503 - [c15]Wei Cheng, Yi Liu, Sylvain Guilley, Olivier Rioul:
Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds. ISIT 2022: 654-659 - [i14]Minjia Shi, Yaya Li, Wei Cheng, Dean S. Crnkovic, Denis S. Krotov, Patrick Solé:
Self-dual Hadamard bent sequences. CoRR abs/2203.16439 (2022) - [i13]Wei Cheng, Sylvain Guilley, Jean-Luc Danger:
Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks. IACR Cryptol. ePrint Arch. 2022: 461 (2022) - [i12]Julien Béguinot, Wei Cheng, Sylvain Guilley, Yi Liu, Loïc Masure, Olivier Rioul, François-Xavier Standaert:
Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings. IACR Cryptol. ePrint Arch. 2022: 1738 (2022) - 2021
- [b1]Wei Cheng:
What can information guess? : Towards information leakage quantification in side-channel analysis. (Qu'est ce que l'information permet de deviner? : Vers une quantification des fuites d'informations dans l'analyse de canaux auxiliaires). Polytechnic Institute of Paris, France, 2021 - [j7]Wei Cheng, Sylvain Guilley, Jean-Luc Danger:
Categorizing all linear codes of IPM over ${\mathbb {F}}_{2^{8}}$. Cryptogr. Commun. 13(4): 527-542 (2021) - [j6]Wei Cheng, Claude Carlet, Kouassi Goli, Jean-Luc Danger, Sylvain Guilley:
Detecting faults in inner product masking scheme. J. Cryptogr. Eng. 11(2): 119-133 (2021) - [j5]Wei Cheng, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager:
Information Leakages in Code-based Masking: A Unified Quantification Approach. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 465-495 (2021) - [j4]Jingdian Ming, Huizhong Li, Yongbin Zhou, Wei Cheng, Zehua Qiao:
Revealing the Weakness of Addition Chain Based Masked SBox Implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 326-350 (2021) - [j3]Wei Cheng, Sylvain Guilley, Claude Carlet, Sihem Mesnager, Jean-Luc Danger:
Optimizing Inner Product Masking Scheme by a Coding Theory Approach. IEEE Trans. Inf. Forensics Secur. 16: 220-235 (2021) - [c14]Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Enhancing the Resiliency of Multi-bit Parallel Arbiter-PUF and Its Derivatives Against Power Attacks. COSADE 2021: 303-321 - [c13]Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks. DATE 2021: 1000-1005 - [c12]Jingdian Ming, Wei Cheng, Yongbin Zhou, Huizhong Li:
APT: Efficient Side-Channel Analysis Framework against Inner Product Masking Scheme. ICCD 2021: 575-582 - [c11]Patrick Solé, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Bent Sequences over Hadamard Codes for Physically Unclonable Functions. ISIT 2021: 801-806 - [c10]Olivier Rioul, Wei Cheng, Sylvain Guilley:
Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret. ISIT 2021: 2596-2601 - [c9]Yi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul:
On Conditional Alpha-Information and its Application to Side-Channel Analysis. ITW 2021: 1-6 - [c8]Patrick Solé, Yi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Linear Programming Bounds on the Kissing Number of q-ary Codes. ITW 2021: 1-5 - [i11]Olivier Rioul, Wei Cheng, Sylvain Guilley:
Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret. CoRR abs/2102.02468 (2021) - [i10]Yi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul:
On Conditional α-Information and its Application to Side-Channel Analysis. CoRR abs/2105.07167 (2021) - [i9]Wei Cheng, Yi Liu, Sylvain Guilley, Olivier Rioul:
Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds. CoRR abs/2105.07436 (2021) - [i8]Wei Cheng, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager:
Information Leakages in Code-based Masking: A Unified Quantification Approach. IACR Cryptol. ePrint Arch. 2021: 363 (2021) - 2020
- [j2]Yiwen Gao, Yongbin Zhou, Wei Cheng:
Efficient electro-magnetic analysis of a GPU bitsliced AES implementation. Cybersecur. 3(1): 3 (2020) - [j1]Jingdian Ming, Yongbin Zhou, Wei Cheng, Huizhong Li, Guang Yang, Qian Zhang:
Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes. IEEE Trans. Inf. Forensics Secur. 15: 3694-3708 (2020) - [c7]Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Effect of Aging on PUF Modeling Attacks based on Power Side-Channel Observations. DATE 2020: 454-459 - [c6]Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel. ITC 2020: 1-5 - [i7]Wei Cheng, Sylvain Guilley, Claude Carlet, Sihem Mesnager, Jean-Luc Danger:
Optimizing Inner Product Masking Scheme by A Coding Theory Approach. IACR Cryptol. ePrint Arch. 2020: 692 (2020)
2010 – 2019
- 2019
- [c5]Wei Cheng, Claude Carlet, Kouassi Goli, Jean-Luc Danger, Sylvain Guilley:
Detecting Faults in Inner-Product Masking Scheme - IPM-FD: IPM with Fault Detection. PROOFS 2019: 17-32 - [i6]Wei Cheng, Claude Carlet, Kouassi Goli, Sylvain Guilley, Jean-Luc Danger:
Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection. IACR Cryptol. ePrint Arch. 2019: 919 (2019) - 2018
- [c4]Yiwen Gao, Hailong Zhang, Wei Cheng, Yongbin Zhou, Yuchen Cao:
Electro-magnetic analysis of GPU-based AES implementation. DAC 2018: 121:1-121:6 - [c3]Qian Zhang, Yongbin Zhou, Shuang Qiu, Wei Cheng, Jingdian Ming, Rui Zhang:
A Compact AES Hardware Implementation Secure Against 1st-Order Side-Channel Attacks. ICCD 2018: 545-552 - [c2]Yiwen Gao, Wei Cheng, Hailong Zhang, Yongbin Zhou:
Cache-Collision Attacks on GPU-Based AES Implementation with Electro-Magnetic Leakages. TrustCom/BigDataSE 2018: 300-306 - [i5]Jingdian Ming, Wei Cheng, Huizhong Li, Guang Yang, Yongbin Zhou, Qian Zhang:
Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure. IACR Cryptol. ePrint Arch. 2018: 745 (2018) - [i4]Yiwen Gao, Yongbin Zhou, Wei Cheng:
How Does Strict Parallelism Affect Security? A Case Study on the Side-Channel Attacks against GPU-based Bitsliced AES Implementation. IACR Cryptol. ePrint Arch. 2018: 1080 (2018) - 2017
- [i3]Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou, Wei Cheng:
Manifold Learning Towards Masking Implementations: A First Study. IACR Cryptol. ePrint Arch. 2017: 1112 (2017) - [i2]Wei Cheng, Chao Zheng, Yuchen Cao, Yongbin Zhou, Hailong Zhang, Sylvain Guilley, Laurent Sauvage:
How Far Can We Reach? Breaking RSM-Masked AES-128 Implementation Using Only One Trace. IACR Cryptol. ePrint Arch. 2017: 1144 (2017) - [i1]Shuang Qiu, Rui Zhang, Yongbin Zhou, Wei Cheng:
Corrections to "Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexity". IACR Cryptol. ePrint Arch. 2017: 1244 (2017) - 2016
- [c1]Wei Cheng, Yongbin Zhou, Laurent Sauvage:
Differential Fault Analysis on Midori. ICICS 2016: 307-317
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint