Get busy living… or get busy dying. —— The Shawshank Redemption

Publications


News


2021

  1. Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean Luc Danger and Naghmeh Karimi. Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks. DATE 2021. To appear. [Online link]

  2. Olivier Rioul, Wei Cheng and Sylvain Guilley. Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret. ISIT 2021. To appear. [Online link, ArXiv]

  3. Wei Cheng, Sylvain Guilley, Claude Carlet, Jean-Luc Danger and Sihem Mesnager. Information Leakages in Code-based Masking: A Unified Quantification Approach. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): XXX–XXX (2021). To appear. [Online link, ePrint]

  4. Wei Cheng, Sylvain Guilley and Jean-Luc Danger. Categorizing All Linear Codes of IPM over GF(2^8). Cryptogr. Commun. (2021). [Online link]

  5. Patrick Solé, Wei Cheng, Sylvain Guilley, Olivier Rioul. Bent Sequences over Hadamard Codes for Physically Unclonable Functions. ISIT 2021. To appear. [Online link]

  6. Yi Liu, Wei Cheng, Sylvain Guilley and Olivier Rioul. On Conditional α-Information and its Application to Side-Channel Analysis. Submitted. [Online link, ArXiv]

  7. Wei Cheng, Yi Liu, Sylvain Guilley and Olivier Rioul. Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds. Submitted. [Online link, ArXiv]

  8. Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean-Luc Danger and Naghmeh Karimi. Enhancing the Resiliency of Multi-Bit Parallel Arbiter-PUF and its Derivatives against Power Attacks. COSADE 2021. To appear. [Online link]

2020

  1. Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean Luc Danger and Naghmeh Karimi. Effect of Aging on PUF Modeling Attacks based on Power Side-Channel Observations. DATE 2020 : 454–459. [Online link]

  2. Yiwen Gao, Yongbin Zhou, Wei Cheng. Efficient electro-magnetic analysis of a GPU bitsliced AES implementation. Cybersecurity 3, 3 (2020). [Online link, BibTeX]

  3. Wei Cheng, Claude Carlet, Kouassi Goli, Jean-Luc Danger and Sylvain Guilley. Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection (Extended version*). J Cryptogr Eng (2020) : 1–15. [Online link, Cite]

  4. Jingdian Ming, Yongbin Zhou, Wei Cheng, Huizhong Li, Guang Yang and Qian Zhang. Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes. IEEE Transactions on Information Forensics and Security (T-IFS), vol. 15, pp. 3694–3708, 2020. [Online link]

  5. Wei Cheng, Sylvain Guilley, Claude Carlet, Sihem Mesnager and Jean-Luc Danger. Optimizing Inner Product Masking Scheme by A Coding Theory Approach. IEEE Transactions on Information Forensics and Security (T-IFS) , vol. 16, pp. 220–235, 2021. [Online link, ePrint]

  6. Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean Luc Danger and Naghmeh Karimi. Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel. ITC 2020, 1–5 (short paper). [Online link]

2019

  1. Wei Cheng, Claude Carlet, Kouassi Goli, Jean-Luc Danger and Sylvain Guilley. Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection. PROOFS 2019 : 1-16. [Online link, Full version, Slides, BibTeX]

2018

  1. Qian Zhang, Yongbin Zhou, Shuang Qiu, Wei Cheng, Jingdian Ming and Rui Zhang. A Compact AES Hardware Implementation Secure Against 1st-Order Side-Channel Attacks. ICCD 2018 : 545-552. [Online link, Full version, BibTeX]

  2. Yiwen Gao, Wei Cheng, Hailong Zhang and Yongbin Zhou. Cache-Collision Attacks on GPU-Based AES Implementation with Electro-Magnetic Leakages. TrustCom/BigDataSE 2018 : 300-306. [Online link, Full version, BibTeX]

  3. Yiwen Gao, Hailong Zhang, Wei Cheng, Yongbin Zhou and Yuchen Cao. Electro-magnetic analysis of GPU-based AES implementation. DAC 2018 : 121:1-121:6. [Online link, Full version, Poster, BibTeX]

  4. Yiwen Gao, Yongbin Zhou and Wei Cheng. How Does Strict Parallelism Affect Security? A Case Study on the Side-Channel Attacks against GPU-based Bitsliced AES Implementation. IACR Cryptology ePrint Archive 2018: 1080 (2018). [Online link, Full version, BibTeX]

  5. Jingdian Ming, Wei Cheng, Huizhong Li, Guang Yang, Yongbin Zhou and Qian Zhang. Achilles’ Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure. IACR Cryptology ePrint Archive 2018: 745 (2018). [Online link, Full version, BibTeX]

2017

  1. Wei Cheng, Chao Zheng, Yuchen Cao, Yongbin Zhou, Hailong Zhang, Sylvain Guilley and Laurent Sauvage. How Far Can We Reach? Breaking RSM-Masked AES-128 Implementation Using Only One Trace. IACR Cryptology ePrint Archive 2017: 1144 (2017). [Online link, Full version, BibTeX]

  2. Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou and Wei Cheng. Manifold Learning Towards Masking Implementations: A First Study. IACR Cryptology ePrint Archive 2017: 1112 (2017). [Online link, Full version, BibTeX]

2016

  1. Wei Cheng, Yongbin Zhou and Laurent Sauvage. Differential Fault Analysis on Midori. ICICS 2016 : 307-317. [Online link, Full version, BibTeX]