Get busy living… or get busy dying. —— The Shawshank Redemption

Publications


News

*All of my co-authored articles can be found on Google Scholar profile.


2023

  1. Julien Béguinot, Wei Cheng, Sylvain Guilley, Yi Liu, Loïc Masure, Olivier Rioul, and François-Xavier Standaert. Removing the Field Size Loss From Duc et al.’s Conjectured Security Bound for Masking. COSADE 2023: 86–104, 2023. [Online link, ePrint]

  2. Yi Liu, Julien Béguinot, Wei Cheng, Sylvain Guilley, Loïc Masure, Olivier Rioul, and François-Xavier Standaert. Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic Implementations. ITW 2023: 81–86, 2023. [Online link]

  3. Jingdian Ming, Yongbin Zhou, Wei Cheng, and Huizhong Li. Table Re-Computation Based Low Entropy Inner Product Masking Scheme. DATE 2023: 1–6, 2023. [Online link]

  4. Julien Béguinot, Wei Cheng, Jean-Luc Danger, Sylvain Guilley, Olivier Rioul, Ville Yli-Mäyry. Reliability of Ring Oscillator PUFs with Reduced Helper Data. IWSEC 2023: 36–56, 2023. [Online link]

  5. Julien Béguinot, Yi Liu, Olivier Rioul, Wei Cheng, Sylvain Guilley. Maximal Leakage of Masked Implementations Using Mrs. Gerber’s Lemma for Min-Entropy. ISIT 2023: 654–659, 2023. [Online link]

  6. Minjia Shi, Yaya Li, Wei Cheng, Dean Crnković, Denis Krotov, Patrick Solé. Self-dual bent sequences for complex Hadamard matrices. Des. Codes Cryptogr. 91(4): 1453–1474, 2023. [Online link, Open-sources]

  7. Minjia Shi, Yaya Li, Wei Cheng, Dean Crnkovic, Denis S. Krotov, Patrick Solé. [Self-Dual Hadamard Bent Sequences.] J. Syst. Sci. Complex. 36(2): 894–908, 2023. [ArXiv, Online link, Open-sources]

2022

  1. Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean-Luc Danger, and Naghmeh Karimi. Assessment and Mitigation of Power Side-Channel based Cross-PUF Attacks on Arbiter-PUFs and their Derivatives. IEEE Transactions on Very Large Scale Integration Systems (TVLSI), vol. 30(2), pp. 187–200, 2022. [Online link]

  2. Yi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul, and Patrick Solé. Kissing Number of Codes: A Survey. Chapter, VIASM, Springer Lecture Notes in Mathematics, 2022. [Online link, Preprint]

  3. Wei Cheng, Sylvain Guilley, and Jean-Luc Danger. Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks. IEEE Transactions on Information Forensics and Security (T-IFS), vol. 17, pp. 1624–1638, 2022. [Online link, HAL, Open-sources]

  4. Qianmei Wu, Wei Cheng, Sylvain Guilley, Fan Zhang, and Wei Fu. On Efficient and Secure Code-based Masking: A Pragmatic Evaluation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022 (3): 192–222 (2022). [Online link, Slides, Source Codes in CHES Artifacts]

  5. Wei Cheng, Yi Liu, Sylvain Guilley, and Olivier Rioul. Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds. ISIT 2022: 654–659 (2022). [Online link, ArXiv]

  6. Wei Cheng, Olivier Rioul, Yi Liu, Julien Béguinot, and Sylvain Guilley. Side-Channel Information Leakage of Code-Based Masked Implementations. CWIT 2022: 51–56 (2022) [Online link]

  7. Trevor Kroeger, Wei Cheng, Jean-Luc Danger, Sylvain Guilley, and Naghmeh Karimi. Cross-PUF Attacks: Targeting FPGA Implementation of Arbiter-PUFs. Journal of Electronic Testing: Theory and Applications, vol. 38, pp. 261–277 (2022). [Online link]

  8. Julien Béguinot, Wei Cheng, Sylvain Guilley and Olivier Rioul. Be My Guess: Guessing Entropy vs. Success Rate for Evaluating Side-Channel Attacks of Secure Chips. Euromicro DSD 2022. [Online link, Preprint, HAL]

  9. Julien Béguinot, Wei Cheng, Sylvain Guilley and Olivier Rioul. Side-Channel Expectation-Maximization Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022 (4): 774–799 (2022). [Online link, Preprint, Slides, Open-sources]

  10. Wei Cheng, Jean-Luc Danger, Sylvain Guilley, Fan Huang, Amina Bel Korchi, and Olivier Rioul. Cache-Timing Attack on the SEAL Homomorphic Encryption Library. PROOFS 2022: 1–15, 2022. [Online link, HAL]

  11. Jingdian Ming, Yongbin Zhou, Wei Cheng, and Huizhong Li. Optimizing Higher-Order Correlation Analysis against Inner Product Masking Scheme. IEEE Transactions on Information Forensics and Security (T-IFS), vol. 17, pp. 3555–3568, 2022. [Online link]

  12. Wei Cheng, Yi Liu, Sylvain Guilley, and Olivier Rioul. Towards Finding Best Linear Codes for Side-Channel Protections (Extended version*). J. Cryptogr. Eng.: xxx–xxx (2022). [Online link]

2021

  1. Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean Luc Danger, and Naghmeh Karimi. Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks. DATE 2021: 1000–1005 (2021). [Online link]

  2. Olivier Rioul, Wei Cheng, and Sylvain Guilley. Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret. ISIT 2021: 2596–2601 (2021). [Online link, ArXiv]

  3. Wei Cheng, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, and Sihem Mesnager. Information Leakages in Code-based Masking: A Unified Quantification Approach. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021 (3): 465–495 (2021). [Online link, ePrint, Open-sources, Slides]

  4. Wei Cheng, Sylvain Guilley, and Jean-Luc Danger. Categorizing All Linear Codes of IPM over GF(2^8). Cryptogr. Commun. 13(4): 527–542 (2021). [Online link]

  5. Patrick Solé, Wei Cheng, Sylvain Guilley, and Olivier Rioul. Bent Sequences over Hadamard Codes for Physically Unclonable Functions. ISIT 2021: 801–806 (2021). [Online link]

  6. Yi Liu, Wei Cheng, Sylvain Guilley, and Olivier Rioul. On Conditional α-Information and its Application to Side-Channel Analysis. ITW 2021: 1–6 (2021). [Online link, ArXiv]

  7. Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean-Luc Danger, and Naghmeh Karimi. Enhancing the Resiliency of Multi-Bit Parallel Arbiter-PUF and its Derivatives against Power Attacks. COSADE 2021: 303–321 (2021). [Online link]

  8. Patrick Solé, Yi Liu, Wei Cheng, Sylvain Guilley, and Olivier Rioul. Linear Programming Bounds on the Kissing Number of q-ary Codes. ITW 2021: 1–5 (2021). [Online link]

  9. Jingdian Ming, Huizhong Li, Yongbin Zhou, Wei Cheng, and Zehua Qiao. Revealing the Weakness of Addition Chain Based Masked SBox Implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021 (4): 326–350 (2021). [Online link, Slides]

  10. Wei Cheng, Yi Liu, Sylvain Guilley, and Olivier Rioul. Towards Finding Best Linear Codes for Side-Channel Protections. PROOFS 2021: vol 87, pp 83–99 (2021). [Online link, HAL]

  11. Jingdian Ming, Wei Cheng, Yongbin Zhou, and Huizhong Li. APT: Efficient Side-Channel Analysis Framework against Inner Product Masking Scheme. ICCD 2021: 575–582 (2021). [Online link]

2020

  1. Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean Luc Danger, and Naghmeh Karimi. Effect of Aging on PUF Modeling Attacks based on Power Side-Channel Observations. DATE 2020 : 454–459. [Online link]

  2. Yiwen Gao, Yongbin Zhou, and Wei Cheng. Efficient electro-magnetic analysis of a GPU bitsliced AES implementation. Cybersecurity 3, 3 (2020). [Online link, BibTeX]

  3. Wei Cheng, Claude Carlet, Kouassi Goli, Jean-Luc Danger, and Sylvain Guilley. Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection (Extended version*). J. Cryptogr. Eng. (2020) : 1–15. [Online link, Cite, Open-sources]

  4. Jingdian Ming, Yongbin Zhou, Wei Cheng, Huizhong Li, Guang Yang, and Qian Zhang. Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes. IEEE Transactions on Information Forensics and Security (T-IFS), vol. 15, pp. 3694–3708, 2020. [Online link]

  5. Wei Cheng, Sylvain Guilley, Claude Carlet, Sihem Mesnager, and Jean-Luc Danger. Optimizing Inner Product Masking Scheme by A Coding Theory Approach. IEEE Transactions on Information Forensics and Security (T-IFS) , vol. 16, pp. 220–235, 2021. [Online link, ePrint, Open-sources]

  6. Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean Luc Danger, and Naghmeh Karimi. Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel. ITC 2020, 1–5 (short paper). [Online link]

2019

  1. Wei Cheng, Claude Carlet, Kouassi Goli, Jean-Luc Danger, and Sylvain Guilley. Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection. PROOFS 2019 : 1-16. [Online link, Full version, Slides]

2018

  1. Qian Zhang, Yongbin Zhou, Shuang Qiu, Wei Cheng, Jingdian Ming, and Rui Zhang. A Compact AES Hardware Implementation Secure Against 1st-Order Side-Channel Attacks. ICCD 2018 : 545-552. [Online link]

  2. Yiwen Gao, Wei Cheng, Hailong Zhang, and Yongbin Zhou. Cache-Collision Attacks on GPU-Based AES Implementation with Electro-Magnetic Leakages. TrustCom/BigDataSE 2018 : 300-306. [Online link, Open-sources]

  3. Yiwen Gao, Hailong Zhang, Wei Cheng, Yongbin Zhou, and Yuchen Cao. Electro-magnetic analysis of GPU-based AES implementation. DAC 2018 : 121:1-121:6. [Online link, Poster]

  4. Yiwen Gao, Yongbin Zhou, and Wei Cheng. How Does Strict Parallelism Affect Security? A Case Study on the Side-Channel Attacks against GPU-based Bitsliced AES Implementation. IACR Cryptology ePrint Archive 2018: 1080 (2018). [Online link]

  5. Jingdian Ming, Wei Cheng, Huizhong Li, Guang Yang, Yongbin Zhou, and Qian Zhang. Achilles’ Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure. IACR Cryptology ePrint Archive 2018: 745 (2018). [Online link]

2017

  1. Wei Cheng, Chao Zheng, Yuchen Cao, Yongbin Zhou, Hailong Zhang, Sylvain Guilley, and Laurent Sauvage. How Far Can We Reach? Breaking RSM-Masked AES-128 Implementation Using Only One Trace. IACR Cryptology ePrint Archive 2017: 1144 (2017). [Online link]

  2. Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou, and Wei Cheng. Manifold Learning Towards Masking Implementations: A First Study. IACR Cryptology ePrint Archive 2017: 1112 (2017). [Online link]

2016

  1. Wei Cheng, Yongbin Zhou, and Laurent Sauvage. Differential Fault Analysis on Midori. ICICS 2016 : 307-317. [Online link]