default search action
Jiazhe Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Shaofei Sun, Hongwei Yu, An Wang, Congming Wei, Yaoling Ding, Liehuang Zhu, Jiazhe Chen:
Dual-Path Hybrid Residual Network for Profiled Side-Channel Analysis. IEEE Trans. Circuits Syst. II Express Briefs 71(8): 3985-3989 (2024) - [c19]Xue Yang, Congming Wei, Yaoling Ding, Shaofei Sun, An Wang, Jiazhe Chen:
A Command-Activated Hardware Trojan Detection Method Based on LUNAR Framework. ACNS Workshops (1) 2024: 340-358 - 2023
- [j7]Lei Guo, Xiongming Chen, Jiazhe Chen, Peng Luo, Liming Zhao:
CLLCLC Topology Based on Adaptive Excitation Inductance for the Improvement of Bidirectional DC-DC Converter Efficiency. IEEE Access 11: 137594-137605 (2023) - 2022
- [c18]Weiqiong Cao, Hongsong Shi, Hua Chen, Jiazhe Chen, Limin Fan, Wenling Wu:
Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA. CT-RSA 2022: 169-195 - 2021
- [c17]Weiqiong Cao, Hongsong Shi, Hua Chen, Wei Wei, Jiazhe Chen:
Lattice-Based Weak Curve Fault Attack on ECDSA. SEC 2021: 146-161 - 2020
- [j6]Congming Wei, Jiazhe Chen, An Wang, Beibei Wang, Hongsong Shi, Xiaoyun Wang:
x-only coordinate: with application to secp256k1 " >Chosen base-point side-channel attack on Montgomery ladder with x-only coordinate: with application to secp256k1. IET Inf. Secur. 14(5): 483-492 (2020)
2010 – 2019
- 2019
- [j5]Wei Wei, Jiazhe Chen, Dan Li, Beibei Wang:
Partially known information attack on SM2 key exchange protocol. Sci. China Inf. Sci. 62(3): 32105:1-32105:14 (2019) - 2018
- [j4]Dan Li, Jiazhe Chen, An Wang, Xiaoyun Wang:
Analysis of Software Implemented Low Entropy Masking Schemes. Secur. Commun. Networks 2018: 7206835:1-7206835:8 (2018) - 2017
- [i11]Ximing Fu, Xiaoyun Wang, Jiazhe Chen:
Determining the Nonexistent Terms of Non-linear Multivariate Polynomials: How to Break Grain-128 More Efficiently. IACR Cryptol. ePrint Arch. 2017: 412 (2017) - 2016
- [c16]Jiazhe Chen:
A Note on the Impossible Differential Attacks on Block Cipher SM4. CIS 2016: 551-554 - 2015
- [j3]Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng:
New Impossible Differential Attack on SAFER Block Cipher Family. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(3): 843-852 (2015) - [c15]Jiazhe Chen, Mingjie Liu, Hexin Li, Hongsong Shi:
Mind Your Nonces Moving: Template-Based Partially-Sharing Nonces Attack on SM2 Digital Signature Algorithm. AsiaCCS 2015: 609-614 - 2014
- [j2]Mingjie Liu, Jiazhe Chen:
Improved Linear Attacks on the Chinese Block Cipher Standard. J. Comput. Sci. Technol. 29(6): 1123-1133 (2014) - 2013
- [c14]Mingjie Liu, Jiazhe Chen, Hexin Li:
Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm. Inscrypt 2013: 343-358 - [c13]Hongbo Yu, Jiazhe Chen, Xiaoyun Wang:
Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256. FSE 2013: 263-283 - [i10]Mingjie Liu, Jiazhe Chen:
Improved Linear Attacks on the Chinese Block Cipher Standard. IACR Cryptol. ePrint Arch. 2013: 626 (2013) - 2012
- [c12]Jiazhe Chen, Leibo Li:
Low Data Complexity Attack on Reduced Camellia-256. ACISP 2012: 101-114 - [c11]Jiazhe Chen, Meiqin Wang, Bart Preneel:
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT. AFRICACRYPT 2012: 117-137 - [c10]Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, Jiazhe Chen, Wei Li:
New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia. FSE 2012: 90-109 - [c9]Qingju Wang, Dawu Gu, Vincent Rijmen, Ya Liu, Jiazhe Chen, Andrey Bogdanov:
Improved Impossible Differential Attacks on Large-Block Rijndael. ICISC 2012: 126-140 - [c8]Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng:
New Impossible Differential Attack on SAFER + and SAFER + +. ICISC 2012: 170-183 - [c7]Keting Jia, Leibo Li, Christian Rechberger, Jiazhe Chen, Xiaoyun Wang:
Improved Cryptanalysis of the Block Cipher KASUMI. Selected Areas in Cryptography 2012: 222-233 - [c6]Hongbo Yu, Jiazhe Chen, Xiaoyun Wang:
The Boomerang Attacks on the Round-Reduced Skein-512. Selected Areas in Cryptography 2012: 287-303 - [i9]Hongbo Yu, Jiazhe Chen, Xiaoyun Wang:
The Boomerang Attacks on the Round-Reduced Skein-512. IACR Cryptol. ePrint Arch. 2012: 238 (2012) - [i8]Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng:
New Impossible Differential Attack on SAFER+ and SAFER++. IACR Cryptol. ePrint Arch. 2012: 715 (2012) - 2011
- [c5]Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang:
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256. ACISP 2011: 16-33 - [c4]Leibo Li, Jiazhe Chen, Keting Jia:
New Impossible Differential Cryptanalysis of Reduced-Round Camellia. CANS 2011: 26-39 - [c3]Keting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang:
Practical Attack on the Full MMB Block Cipher. Selected Areas in Cryptography 2011: 185-199 - [i7]Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang:
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256. IACR Cryptol. ePrint Arch. 2011: 17 (2011) - [i6]Hongbo Yu, Jiazhe Chen, Keting Jia, Xiaoyun Wang:
Near-Collision Attack on the Step-Reduced Compression Function of Skein-256. IACR Cryptol. ePrint Arch. 2011: 148 (2011) - [i5]Leibo Li, Jiazhe Chen, Xiaoyun Wang:
Multiplied Conditional Impossible Differential Attack on Reduced-Round Camellia. IACR Cryptol. ePrint Arch. 2011: 524 (2011) - [i4]Jiazhe Chen, Meiqin Wang, Bart Preneel:
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT. IACR Cryptol. ePrint Arch. 2011: 616 (2011) - 2010
- [j1]Qi Cheng, Xianmeng Meng, Celi Sun, Jiazhe Chen:
Bounding the sum of square roots via lattice reduction. Math. Comput. 79(270): 1109-1122 (2010) - [c2]Chenghang Du, Jiazhe Chen:
Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds. CANS 2010: 20-30 - [c1]Jiazhe Chen, Keting Jia:
Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512. ISPEC 2010: 1-18 - [i3]Keting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang:
Practical-time Attack on the Full MMB Block Cipher. IACR Cryptol. ePrint Arch. 2010: 211 (2010)
2000 – 2009
- 2009
- [i2]Qi Cheng, Xianmeng Meng, Celi Sun, Jiazhe Chen:
Bounding the Sum of Square Roots via Lattice Reduction. CoRR abs/0905.4487 (2009) - [i1]Jiazhe Chen, Keting Jia:
Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512. IACR Cryptol. ePrint Arch. 2009: 526 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint