scispace - formally typeset
L

Liwei Zhang

Researcher at Northeastern University

Publications -  22
Citations -  274

Liwei Zhang is an academic researcher from Northeastern University. The author has contributed to research in topics: Power analysis & Side channel attack. The author has an hindex of 8, co-authored 22 publications receiving 207 citations.

Papers
More filters
Book ChapterDOI

A Statistical Model for Higher Order DPA on Masked Devices

TL;DR: In this paper, a statistical model for higher-order differential power analysis DPA attacks is proposed, and the authors derive an analytic success rate formula that distinctively shows the effects of algorithmic confusion property, signal-noise-ratio SNR and masking on leakage of masked devices.
Posted Content

A Statistics-based Fundamental Model for Side-channel Attack Analysis.

TL;DR: In this paper, the authors proposed a general statistical model for side-channel attack analysis that takes characteristics of both the physical implementation and cryptographic algorithm into consideration, and established analytical relations between the success rate of attacks and the cryptographic system.
Journal ArticleDOI

A statistics-based success rate model for DPA and CPA

TL;DR: A general statistical model for side-channel attack analysis that takes characteristics of both the physical implementation and cryptographic algorithm into consideration is proposed and expected to be extendable to other SCAs, like timing attacks, and would provide valuable tools for evaluating cryptographic system’s resistance to those SCAs.
Book ChapterDOI

Towards Sound and Optimal Leakage Detection Procedure

TL;DR: In this paper, the authors proposed a method of deciding leakage existence in the statistical hypothesis setting, which is an advanced statistical procedure, Higher Criticism (HC), adopted to improve leakage detection when there are multiple leakage points.
Proceedings ArticleDOI

Differential Fault Analysis of SHA3-224 and SHA3-256

TL;DR: This is the first work to conquer SHA3-224 andSHA3-256 using differential fault analysis, and it is proposed to use fault signatures at the observed output for analysis and secret retrieval.