scispace - formally typeset
S

Shize Guo

Publications -  33
Citations -  279

Shize Guo is an academic researcher. The author has contributed to research in topics: Computer science & Block cipher. The author has an hindex of 10, co-authored 21 publications receiving 241 citations.

Papers
More filters
Journal ArticleDOI

A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers

TL;DR: A comprehensive study of AFA on an ultra-lightweight block cipher called LBlock shows that a single fault injection is enough to recover the master key of LBlock within the affordable complexity in each scenario.
Book ChapterDOI

MDASCA: an enhanced algebraic side-channel attack for error tolerance and new leakage model exploitation

TL;DR: This work proposes a generic method, called Multiple Deductions-based ASCA (MDASCA), to cope with the multiple deductions caused by inaccurate measurements or interferences and shows that ASCA can exploit cache leakage models.
Book ChapterDOI

Improved algebraic fault analysis: a case study on piccolo and applications to other lightweight block ciphers

TL;DR: It is shown that building the equation set for the decryption of a cipher can accelerate the solving procedure and a method to represent the injected faults with algebraic equations when the accurate fault location is unknown is proposed.
Proceedings ArticleDOI

Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques

TL;DR: An improved evaluation algorithm of DFA is proposed, then a modified ADFA approach is provided to compute the solutions for the secret key, which is more efficient than previous DFA work and more accurate than previous work.
Journal ArticleDOI

Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations

TL;DR: This paper proposes a new analytical side-channel attack on AES by exploiting the incomplete diffusion feature in one AES round, which has less time complexity and more robustness than previous ASCAs, and adopts a specialized approach to recover the secret key of AES instead of the general solver.