Weike Wang
Beihang University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Weike Wang.
Proceedings of the 2nd International Conference on Computer Science and Application Engineering - CSAE '18 | 2018
Xiang Wang; Yuntong Tian; Pei Du; Xiaobing Zhang; Weike Wang; Qiang Hao; Bing Xu; Zhun Zhang; Zongmin Zhao
The security1 of embedded systems has received much attention due to its widespread use and open application environment. Hash function is a commonly used solution to protect embedded system security. Due to the influence of area and power consumption, traditional hash encryption algorithms cannot be directly applied to embedded system because they consume too many resources. Therefore, lightweight encryption algorithms are receiving more and more attention. This paper proposes a method of applying LHash in embedded systems. The experimental results show that the method can correctly implement the LHash algorithm, and can simultaneously consider the area, power consumption and encryption speed, and has good applicability and security.
system on chip conference | 2015
Xiang Wang; Lin Li; Longbin Zhang; Weike Wang; Rong Zhang; Yi Zhang; Quanneng Shen
This essay provides a multi-level collaboration low-power design based on embedded processor, builds SoC (System-on-Chip) and designs a low-power SoC by register level, system level and gate level. The designed clock gating module, power management module and system program coordination can be used to realize the sleep and wake up functions on SoC. In order to realize a multi-level collaboration low-power designing, gating clock circuit can be used in circuit designing.
ieee international conference on solid state and integrated circuit technology | 2014
Liping Wang; Weike Wang; Rong Zhang; Xiang Wang
Scalar multiplication algorithm is the core of the elliptic curve cryptosystem, and it plays a crucial role of the efficiency and security in the process operation of the encryption and decryption. Based on comprehensive analysis of NAF scalar multiplication algorithm and power analysis, this paper proposes a new NAF scalar multiplication algorithm, ensuring the same Hamming-weight with the NAF code and introducing the M-sequence into the random replacement process to achieve power randomization. It not only enhances the ability to work against SPA and DPA attacks, but also improves the storage efficiency, speed and security.
international conference on software engineering | 2017
Xiang Wang; Bin Xu; Weike Wang; Lin Li; Pei Du; Cheng Zhou; Mingzhe Li; Tongsheng Xia
International Journal of Communication Systems | 2017
Xiang Wang; Tao Wang; Shiyang Chen; Renhao Fan; Yang Xu; Weike Wang; Hongge Li; Tongsheng Xia
International Journal of Communication Systems | 2017
Xiang Wang; Tao Wang; Shiyang Chen; Renhao Fan; Yang Xu; Weike Wang; Hongge Li; Tongsheng Xia
MATEC Web of Conferences | 2018
Weike Wang; Xiang Wang; Pei Du; Yuntong Tian; Xiaobing Zhang; Qiang Hao; Zhun Zhang; Bin Xu
IEICE Electronics Express | 2018
Pei Du; Xiang Wang; Weike Wang; Lin Li; Tongsheng Xia; Hongge Li
international conference on circuits | 2017
Xiang Wang; Lin Li; Weike Wang; Pei Du; Bin Xu; Zongmin Zhao
2017 International Conference on Software Security and Assurance (ICSSA) | 2017
Weike Wang; Muyang Liu; Pei Du; Zongmin Zhao; Yuntong Tian; Qiang Hao; Xiang Wang