Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Weike Wang is active.

Publication


Featured researches published by Weike Wang.


Proceedings of the 2nd International Conference on Computer Science and Application Engineering - CSAE '18 | 2018

An Optimized Method of Hardware Implementation for LHash in the Embedded System

Xiang Wang; Yuntong Tian; Pei Du; Xiaobing Zhang; Weike Wang; Qiang Hao; Bing Xu; Zhun Zhang; Zongmin Zhao

The security1 of embedded systems has received much attention due to its widespread use and open application environment. Hash function is a commonly used solution to protect embedded system security. Due to the influence of area and power consumption, traditional hash encryption algorithms cannot be directly applied to embedded system because they consume too many resources. Therefore, lightweight encryption algorithms are receiving more and more attention. This paper proposes a method of applying LHash in embedded systems. The experimental results show that the method can correctly implement the LHash algorithm, and can simultaneously consider the area, power consumption and encryption speed, and has good applicability and security.


system on chip conference | 2015

A multi-level collaboration low-power design based on embedded system

Xiang Wang; Lin Li; Longbin Zhang; Weike Wang; Rong Zhang; Yi Zhang; Quanneng Shen

This essay provides a multi-level collaboration low-power design based on embedded processor, builds SoC (System-on-Chip) and designs a low-power SoC by register level, system level and gate level. The designed clock gating module, power management module and system program coordination can be used to realize the sleep and wake up functions on SoC. In order to realize a multi-level collaboration low-power designing, gating clock circuit can be used in circuit designing.


ieee international conference on solid state and integrated circuit technology | 2014

A new ECC scalar multiplication algorithm with randomized power consumption

Liping Wang; Weike Wang; Rong Zhang; Xiang Wang

Scalar multiplication algorithm is the core of the elliptic curve cryptosystem, and it plays a crucial role of the efficiency and security in the process operation of the encryption and decryption. Based on comprehensive analysis of NAF scalar multiplication algorithm and power analysis, this paper proposes a new NAF scalar multiplication algorithm, ensuring the same Hamming-weight with the NAF code and introducing the M-sequence into the random replacement process to achieve power randomization. It not only enhances the ability to work against SPA and DPA attacks, but also improves the storage efficiency, speed and security.


international conference on software engineering | 2017

A novel security validation in embedded system

Xiang Wang; Bin Xu; Weike Wang; Lin Li; Pei Du; Cheng Zhou; Mingzhe Li; Tongsheng Xia


International Journal of Communication Systems | 2017

Track fusion based on threshold factor classification algorithm in wireless sensor networks: Track Fusion Based on Threshold Algorithm in WSNs

Xiang Wang; Tao Wang; Shiyang Chen; Renhao Fan; Yang Xu; Weike Wang; Hongge Li; Tongsheng Xia


International Journal of Communication Systems | 2017

Track fusion based on threshold factor classification algorithm in wireless sensor networks.

Xiang Wang; Tao Wang; Shiyang Chen; Renhao Fan; Yang Xu; Weike Wang; Hongge Li; Tongsheng Xia


MATEC Web of Conferences | 2018

Embedded System Confidentiality Protection by Cryptographic Engine Implemented with Composite Field Arithmetic

Weike Wang; Xiang Wang; Pei Du; Yuntong Tian; Xiaobing Zhang; Qiang Hao; Zhun Zhang; Bin Xu


IEICE Electronics Express | 2018

Hardware-assisted integrity monitor based on lightweight hash function

Pei Du; Xiang Wang; Weike Wang; Lin Li; Tongsheng Xia; Hongge Li


international conference on circuits | 2017

Power optimization using Markov decision process based on multi-parameter constraint modeling

Xiang Wang; Lin Li; Weike Wang; Pei Du; Bin Xu; Zongmin Zhao


2017 International Conference on Software Security and Assurance (ICSSA) | 2017

An Architectural-Enhanced Secure Embedded System with a Novel Hybrid Search Scheme

Weike Wang; Muyang Liu; Pei Du; Zongmin Zhao; Yuntong Tian; Qiang Hao; Xiang Wang

Collaboration


Dive into the Weike Wang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge