基本信息

陈华  女  博导  中国科学院软件研究所
电子邮件: chenhua@tca.iscas.ac.cn
通信地址: 中科院软件所
邮政编码: 100190

招生信息

招生专业
083900-网络空间安全
招生方向
密码测评,侧信道技术

教育背景

2001-09--2005-03   中国科学院研究生院   博士
1998-09--2001-07   山东大学   硕士
1994-09--1998-07   山东大学   学士

工作经历

工作简历
2012-09~现在, 中国科学院软件研究所, 副研,正高
2012-01~2012-09,中国科学院信息工程研究所, 副研
2005-03~2012-01,中国科学院软件研究所, 助研,副研

教授课程

现代密码学
网络与系统安全理论与技术前沿
网络与系统安全理论和技术前沿

专利与奖励

   
奖励信息
(1) 分组密码设计与自动分析工具(省部奖), 二等奖, 部委级, 2018
(2) 国家进步奖, 二等奖, 国家级, 2011
(3) 密码科学进步奖, 一等奖, 部委级, 2006
专利成果
[1] 王舰, 陈华, 李昊远, 匡晓云, 黄开天. 一种针对激光注入攻击的防护能力验证方法. CN: CN113381989A, 2021-09-10.

[2] 焦志鹏, 陈华, 匡晓云, 姚富, 黄开天, 范丽敏. 一种密码算法的故障攻击防护方法. CN: CN113193955A, 2021-07-30.

[3] 朱少峰, 陈华, 范丽敏, 匡晓云, 习伟, 张立武, 蔡田田. 基于环形振荡器的真随机数发生器热噪声抖动估计方法. CN: CN110399626B, 2021-07-30.

[4] 李昊远, 陈华, 匡晓云, 杨祎巍, 黄开天, 范丽敏. 一种椭圆曲线签名算法的安全评估方法. CN113037495A, 2021-06-25.

[5] 王舰, 陈华, 匡晓云, 焦志鹏, 杨祎巍, 黄开天, 姚富, 范丽敏. 一种利用分组密码S盒双射特性的持久故障攻击防护方法和装置. CN: CN113014377A, 2021-06-22.

[6] 陈华, 冯婧怡, 匡晓云, 焦志鹏, 杨祎巍, 李昊远, 范丽敏. 一种基于门限技术的抗侧信道与故障攻击的综合防护方法. CN: CN111224770B, 2021-03-30.

[7] 焦志鹏, 陈华, 匡晓云, 冯婧怡, 杨祎巍, 黄开天, 范丽敏. 一种抗侧信道和故障攻击的综合防护方法. CN: CN112187444A, 2021-01-05.

[8] 冯婧怡, 陈华, 焦志鹏, 匡晓云, 习伟, 范丽敏, 张立武, 于杨. 一种适用于分组密码算法感染防护的抗差分故障攻击安全性评估方法和系统. CN: CN110401627A, 2019-11-01.

[9] 朱少峰, 陈华, 范丽敏, 匡晓云, 习伟, 张立武, 蔡田田. 一种基于环形振荡器的真随机数发生器热噪声抖动估计方法及电路. CN: CN110399626A, 2019-11-01.

[10] 张严, 张立武, 张敏, 陈华, 冯登国. 一种凭证签发者匿名的实体鉴别方法及系统. CN: CN109902508A, 2019-06-18.

[11] 张立武, 张严, 陈华, 张敏, 冯登国. 一种安全报文传输方法及其系统. CN: CN109586908A, 2019-04-05.

[12] 朱少峰, 陈华, 范丽敏, 高思, 冯婧怡, 曹伟琼, 陈美会. 一种基于环形振荡器的真随机数发生器累积抖动估计方法. CN: CN106066785A, 2016-11-02.

[13] 曹伟琼, 陈华, 郑晓光, 李大为, 罗鹏, 冯婧怡, 吴文玲, 韩绪仓, 李国友, 高顺贤. 一种抵抗基于格的错误攻击的SM2签名算法防护方法. CN: CN104852805A, 2015-08-19.

[14] 冯婧怡, 陈华, 曹伟琼, 韩绪仓, 李大为, 罗鹏, 郑晓光, 李国友, 高顺贤, 朱少峰. 基于改进差分错误攻击的SM2签名算法安全性验证方法. CN: CN104836808A, 2015-08-12.

[15] 陈华, 曹伟琼, 郑晓光, 韩绪仓, 李大为, 罗鹏, 冯婧怡, 李国友, 高顺贤, 朱少峰. 一种基于随机数未知的SM2签名算法安全性验证方法. CN: CN104836670A, 2015-08-12.

[16] 刘波, 陈华, 高思, 范丽敏, 冯登国. 一种密码模块API安全性检测方法与系统. CN: CN103093144A, 2013-05-08.

[17] 陈华, 冯登国, 范丽敏. 一种S盒差分均匀性快速检测方法. 中国: CN101997675A, 2011-03-30.

[18] 周永彬, 刘继业, 陈华, 冯登国. 一种高速随机性检测卡. CN: CN101470597A, 2009-07-01.

出版信息

   
发表论文
[1] Jiao, Zhipeng, Chen, Hua, Feng, Jingyi, Kuang, Xiaoyun, Yang, Yiwei, Li, Haoyuan, Fan, Limin. A Combined Countermeasure Against Side-Channel and Fault Attack with Threshold Implementation Technique. CHINESE JOURNAL OF ELECTRONICS[J]. 2023, 32(2): 199-208, http://dx.doi.org/10.23919/cje.2021.00.089.
[2] 焦志鹏, 姚富, 陈华, 王舰, 匡晓云, 黄开天. 一种基于门限与感染技术的SM4算法综合防护实现. 电子学报[J]. 2022, 50(5): 1066-1074, http://lib.cqvip.com/Qikan/Article/Detail?id=7107502423.
[3] Haoyuan Li, Hua Chen, Xucang Han, Weiqiong Cao, Xiang Zhu, Huilong Jiang, Jian Wang. Easily Overlooked Vulnerability in Implementation: Practical Fault Attack on ECDSA Round Counter. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS[J]. 2022, [4] Weiqiong Cao, Hongsong Shi, Hua Chen, Jiazhe Chen, Limin Fan, Wenling Wu. Lattice-based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA. Topics in Cryptology – CT-RSA 2022null. 2022, [5] Feng, Jingyi, Chen, Hua, Cao, Weiqiong, Fan, Limin, Xi, Wei, Feng, Dengguo. Do multiple infections lead to better security? A new study on CHES 2014 infective countermeasure. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2021, 64(5): 211-213, https://www.webofscience.com/wos/woscc/full-record/WOS:000631139300001.
[6] Feng, Jingyi, Chen, Hua, Li, Yang, Jiao, Zhipeng, Xi, Wei. A Framework for Evaluation and Analysis on Infection Countermeasures Against Fault Attacks. IEEETRANSACTIONSONINFORMATIONFORENSICSANDSECURITY[J]. 2020, 15: 391-406, https://www.webofscience.com/wos/woscc/full-record/WOS:000487189200011.
[7] Zhu, Shaofeng, Xi, Wei, Fan, Limin, Chen, Hua, Chen, Meihui, Feng, Dengguo. Sequence-Oriented Stochastic Model of RO-TRNGs for Entropy Evaluation. CHINESE JOURNAL OF ELECTRONICS[J]. 2020, 29(2): 371-377, http://lib.cqvip.com/Qikan/Article/Detail?id=7101288897.
[8] 陈华, 习伟, 范丽敏, 焦志鹏, 冯婧怡. 密码产品的侧信道分析与评估. 电子与信息学报[J]. 2020, 42(8): 1836-1845, http://lib.cqvip.com/Qikan/Article/Detail?id=7102539632.
[9] Meihui Chen, Hua Chen, Limin Fan, Shaofeng Zhu, Wei Xi, Dengguo Feng. A new discrete Fourier transform randomness test. 2019, http://kns.cnki.net/KCMS/detail/detail.aspx?QueryID=0&CurRec=12&recid=&FileName=SSJD2304E8F1B5460B039352EEBF38790606&DbName=SSJD_01&DbCode=SSJD&yx=&pr=&URLID=&bsm=.
[10] Zhu, Shaofeng, Chen, Hua, Xi, Wei, Chen, Meihui, Fan, Limin, Feng, Dengguo, IEEE Comp Soc. A Worst-Case Entropy Estimation of Oscillator-Based Entropy Sources: When the Adversaries Have Access to the History Outputs. 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019)null. 2019, 152-159, [11] Meihui CHEN, Hua CHEN, Limin FAN, Shaofeng ZHU, Wei XI, Dengguo FENG. A new discrete Fourier transform randomness test. SCIENCE CHINA INFORMATION SCIENCES[J]. 2019, 62(3): https://www.sciengine.com/doi/10.1007/s11432-018-9489-x.
[12] Shaofeng Zhu, Hua Chen, Limin Fan, Meihui Chen, Wei Xi. Jitter Estimation with High Accuracy for Oscillator TRNGs. CARDIS[J]. 2018, [13] FENG Jingyi, CHEN Hua, GAO Si, CAO Weiqiong, FAN Limin, ZHU Shaofeng. Fault Analysis on a New Block Cipher DBlock with at Most Two Fault Injections. 电子学报(英文)[J]. 2018, 27(6): 1277-1282, http://lib.cqvip.com/Qikan/Article/Detail?id=676785039.
[14] 马向亮, 李冰, 习伟, 陈华, 陈财森. 基于独立分量技术的类GIFT算法S盒逆向分析. 计算机研究与发展[J]. 2018, 55(10): 2269-2277, http://lib.cqvip.com/Qikan/Article/Detail?id=7000855660.
[15] Feng Jingyi, Chen Hua, Gao Si, Cao Weiqiong, Fan Limin, Zhu Shaofeng. Fault Analysis on a New Block Cipher DBlock with at Most Two Fault Injections. CHINESE JOURNAL OF ELECTRONICS[J]. 2018, 27(6): 1277-1282, http://dx.doi.org/10.1049/cje.2018.09.003.
[16] Cao, Weiqiong, Chen, Hua, Feng, Jingyi, Fan, Limin, Wu, Wenling, Fan, J, Gierlichs, B. Lattice-Based Fault Attacks Against ECMQV. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2018null. 2018, 10815: 101-116, [17] Gao Si, Chen Hua, Fan Limin, Wu Wenling. Improved Fault Attack on LBlock: Earlier Injection with No Extra Faults. CHINESE JOURNAL OF ELECTRONICS[J]. 2017, 26(4): 754-759, https://www.webofscience.com/wos/woscc/full-record/WOS:000405159400013.
[18] Gao, Si, Chen, Hua, Wu, Wenling, Fan, Limin, Cao, Weiqiong, Ma, Xiangliang, Handschuh, H. My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses. TOPICS IN CRYPTOLOGY - CT-RSA 2017null. 2017, 10159: 363-378, [19] Gao Si, Chen Hua, Wu Wenling, Fan Limin, Feng Jingyi, Ma Xiangliang, Foresti S, Persiano G. Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers. CRYPTOLOGY AND NETWORK SECURITY, CANS 2016null. 2016, 10052: 3-18, [20] Chen Hua, Feng Jingyi, Rijmen Vincent, Liu Yunwen, Fan Limin, Li Wei, IEEE. Improved Fault Analysis on SIMON Block Cipher Family. 2016 WORKSHOP ON FAULT AND TOLERANCE IN CRYPTOGRAPHY (FDTC)null. 2016, 16-24, http://dx.doi.org/10.1109/FDTC.2016.12.
[21] Chen, Meihui, Chen, Hua, Fan, Limin, Feng, Dengguo. Templates selection in non-overlapping template matching test. ELECTRONICS LETTERS[J]. 2016, 52(18): 1533-1534, https://www.webofscience.com/wos/woscc/full-record/WOS:000383378500015.
[22] Fan, Limin, Chen, Hua, Chen, Meihui, Gao, Si. Corrected runs distribution test for pseudorandom number generators. ELECTRONICS LETTERS[J]. 2016, 52(4): 281-282, https://www.webofscience.com/wos/woscc/full-record/WOS:000369863000016.
[23] 陈华. Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round. ICISC 2016. 2016, [24] 陈华. Practical Lattice-based Fault Attack and Countermeasure on SM2 Signature Algorithm. ICICS. 2015, [25] 陈华. Two Lattice-based Differential Fault Attacks against ECDSA with NAF algorithm. ICISC. 2015, [26] Limin Fan, Hua Chen, Si Gao. A general method to evaluate the correlation of randomness tests. 14th International Workshop on Information Security Applications, WISA 2013null. 2014, 52-62, http://ir.iscas.ac.cn/handle/311060/16628.
[27] 刘波, 陈华. 一种基于项重写的密码模块API安全性检测算法. 中国科学院大学学报[J]. 2013, 30(5): 699-705, [28] 陈华. Padding Oracle Attack on PKCS 1 -Can non-standard implementation act as a shelter. CANS2013. 2013, [29] 陈华. Integral Based Fault Analysis on LBlock. ICISC 2013. 2013, [30] 范丽敏. Padding Oracle Attack on PKCS#1V1.5:Can Non-Standard Implementation Act as a Shelter. LNCS 8257:39-56(CANS2013). 2013, [31] 陈华, 范丽敏. 密码测评——信息安全领域的核心技术. 中国科学院院刊[J]. 2011, 26(3): 297-302, http://lib.cqvip.com/Qikan/Article/Detail?id=37802748.
[32] 陈华, 冯登国, 范丽敏. 一种关于分组密码的新的统计检测方法. 计算机学报[J]. 2009, 595-601, http://lib.cqvip.com/Qikan/Article/Detail?id=30056837.
[33] 范丽敏, 冯登国, 陈华. 基于熵的随机性检测相关性研究. 软件学报[J]. 2009, 1967-1976, http://lib.cqvip.com/Qikan/Article/Detail?id=30841068.
[34] 范丽敏, 冯登国, 陈华. 二元推导与自相关随机性检测算法的相关性分析. 计算机研究与发展[J]. 2009, 956-961, http://lib.cqvip.com/Qikan/Article/Detail?id=30641646.
[35] 范丽敏, 冯登国, 陈华. 随机性检测参数选择研究. 通信学报[J]. 2009, 1-6, http://lib.cqvip.com/Qikan/Article/Detail?id=29409410.
[36] 陈华. How to Choose Proper Parameter Values for Poker Test. Journal of the Graduate School of the Chinese Academy. 2008, [37] 陈华, 范丽敏. 扑克检测的参数选择. 中国科学院研究生院学报[J]. 2008, 25(5): 631-638, http://lib.cqvip.com/Qikan/Article/Detail?id=28281940.
[38] Chen Hua, Fang Limin. 扑克检测的参数选择. 中国科学院研究生院学报[J]. 2008, 25(5): 631-638, http://lib.cqvip.com/Qikan/Article/Detail?id=28281940.
[39] Chen Hua, Feng Dengguo. An effective genetic algorithm for self-inverse s-boxes. PROCEEDINGS - 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, CIS 2007null. 2007, 618-622, http://124.16.136.157/handle/311060/10872.
[40] 范丽敏, 冯登国, 陈华. 对三个流密码及其组件的随机性检测分析. 高技术通讯[J]. 2007, 17(2): 116-119, http://lib.cqvip.com/Qikan/Article/Detail?id=24546416.
[41] Chen Hua, Wu Wenling, Feng Dengguo. Differential fault analysis on clefia. LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS)null. 2007, 284-295, [42] Hua, C, Wu, CK, Feng, DG. On statistical properties of S-boxes in block ciphers. CHINESE JOURNAL OF ELECTRONICS[J]. 2005, 14(4): 584-587, http://lib.cqvip.com/Qikan/Article/Detail?id=20436221.
[43] 陈华, 吴文玲, 冯登国. 提高S盒非线性度的有效算法. 计算机科学[J]. 2005, 32(10): 68-70,86, http://lib.cqvip.com/Qikan/Article/Detail?id=20259047.
[44] 陈华, 冯登国, 吴文玲. 一种改善双射S盒密码特性的有效算法. 计算机研究与发展[J]. 2004, 41(8): 1410-1414, http://lib.cqvip.com/Qikan/Article/Detail?id=10309685.
[45] Chen, H, Feng, DG, IEEE. An effective evolutionary strategy for bijective S-boxes. CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2null. 2004, 2120-2123, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000222818400293.
[46] Chen H, Feng DG. An evolutionary algorithm to improve the nonlinearity of self-inverse s-boxes. LECTURENOTESINCOMPUTERSCIENCEnull. 2004, 352-361, https://www.webofscience.com/wos/woscc/full-record/WOS:000230406700024.

指导学生

已指导学生

刘波  硕士研究生  081220-信息安全  

马向亮  博士研究生  081203-计算机应用技术  

现指导学生

陈东昱  博士研究生  083900-网络空间安全  

王舰  硕士研究生  083500-软件工程  

周锋  硕士研究生  083900-网络空间安全  

韩绪仓  博士研究生  083500-软件工程  

姚富  博士研究生  083500-软件工程