An Wang
Orcid: 0000-0002-9873-1308Affiliations:
- Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
- Beijing Institute of Technology, School of Computer Science and Technology, China (former)
- Tsinghua University, Beijing, China (2011 - 2015)
- Shandong University, China (PhD 2011)
According to our database1,
An Wang
authored at least 55 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ACM Trans. Embed. Comput. Syst., November, 2024
IEEE Trans. Circuits Syst. II Express Briefs, August, 2024
IEEE Internet Things J., July, 2024
Time Is Not Enough: Timing Leakage Analysis on Cryptographic Chips via Plaintext-Ciphertext Correlation in Non-Timing Channel.
IEEE Trans. Inf. Forensics Secur., 2024
SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
Inf. Sci., 2024
A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted Chosen-Ciphertext Attacks.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
2022
IEEE Internet Things J., 2022
Frontiers Comput. Sci., 2022
Using Convolutional Neural Network to Redress Outliers in Clustering Based Side-Channel Analysis on Cryptosystem.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022
Correlation Power Analysis and Protected Implementation on Lightweight Block Cipher FESH.
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022
2021
A Multiple Sieve Approach Based on Artificial Intelligent Techniques and Correlation Power Analysis.
ACM Trans. Multim. Comput. Commun. Appl., 2021
IEEE Trans. Inf. Forensics Secur., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
2020
A machine learning based golden-free detection method for command-activated hardware Trojan.
Inf. Sci., 2020
x-only coordinate: with application to secp256k1 " >Chosen base-point side-channel attack on Montgomery ladder with <i>x</i>-only coordinate: with application to secp256k1.
IET Inf. Secur., 2020
IACR Cryptol. ePrint Arch., 2020
Block-oriented correlation power analysis with bitwise linear leakage: An artificial intelligence approach based on genetic algorithms.
Future Gener. Comput. Syst., 2020
2019
An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis.
IACR Cryptol. ePrint Arch., 2019
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
Power Attack and Evaluation on Elliptic Curve Cryptosystem in a Commercial Smart Card.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019
2018
Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9.
Secur. Commun. Networks, 2018
Secur. Commun. Networks, 2018
Right or wrong collision rate analysis without profiling: full-automatic collision fault attack.
Sci. China Inf. Sci., 2018
IEEE Access, 2018
Proceedings of the 13th Asia Joint Conference on Information Security, 2018
2017
IEEE Trans. Multi Scale Comput. Syst., 2017
ACM Trans. Embed. Comput. Syst., 2017
Secur. Commun. Networks, 2017
IACR Cryptol. ePrint Arch., 2017
Practical two-dimensional correlation power analysis and its backward fault-tolerance.
Sci. China Inf. Sci., 2017
Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices.
Comput. Electr. Eng., 2017
2016
Microprocess. Microsystems, 2016
2015
Secur. Commun. Networks, 2015
KSII Trans. Internet Inf. Syst., 2015
A high-performance elliptic curve cryptographic coprocessor with side channel analysis countermeasures for smart IC card.
IEICE Electron. Express, 2015
Sci. China Inf. Sci., 2015
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015
2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
Algorithm-Based Countermeasures against Power Analysis Attacks for Public-Key Cryptography SM2.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
2013
IEEE Trans. Circuits Syst. II Express Briefs, 2013
Power Analysis Attacks and Countermeasures on NTRU-Based Wireless Body Area Networks.
KSII Trans. Internet Inf. Syst., 2013
2012
Proceedings of the Information Security Practice and Experience, 2012