An Wang

Orcid: 0000-0002-9873-1308

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
  • Beijing Institute of Technology, School of Computer Science and Technology, China (former)
  • Tsinghua University, Beijing, China (2011 - 2015)
  • Shandong University, China (PhD 2011)


According to our database1, An Wang authored at least 55 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficient Multi-Byte Power Analysis Architecture Focusing on Bitwise Linear Leakage.
ACM Trans. Embed. Comput. Syst., November, 2024

Dual-Path Hybrid Residual Network for Profiled Side-Channel Analysis.
IEEE Trans. Circuits Syst. II Express Briefs, August, 2024

Bitwise Mixture Differential Cryptanalysis and Its Application to SIMON.
IEEE Internet Things J., July, 2024

Time Is Not Enough: Timing Leakage Analysis on Cryptographic Chips via Plaintext-Ciphertext Correlation in Non-Timing Channel.
IEEE Trans. Inf. Forensics Secur., 2024

SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

An efficient heuristic power analysis framework based on hill-climbing algorithm.
Inf. Sci., 2024

A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted Chosen-Ciphertext Attacks.
IACR Cryptol. ePrint Arch., 2024

CL-SCA: Leveraging Contrastive Learning for Profiled Side-Channel Analysis.
IACR Cryptol. ePrint Arch., 2024

A Command-Activated Hardware Trojan Detection Method Based on LUNAR Framework.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024

2022
Attacking the Edge-of-Things: A Physical Attack Perspective.
IEEE Internet Things J., 2022

SCARE and power attack on AES-like block ciphers with secret S-box.
Frontiers Comput. Sci., 2022

Correlation leakage analysis based on masking schemes.
Sci. China Inf. Sci., 2022

Using Convolutional Neural Network to Redress Outliers in Clustering Based Side-Channel Analysis on Cryptosystem.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

Correlation Power Analysis and Protected Implementation on Lightweight Block Cipher FESH.
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022

2021
A Multiple Sieve Approach Based on Artificial Intelligent Techniques and Correlation Power Analysis.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Efficient Framework for Genetic Algorithm-Based Correlation Power Analysis.
IEEE Trans. Inf. Forensics Secur., 2021

Autoencoder Assist: An Efficient Profiling Attack on High-dimensional Datasets.
IACR Cryptol. ePrint Arch., 2021

Correlation Power Analysis and Protected Implementation on Block Cipher RainDrop.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

2020
A machine learning based golden-free detection method for command-activated hardware Trojan.
Inf. Sci., 2020

x-only coordinate: with application to secp256k1 " >Chosen base-point side-channel attack on Montgomery ladder with <i>x</i>-only coordinate: with application to secp256k1.
IET Inf. Secur., 2020

Template Attacks Based on the Multivariate Joint Distribution.
IACR Cryptol. ePrint Arch., 2020

Block-oriented correlation power analysis with bitwise linear leakage: An artificial intelligence approach based on genetic algorithms.
Future Gener. Comput. Syst., 2020

2019
An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis.
IACR Cryptol. ePrint Arch., 2019

An Efficient Collision Power Attack on AES Encryption in Edge Computing.
IEEE Access, 2019

Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing.
IEEE Access, 2019

Power Analysis and Protection on SPECK and Its Application in IoT.
Proceedings of the Security and Privacy in Communication Networks, 2019

Power Attack and Evaluation on Elliptic Curve Cryptosystem in a Commercial Smart Card.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

2018
Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9.
Secur. Commun. Networks, 2018

Analysis of Software Implemented Low Entropy Masking Schemes.
Secur. Commun. Networks, 2018

Right or wrong collision rate analysis without profiling: full-automatic collision fault attack.
Sci. China Inf. Sci., 2018

Side-Channel Attack on a Protected RFID Card.
IEEE Access, 2018

Multi-Byte Power Analysis: A Generic Approach Based on Linear Regression.
IEEE Access, 2018

Power Attack and Protected Implementation on Lightweight Block Cipher SKINNY.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

2017
New Methods of Template Attack Based on Fault Sensitivity Analysis.
IEEE Trans. Multi Scale Comput. Syst., 2017

Differential Fault Attack on ITUbee Block Cipher.
ACM Trans. Embed. Comput. Syst., 2017

RFA: <i>R</i>-Squared Fitting Analysis Model for Power Attack.
Secur. Commun. Networks, 2017

Linear Regression Side Channel Attack Applied on Constant XOR.
IACR Cryptol. ePrint Arch., 2017

Practical two-dimensional correlation power analysis and its backward fault-tolerance.
Sci. China Inf. Sci., 2017

Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices.
Comput. Electr. Eng., 2017

2016
A new zero value attack combined fault sensitivity analysis on masked AES.
Microprocess. Microsystems, 2016

2015
A novel bit scalable leakage model based on genetic algorithm.
Secur. Commun. Networks, 2015

Double Sieve Collision Attack Based on Bitwise Detection.
KSII Trans. Internet Inf. Syst., 2015

A high-performance elliptic curve cryptographic coprocessor with side channel analysis countermeasures for smart IC card.
IEICE Electron. Express, 2015

Efficient collision attacks on smart card implementations of masked AES.
Sci. China Inf. Sci., 2015

Template attack on masking AES based on fault sensitivity analysis.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

Transient-Steady Effect Attack on Block Ciphers.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015

2014
Improved Leakage Model Based on Genetic Algorithm.
IACR Cryptol. ePrint Arch., 2014

A Novel Subspace Template Attack Based on Symmetric Cross Entropy Criterion.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Wavelet-Based Noise Reduction in Power Analysis Attack.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Adaptive Chosen-Plaintext Correlation Power Analysis.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Hardware Design and Implementation of SM3 Hash Algorithm for Financial IC Card.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Algorithm-Based Countermeasures against Power Analysis Attacks for Public-Key Cryptography SM2.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Fault Rate Analysis: Breaking Masked AES Hardware Implementations Efficiently.
IEEE Trans. Circuits Syst. II Express Briefs, 2013

Power Analysis Attacks and Countermeasures on NTRU-Based Wireless Body Area Networks.
KSII Trans. Internet Inf. Syst., 2013

2012
Overcoming Significant Noise: Correlation-Template-Induction Attack.
Proceedings of the Information Security Practice and Experience, 2012


  Loading...