An efficient collision power attack on AES encryption in edge computing Y Niu, J Zhang, A Wang, C Chen IEEE Access 7, 18734-18748, 2019 | 53 | 2019 |
Fault rate analysis: Breaking masked AES hardware implementations efficiently A Wang, M Chen, Z Wang, X Wang IEEE Transactions on Circuits and Systems II: Express Briefs 60 (8), 517-521, 2013 | 35 | 2013 |
First-order collision attack on protected NTRU cryptosystem X Zheng, A Wang, W Wei Microprocessors and Microsystems 37 (6-7), 601-609, 2013 | 32 | 2013 |
Side-channel attack on a protected RFID card R Xu, L Zhu, A Wang, X Du, KKR Choo, G Zhang, K Gai Ieee Access 6, 58395-58404, 2018 | 24 | 2018 |
Power analysis attacks and countermeasures on NTRU-based wireless body area networks A Wang, X Zheng, Z Wang KSII Transactions on Internet and Information Systems (TIIS) 7 (5), 1094-1107, 2013 | 23 | 2013 |
Hardware design and implementation of SM3 hash algorithm for financial IC card Y Hu, L Wu, A Wang, B Wang 2014 Tenth International Conference on Computational Intelligence and …, 2014 | 22 | 2014 |
Wavelet-based noise reduction in power analysis attack W Liu, L Wu, X Zhang, A Wang 2014 Tenth International Conference on Computational Intelligence and …, 2014 | 21 | 2014 |
A machine learning based golden-free detection method for command-activated hardware Trojan N Shang, A Wang, Y Ding, K Gai, L Zhu, G Zhang Information Sciences 540, 292-307, 2020 | 19 | 2020 |
Adaptive chosen-plaintext collision attack on masked AES in edge computing Y Ding, Y Shi, A Wang, X Zheng, Z Wang, G Zhang IEEE Access 7, 63217-63229, 2019 | 19 | 2019 |
Fault-tolerant linear collision attack: A combination with correlation power analysis D Wang, A Wang, X Zheng Information Security Practice and Experience: 10th International Conference …, 2014 | 18 | 2014 |
Power attack and protected implementation on lightweight block cipher SKINNY J Ge, Y Xu, R Liu, E Si, N Shang, A Wang 2018 13th Asia Joint Conference on Information Security (AsiaJCIS), 69-74, 2018 | 17 | 2018 |
Transient-steady effect attack on block ciphers Y Ren, A Wang, L Wu Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015 | 17 | 2015 |
Block-oriented correlation power analysis with bitwise linear leakage: An artificial intelligence approach based on genetic algorithms Y Ding, Y Shi, A Wang, Y Wang, G Zhang Future generation computer systems 106, 34-42, 2020 | 16 | 2020 |
New methods of template attack based on fault sensitivity analysis Q Wang, A Wang, G Qu, G Zhang IEEE transactions on multi-scale computing systems 3 (2), 113-123, 2017 | 16 | 2017 |
Adaptive chosen-plaintext correlation power analysis W Hu, L Wu, A Wang, X Xie, Z Zhu, S Luo 2014 Tenth International Conference on Computational Intelligence and …, 2014 | 14 | 2014 |
Key recovery against 3DES in CPU smart card based on improved correlation power analysis Y Ren, L Wu, H Li, X Li, X Zhang, A Wang, H Chen Tsinghua Science and Technology 21 (2), 210-220, 2016 | 13 | 2016 |
A novel bit scalable leakage model based on genetic algorithm Z Zhang, L Wu, A Wang, Z Mu, X Zhang Security and Communication Networks 8 (18), 3896-3905, 2015 | 13 | 2015 |
Efficient framework for genetic algorithm-based correlation power analysis A Wang, Y Li, Y Ding, L Zhu, Y Wang IEEE Transactions on Information Forensics and Security 16, 4882-4894, 2021 | 12 | 2021 |
A multiple sieve approach based on artificial intelligent techniques and correlation power analysis Y Ding, L Zhu, A Wang, Y Li, Y Wang, SM Yiu, K Gai ACM Transactions on Multimedia Computing, Communications, and Applications …, 2021 | 12 | 2021 |
New attacks and security model of the secure flash disk A Wang, Z Li, X Yang, Y Yu Mathematical and Computer Modelling 57 (11-12), 2605-2612, 2013 | 12 | 2013 |