Подписаться
An Wang
An Wang
Подтвержден адрес электронной почты в домене bit.edu.cn
Название
Процитировано
Процитировано
Год
An efficient collision power attack on AES encryption in edge computing
Y Niu, J Zhang, A Wang, C Chen
IEEE Access 7, 18734-18748, 2019
532019
Fault rate analysis: Breaking masked AES hardware implementations efficiently
A Wang, M Chen, Z Wang, X Wang
IEEE Transactions on Circuits and Systems II: Express Briefs 60 (8), 517-521, 2013
352013
First-order collision attack on protected NTRU cryptosystem
X Zheng, A Wang, W Wei
Microprocessors and Microsystems 37 (6-7), 601-609, 2013
322013
Side-channel attack on a protected RFID card
R Xu, L Zhu, A Wang, X Du, KKR Choo, G Zhang, K Gai
Ieee Access 6, 58395-58404, 2018
242018
Power analysis attacks and countermeasures on NTRU-based wireless body area networks
A Wang, X Zheng, Z Wang
KSII Transactions on Internet and Information Systems (TIIS) 7 (5), 1094-1107, 2013
232013
Hardware design and implementation of SM3 hash algorithm for financial IC card
Y Hu, L Wu, A Wang, B Wang
2014 Tenth International Conference on Computational Intelligence and …, 2014
222014
Wavelet-based noise reduction in power analysis attack
W Liu, L Wu, X Zhang, A Wang
2014 Tenth International Conference on Computational Intelligence and …, 2014
212014
A machine learning based golden-free detection method for command-activated hardware Trojan
N Shang, A Wang, Y Ding, K Gai, L Zhu, G Zhang
Information Sciences 540, 292-307, 2020
192020
Adaptive chosen-plaintext collision attack on masked AES in edge computing
Y Ding, Y Shi, A Wang, X Zheng, Z Wang, G Zhang
IEEE Access 7, 63217-63229, 2019
192019
Fault-tolerant linear collision attack: A combination with correlation power analysis
D Wang, A Wang, X Zheng
Information Security Practice and Experience: 10th International Conference …, 2014
182014
Power attack and protected implementation on lightweight block cipher SKINNY
J Ge, Y Xu, R Liu, E Si, N Shang, A Wang
2018 13th Asia Joint Conference on Information Security (AsiaJCIS), 69-74, 2018
172018
Transient-steady effect attack on block ciphers
Y Ren, A Wang, L Wu
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
172015
Block-oriented correlation power analysis with bitwise linear leakage: An artificial intelligence approach based on genetic algorithms
Y Ding, Y Shi, A Wang, Y Wang, G Zhang
Future generation computer systems 106, 34-42, 2020
162020
New methods of template attack based on fault sensitivity analysis
Q Wang, A Wang, G Qu, G Zhang
IEEE transactions on multi-scale computing systems 3 (2), 113-123, 2017
162017
Adaptive chosen-plaintext correlation power analysis
W Hu, L Wu, A Wang, X Xie, Z Zhu, S Luo
2014 Tenth International Conference on Computational Intelligence and …, 2014
142014
Key recovery against 3DES in CPU smart card based on improved correlation power analysis
Y Ren, L Wu, H Li, X Li, X Zhang, A Wang, H Chen
Tsinghua Science and Technology 21 (2), 210-220, 2016
132016
A novel bit scalable leakage model based on genetic algorithm
Z Zhang, L Wu, A Wang, Z Mu, X Zhang
Security and Communication Networks 8 (18), 3896-3905, 2015
132015
Efficient framework for genetic algorithm-based correlation power analysis
A Wang, Y Li, Y Ding, L Zhu, Y Wang
IEEE Transactions on Information Forensics and Security 16, 4882-4894, 2021
122021
A multiple sieve approach based on artificial intelligent techniques and correlation power analysis
Y Ding, L Zhu, A Wang, Y Li, Y Wang, SM Yiu, K Gai
ACM Transactions on Multimedia Computing, Communications, and Applications …, 2021
122021
New attacks and security model of the secure flash disk
A Wang, Z Li, X Yang, Y Yu
Mathematical and Computer Modelling 57 (11-12), 2605-2612, 2013
122013
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20