代表性学术成果
[1] Yanting Ren, An Wang*, Liji Wu. Transient-Steady Effect Attack on Block Ciphers. 2015 Workshop on Cryptographic Hardware and Embedded Systems (CHES 2015), LNCS, vol. 9293, pp. 433–450, Springer, Heidelberg, 2015. (信息安全硬件顶级国际会议,召开17年来中国大陆第5篇,EI)
[2] Yongchuan Niu, Jiawei Zhang*, An Wang*, Caisen Chen. An Efficient Collision Power Attack on AES Encryption in Edge Computing. IEEE Access, 7, pp. 18734-18748, 2019. (SCI)
[3] Rixin Xu, Liehuang Zhu, An Wang*, Xiaojiang Du, Kim-Kwang Raymond Choo, Guoshuang Zhang, Keke Gai. Side-Channel Attack on a Protected RFID Card. IEEE Access, 6, pp. 58395-58404, 2018. (SCI)
[4] An Wang, Man Chen, Zongyue Wang, Xiaoyun Wang. Fault Rate Analysis: Breaking Masked AES Hardware Implementations Efficiently. IEEE Transactions on Circuits and Systems II: Express Briefs, 60 (8), pp. 517-521, 2013. (SCI)
[5] An Wang, Zheng Li*, Xianwen Yang, Yanyan Yu. New Attacks and Security Model of the Secure Flash Disk. Mathematical and Computer Modelling, 57 (11-12), pp. 2605-2612, 2013. (SCI)
[6] An Wang, Liji Wu*, Zongyue Wang, Xuexin Zheng, Man Chen, Jing Ma. Two Improved Multiple-Differential Collision Attacks. Mathematical Problems in Engineering, vol. 2014, Article ID 209692, pp. 1-11, 2014. (SCI)
[7] An Wang*, Ce Wang, Xuexin Zheng*, Weina Tian, Rixin Xu, Guoshuang Zhang. Random Key Rotation: Side-Channel Countermeasure of NTRU Cryptosystem for Resource-Limited Devices. Computers and Electrical Engineering, 63, pp. 220-231, 2017. (SCI)
[8] An Wang, Yu Zhang, Weina Tian, Qian Wang, Guoshuang Zhang, Liehuang Zhu*. Right or Wrong Collision Rate Analysis without Profiling: Full-Automatic Collision Fault Attack. SCIENCE CHINA Information Sciences, 61 (3), 032101, pp. 1-11, 2018. (SCI)
[9] An Wang, Wenjing Hu, Weina Tian, Guoshuang Zhang, Liehuang Zhu*. Practical Two-Dimensional Correlation Power Analysis and Its Backward Fault-Tolerance. SCIENCE CHINA Information Sciences, 60 (6): 068101, pp. 1-3, 2017. (SCI)
[10] An Wang, Zongyue Wang, Xuexin Zheng, Xiaomei Wang, Man Chen, Guoshuang Zhang, Liji Wu*. Efficient Collision Attacks on Smart Card Implementations of Masked AES. SCIENCE CHINA Information Sciences, 58 (5): 052107, pp. 1-15, 2015. (SCI)
[11] An Wang, Yu Zhang, Liehuang Zhu*, Weina Tian, Rixin Xu, Guoshuang Zhang. RFA: R-Squared Fitting Analysis Model for Power Attack. Security and Communication Networks, vol. 2017, Article ID 5098626, pp. 1-8, 2017. (SCI)
[12] An Wang*, Xuexin Zheng, Zongyue Wang. Power Analysis Attacks and Countermeasures on NTRU-Based Wireless Body Area Networks. KSII Transactions on Internet and Information Systems, 7 (5), pp. 1094-1107, 2013. (SCI)
[13] Qi Zhang, An Wang*, Yongchuan Niu, Ning Shang, Guoshuang Zhang, Liehuang Zhu. Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9. Security and Communication Networks, vol. 2018, Article ID 9701756, pp. 1-14, 2018. (SCI)
[14] Xuexin Zheng, An Wang*, Wei Wei. First-Order Collision Attack on Protected NTRU Cryptosystem and Its Countermeasures. Microprocessors and Microsystems, 37 (6-7), pp.601-609, 2013. (SCI)
[15] Qian Wang, An Wang*, Liji Wu, Jiliang Zhang. A New Zero Value Attack Combined Fault Sensitivity Analysis on Masked AES. Microprocessors and Microsystems, 45 (2016), Part B, pp. 355-362, 2016. (SCI)
[16] Danhui Wang, An Wang*. Bitwise Collision Attack Based on Second-Order Distance. KSII Transactions on Internet and Information Systems, 11 (3), pp. 1802-1819, 2017. (SCI)
[17] Yanting Ren, Liji Wu, An Wang*. Double Sieve Collision Attack Based on Bitwise Detection. KSII Transactions on Internet and Information Systems, 9 (1), pp. 296-308, 2015. (SCI)
[18] Xiaowei Han, Beibei Wang, Liji Wu*, An Wang*. A High-Performance Elliptic Curve Cryptographic Coprocessor with Side Channel Analysis Countermeasures For Smart IC Card. IEICE Electronics Express, 12 (20), pp. 1-12, 2015. (SCI)
[19] An Wang*, Man Chen, Zongyue Wang, Yaoling Ding. Overcoming Significant Noise: Correlation-Template-Induction Attack. 8th Information Security Practice and Experience Conference (ISPEC 2012), LNCS, vol. 7232, pp. 393-404. Springer, Heidelberg, 2012. (EI)
[20] An Wang, Zheng Li*, Xianwen Yang, Yanyan Yu. A New Security Proof of Practical Cryptographic Devices Based on Hardware, Software and Protocols. 7th Information Security Practice and Experience Conference (ISPEC 2011), LNCS, vol. 6672, pp. 386-400, Springer, Heidelberg, 2011. (EI)
[21] Danhui Wang, An Wang*, Xuexin Zheng. Fault-Tolerant Linear Collision Attack: A Combination with Correlation Power Analysis. 10th Information Security Practice and Experience Conference (ISPEC 2014), LNCS, vol. 8434, pp. 232–246, Springer, Heidelberg, 2014. (EI)
[22] 刘明洁, 王安*. 全同态加密研究动态及其应用概述. 计算机研究与发展, 51 (12), pp. 2593-2603, 2014. (EI)