Zhiqiang Liu
Orcid: 0000-0002-0846-4825Affiliations:
- Shanghai Jiao Tong University, Department of Computer Science and Engineering, China
According to our database1,
Zhiqiang Liu
authored at least 58 papers
between 2009 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
${\sf PBT}$PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions.
IEEE Trans. Dependable Secur. Comput., 2022
Sci. China Inf. Sci., 2022
2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Sci. China Inf. Sci., 2020
2019
Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2019
KSII Trans. Internet Inf. Syst., 2019
Future Gener. Comput. Syst., 2019
Comput. J., 2019
Sci. China Inf. Sci., 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility.
Proceedings of the Provable Security, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks.
KSII Trans. Internet Inf. Syst., 2018
Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network.
KSII Trans. Internet Inf. Syst., 2018
IACR Cryptol. ePrint Arch., 2018
Sci. China Inf. Sci., 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
KSII Trans. Internet Inf. Syst., 2017
IACR Cryptol. ePrint Arch., 2017
2016
Impossible Differential Fault Analysis on the LED Lightweight Cryptosystem in the Vehicular Ad-Hoc Networks.
IEEE Trans. Dependable Secur. Comput., 2016
Improved impossible differential attack on reduced version of Camellia with <i>FL</i>/<i>FL</i> <sup>-1</sup> functions.
IET Inf. Secur., 2016
Improved zero-correlation linear cryptanalysis of reduced-round Camellia under weak keys.
IET Inf. Secur., 2016
2015
Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers.
Secur. Commun. Networks, 2015
KSII Trans. Internet Inf. Syst., 2015
IET Inf. Secur., 2015
Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2015
2014
2013
Proceedings of the Complex Adaptive Systems 2013 Conference, 2013
2012
Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256.
J. Syst. Softw., 2012
J. Networks, 2012
Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network.
Int. J. Comput. Intell. Syst., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
J. Comput., 2011
Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Trusted Systems - Third International Conference, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009