default search action
Zhiqiang Liu 0001
Person information
- affiliation: Shanghai Jiao Tong University, Department of Computer Science and Engineering, China
Other persons with the same name
- Zhiqiang Liu (aka: ZhiQiang Liu, Zhi-qiang Liu, Zhi-Qiang Liu) — disambiguation page
- Zhiqiang Liu 0002 — Tianjin University, College of Intelligence and Computing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j29]Wei Li, Shan Cao, Dawu Gu, Jiayao Li, Tianpei Cai, Menglin Wang, Li Sun, Zhiqiang Liu, Ya Liu:
Ciphertext-only fault analysis of GIFT lightweight cryptosystem. Sci. China Inf. Sci. 65(3) (2022) - [j28]Yanxue Jia, Shifeng Sun, Yuncong Zhang, Qingzhao Zhang, Ning Ding, Zhiqiang Liu, Joseph K. Liu, Dawu Gu:
${\sf PBT}$PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions. IEEE Trans. Dependable Secur. Comput. 19(1): 647-662 (2022) - 2021
- [c25]Yanxue Jia, Shifeng Sun, Yi Zhang, Zhiqiang Liu, Dawu Gu:
Redactable Blockchain Supporting Supervision and Self-Management. AsiaCCS 2021: 844-858 - 2020
- [j27]Ya Liu, Tiande Zang, Dawu Gu, Fengyu Zhao, Wei Li, Zhiqiang Liu:
Improved Cryptanalysis of Reduced-Version QARMA-64/128. IEEE Access 8: 8361-8370 (2020) - [j26]Zhiqiang Liu, Shuai Han, Qingju Wang, Wei Li, Ya Liu, Dawu Gu:
New insights on linear cryptanalysis. Sci. China Inf. Sci. 63(1): 112104 (2020) - [j25]Wei Li, Linfeng Liao, Dawu Gu, Shan Cao, Yixin Wu, Jiayao Li, Zhihong Zhou, Zheng Guo, Ya Liu, Zhiqiang Liu:
Ciphertext-only fault analysis on the Midori lightweight cryptosystem. Sci. China Inf. Sci. 63(3) (2020) - [j24]Ya Liu, Bing Shi, Dawu Gu, Fengyu Zhao, Wei Li, Zhiqiang Liu:
Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256. Comput. J. 63(12): 1859-1870 (2020) - [c24]Zheng Xie, Zhiquan Wen, Jing Liu, Zhiqiang Liu, Xixian Wu, Mingkui Tan:
Deep Transferring Quantization. ECCV (8) 2020: 625-642
2010 – 2019
- 2019
- [j23]Ya Liu, Yifan Shi, Dawu Gu, Bo Dai, Fengyu Zhao, Wei Li, Zhiqiang Liu, Zhiqiang Zeng:
Improved impossible differential cryptanalysis of large-block Rijndael. Sci. China Inf. Sci. 62(3): 32101:1-32101:14 (2019) - [j22]Ya Liu, Yifan Shi, Dawu Gu, Zhiqiang Zeng, Fengyu Zhao, Wei Li, Zhiqiang Liu, Yang Bao:
Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC. Comput. J. 62(12): 1761-1776 (2019) - [j21]Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu:
Z-Channel: Scalable and efficient scheme in Zerocash. Comput. Secur. 86: 112-131 (2019) - [j20]Zhiqiang Liu, Shuyang Tang, Sherman S. M. Chow, Zhen Liu, Yu Long:
Fork-free hybrid consensus with flexible Proof-of-Activity. Future Gener. Comput. Syst. 96: 515-524 (2019) - [j19]Ya Liu, Liang Cheng, Fengyu Zhao, Chunhua Su, Zhiqiang Liu, Wei Li, Dawu Gu:
New Analysis of Reduced-Version of Piccolo in the Single-Key Scenario. KSII Trans. Internet Inf. Syst. 13(9): 4727-4741 (2019) - [j18]Wei Li, Linfeng Liao, Dawu Gu, Chaoyun Li, Chenyu Ge, Zheng Guo, Ya Liu, Zhiqiang Liu:
Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things. IEEE Trans. Dependable Secur. Comput. 16(3): 454-461 (2019) - [c23]Shuyang Tang, Sherman S. M. Chow, Zhiqiang Liu, Joseph K. Liu:
Fast-to-Finalize Nakamoto-Like Consensus. ACISP 2019: 271-288 - [c22]Feng Shen, Yu Long, Zhen Liu, Zhiqiang Liu, Hongyang Liu, Dawu Gu, Ning Liu:
A Practical Dynamic Enhanced BFT Protocol. NSS 2019: 288-304 - [c21]Chen Pan, Shuyang Tang, Zhonghui Ge, Zhiqiang Liu, Yu Long, Zhen Liu, Dawu Gu:
Gnocchi: Multiplexed Payment Channels for Cryptocurrencies. NSS 2019: 488-503 - [c20]Yi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Dawu Gu, Fei Huan, Yanxue Jia:
TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility. ProvSec 2019: 339-346 - [c19]Shuyang Tang, Jilai Zheng, Yao Deng, Ziyu Wang, Zhiqiang Liu, Dawu Gu, Zhen Liu, Yu Long:
Towards a Multi-chain Future of Proof-of-Space. SecureComm (1) 2019: 23-38 - [c18]Qingyi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Zhimei Sui, Shifeng Sun, Shuyang Tang, Dawu Gu:
Making Monero Hard-to-Trace and More Efficient. TrustCom/BigDataSE 2019: 514-521 - [c17]Hongyang Liu, Feng Shen, Zhiqiang Liu, Yu Long, Zhen Liu, Shifeng Sun, Shuyang Tang, Dawu Gu:
A Secure and Practical Blockchain Scheme for IoT. TrustCom/BigDataSE 2019: 538-545 - [i9]Shuyang Tang, Jilai Zheng, Yao Deng, Ziyu Wang, Zhiqiang Liu, Dawu Gu:
Towards a Multi-Chain Future of Proof-of-Space. CoRR abs/1907.07896 (2019) - 2018
- [j17]Ya Liu, Liang Cheng, Zhiqiang Liu, Wei Li, Qingju Wang, Dawu Gu:
Improved meet-in-the-middle attacks on reduced-round Piccolo. Sci. China Inf. Sci. 61(3): 032108:1-032108:13 (2018) - [j16]Ya Liu, Anren Yang, Bo Dai, Wei Li, Zhiqiang Liu, Dawu Gu, Zhiqiang Zeng:
Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128. Comput. J. 61(8): 1252-1258 (2018) - [j15]Wei Li, Linfeng Liao, Dawu Gu, Chenyu Ge, Zhiyong Gao, Zhihong Zhou, Zheng Guo, Ya Liu, Zhiqiang Liu:
Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network. KSII Trans. Internet Inf. Syst. 12(1): 476-496 (2018) - [j14]Wei Li, Chenyu Ge, Dawu Gu, Linfeng Liao, Zhiyong Gao, Xiujin Shi, Ting Lu, Ya Liu, Zhiqiang Liu:
Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks. KSII Trans. Internet Inf. Syst. 12(7): 3421-3437 (2018) - [c16]Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu:
Z-Channel: Scalable and Efficient Scheme in Zerocash. ACISP 2018: 687-705 - [c15]Cencen Wan, Shuyang Tang, Yuncong Zhang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu, Yu Yu:
Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol. Inscrypt 2018: 49-69 - [c14]Hao Xu, Yu Long, Zhiqiang Liu, Zhen Liu, Dawu Gu:
Dynamic Practical Byzantine Fault Tolerance. CNS 2018: 1-8 - [c13]Fengjun Chen, Zhiqiang Liu, Yu Long, Zhen Liu, Ning Ding:
Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain. NSS 2018: 1-15 - [i8]Cencen Wan, Yuncong Zhang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu, Yu Yu, Shuyang Tang:
Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol. IACR Cryptol. ePrint Arch. 2018: 407 (2018) - 2017
- [j13]Wei Li, Zhiyong Gao, Dawu Gu, Chenyu Ge, Linfeng Liao, Zhihong Zhou, Ya Liu, Zhiqiang Liu:
Security Analysis of the Whirlpool Hash Function in the Cloud of Things. KSII Trans. Internet Inf. Syst. 11(1): 536-551 (2017) - [i7]Shuyang Tang, Zhiqiang Liu, Sherman S. M. Chow, Zhen Liu, Yu Long:
Forking-Free Hybrid Consensus with Generalized Proof-of-Activity. IACR Cryptol. ePrint Arch. 2017: 367 (2017) - [i6]Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu:
Z-Channel: Scalable and Efficient Scheme in Zerocash. IACR Cryptol. ePrint Arch. 2017: 684 (2017) - 2016
- [j12]Zhiqiang Liu, Bing Sun, Qingju Wang, Kerem Varici, Dawu Gu:
Improved zero-correlation linear cryptanalysis of reduced-round Camellia under weak keys. IET Inf. Secur. 10(2): 95-103 (2016) - [j11]Ya Liu, Anren Yang, Zhiqiang Liu, Wei Li, Qingju Wang, Liang Song, Dawu Gu:
Improved impossible differential attack on reduced version of Camellia with FL/FL -1 functions. IET Inf. Secur. 10(6): 425-432 (2016) - [j10]Wei Li, Wenwen Zhang, Dawu Gu, Yanqin Cao, Zhi Tao, Zhihong Zhou, Ya Liu, Zhiqiang Liu:
Impossible Differential Fault Analysis on the LED Lightweight Cryptosystem in the Vehicular Ad-Hoc Networks. IEEE Trans. Dependable Secur. Comput. 13(1): 84-92 (2016) - 2015
- [j9]Qingju Wang, Zhiqiang Liu, Deniz Toz, Kerem Varici, Dawu Gu:
Related-key rectangle cryptanalysis of Rijndael-160 and Rijndael-192. IET Inf. Secur. 9(5): 266-276 (2015) - [j8]Wei Li, Wenwen Zhang, Dawu Gu, Zhi Tao, Zhihong Zhou, Ya Liu, Zhiqiang Liu:
Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things. KSII Trans. Internet Inf. Syst. 9(2): 793-810 (2015) - [j7]Zhiqiang Liu, Ya Liu, Qingju Wang, Dawu Gu, Wei Li:
Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers. Secur. Commun. Networks 8(4): 672-681 (2015) - [c12]Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda Alkhzaimi, Chao Li:
Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis. CRYPTO (1) 2015: 95-115 - [i5]Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda Alkhzaimi, Chao Li:
Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2015: 181 (2015) - 2014
- [c11]Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, Yosuke Todo:
Cryptanalysis of Reduced-Round SIMON32 and SIMON48. INDOCRYPT 2014: 143-160 - [i4]Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, Yosuke Todo:
Cryptanalysis of Reduced-round SIMON32 and SIMON48. IACR Cryptol. ePrint Arch. 2014: 761 (2014) - 2013
- [j6]Wei Li, Zhi Tao, Dawu Gu, Yi Wang, Zhiqiang Liu, Ya Liu:
Differential Fault Analysis on the MD5 Compression Function. J. Comput. 8(11): 2888-2894 (2013) - [c10]Jing Zhang, Mingyang Wang, Yan He, Zhiqiang Liu, Wei Li:
Research and Appliance of the Zero-burden based SoS Comprehensive Evaluation Method. Complex Adaptive Systems 2013: 290-297 - 2012
- [j5]Wei Li, Dawu Gu, Xiaoling Xia, Chen Zhao, Zhiqiang Liu, Ya Liu, Qingju Wang:
Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network. Int. J. Comput. Intell. Syst. 5(5): 896-904 (2012) - [j4]Wei Li, Dawu Gu, Xiaoling Xia, Ya Liu, Zhiqiang Liu:
Fault Detection on the Software Implementation of CLEFIA Lightweight Cipher. J. Networks 7(8): 1288-1294 (2012) - [j3]Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li:
Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256. J. Syst. Softw. 85(11): 2451-2458 (2012) - [c9]Zhiqiang Liu, Dawu Gu, Ya Liu, Wei Li:
Linear Fault Analysis of Block Ciphers. ACNS 2012: 241-256 - [c8]Sheng Li, Dawu Gu, Zhouqian Ma, Zhiqiang Liu:
Fault Analysis of the Piccolo Block Cipher. CIS 2012: 482-486 - [c7]Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, Jiazhe Chen, Wei Li:
New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia. FSE 2012: 90-109 - [c6]Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li:
Impossible Differential Attacks on Reduced-Round LBlock. ISPEC 2012: 97-108 - [i3]Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li:
Improved Impossible Differential Attack on Reduced Version of Camellia-192/256. IACR Cryptol. ePrint Arch. 2012: 594 (2012) - 2011
- [j2]Wei Li, Xiaoling Xia, Dawu Gu, Zhiqiang Liu, Juanru Li, Ya Liu:
A New Differential Fault Attack on SPN Structure, with Application to AES Cipher. J. Comput. 6(2): 216-223 (2011) - [c5]Zhiqiang Liu, Dawu Gu, Ya Liu, Juanru Li, Wei Li:
Linear Cryptanalysis of ARIA Block Cipher. ICICS 2011: 242-254 - [c4]Wei Li, Dawu Gu, Zhiqiang Liu, Ya Liu, Xiaohu Huang:
Fault Detection of the MacGuffin Cipher against Differential Fault Attack. INTRUST 2011: 102-112 - [i2]Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li, Ying Man:
Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256. IACR Cryptol. ePrint Arch. 2011: 671 (2011) - 2010
- [j1]Wei Li, Dawu Gu, Juanru Li, Zhiqiang Liu, Ya Liu:
Differential fault analysis on Camellia. J. Syst. Softw. 83(5): 844-851 (2010) - [c3]Ning Ding, Dawu Gu, Zhiqiang Liu:
Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose. e-Forensics 2010: 241-255
2000 – 2009
- 2009
- [c2]Zhiqiang Liu, Dawu Gu, Jing Zhang, Wei Li:
Differential-Multiple Linear Cryptanalysis. Inscrypt 2009: 35-49 - [c1]Wei Li, Dawu Gu, Yong Wang, Juanru Li, Zhiqiang Liu:
An Extension of Differential Fault Analysis on AES. NSS 2009: 443-446 - [i1]Zhiqiang Liu, Dawu Gu, Jing Zhang:
Multiple Linear Cryptanalysis of Reduced-Round SMS4 Block Cipher. IACR Cryptol. ePrint Arch. 2009: 256 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint