default search action
Ya Liu 0001
Person information
- affiliation: University of Shanghai for Science and Technology, Department of Computer Science and Engineering, China
- affiliation: Shanghai Jiao Tong University, Department of Computer Science and Engineering, China
Other persons with the same name
- Ya Liu — disambiguation page
- Ya Liu 0002 — Xi'an Jiaotong University, School of Management / State Key Laboratory for Manufacturing Systems Engineering, China
- Ya Liu 0003 — Central South University, China
- Ya Liu 0004 — Nanjing University of Aeronautics and Astronautics, China
- Ya Liu 0005 — Tongji University, Shanghai, China
- Ya Liu 0006 — Shanghai Jiao Tong University, Shanghai, China (and 1 more)
- Ya Liu 0007 — Yanshan University, Qinhuangdao, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Ya Liu, Xiao Wang, Bo Qu, Fengyu Zhao:
ATVITSC: A Novel Encrypted Traffic Classification Method Based on Deep Learning. IEEE Trans. Inf. Forensics Secur. 19: 9374-9389 (2024) - 2022
- [j26]Wei Li, Shan Cao, Dawu Gu, Jiayao Li, Tianpei Cai, Menglin Wang, Li Sun, Zhiqiang Liu, Ya Liu:
Ciphertext-only fault analysis of GIFT lightweight cryptosystem. Sci. China Inf. Sci. 65(3) (2022) - 2020
- [j25]Ya Liu, Tiande Zang, Dawu Gu, Fengyu Zhao, Wei Li, Zhiqiang Liu:
Improved Cryptanalysis of Reduced-Version QARMA-64/128. IEEE Access 8: 8361-8370 (2020) - [j24]Zhiqiang Liu, Shuai Han, Qingju Wang, Wei Li, Ya Liu, Dawu Gu:
New insights on linear cryptanalysis. Sci. China Inf. Sci. 63(1): 112104 (2020) - [j23]Wei Li, Linfeng Liao, Dawu Gu, Shan Cao, Yixin Wu, Jiayao Li, Zhihong Zhou, Zheng Guo, Ya Liu, Zhiqiang Liu:
Ciphertext-only fault analysis on the Midori lightweight cryptosystem. Sci. China Inf. Sci. 63(3) (2020) - [j22]Ya Liu, Bing Shi, Dawu Gu, Fengyu Zhao, Wei Li, Zhiqiang Liu:
Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256. Comput. J. 63(12): 1859-1870 (2020)
2010 – 2019
- 2019
- [j21]Ya Liu, Yifan Shi, Dawu Gu, Bo Dai, Fengyu Zhao, Wei Li, Zhiqiang Liu, Zhiqiang Zeng:
Improved impossible differential cryptanalysis of large-block Rijndael. Sci. China Inf. Sci. 62(3): 32101:1-32101:14 (2019) - [j20]Ya Liu, Yifan Shi, Dawu Gu, Zhiqiang Zeng, Fengyu Zhao, Wei Li, Zhiqiang Liu, Yang Bao:
Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC. Comput. J. 62(12): 1761-1776 (2019) - [j19]Ya Liu, Liang Cheng, Fengyu Zhao, Chunhua Su, Zhiqiang Liu, Wei Li, Dawu Gu:
New Analysis of Reduced-Version of Piccolo in the Single-Key Scenario. KSII Trans. Internet Inf. Syst. 13(9): 4727-4741 (2019) - [j18]Wei Li, Linfeng Liao, Dawu Gu, Chaoyun Li, Chenyu Ge, Zheng Guo, Ya Liu, Zhiqiang Liu:
Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things. IEEE Trans. Dependable Secur. Comput. 16(3): 454-461 (2019) - 2018
- [j17]Ya Liu, Liang Cheng, Zhiqiang Liu, Wei Li, Qingju Wang, Dawu Gu:
Improved meet-in-the-middle attacks on reduced-round Piccolo. Sci. China Inf. Sci. 61(3): 032108:1-032108:13 (2018) - [j16]Wei Li, Vincent Rijmen, Zhi Tao, Qingju Wang, Hua Chen, Yunwen Liu, Chaoyun Li, Ya Liu:
Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs. Sci. China Inf. Sci. 61(3): 032110:1-032110:13 (2018) - [j15]Ya Liu, Anren Yang, Bo Dai, Wei Li, Zhiqiang Liu, Dawu Gu, Zhiqiang Zeng:
Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128. Comput. J. 61(8): 1252-1258 (2018) - [j14]Wei Li, Linfeng Liao, Dawu Gu, Chenyu Ge, Zhiyong Gao, Zhihong Zhou, Zheng Guo, Ya Liu, Zhiqiang Liu:
Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network. KSII Trans. Internet Inf. Syst. 12(1): 476-496 (2018) - [j13]Wei Li, Chenyu Ge, Dawu Gu, Linfeng Liao, Zhiyong Gao, Xiujin Shi, Ting Lu, Ya Liu, Zhiqiang Liu:
Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks. KSII Trans. Internet Inf. Syst. 12(7): 3421-3437 (2018) - 2017
- [j12]Wei Li, Zhiyong Gao, Dawu Gu, Chenyu Ge, Linfeng Liao, Zhihong Zhou, Ya Liu, Zhiqiang Liu:
Security Analysis of the Whirlpool Hash Function in the Cloud of Things. KSII Trans. Internet Inf. Syst. 11(1): 536-551 (2017) - 2016
- [j11]Ya Liu, Anren Yang, Zhiqiang Liu, Wei Li, Qingju Wang, Liang Song, Dawu Gu:
Improved impossible differential attack on reduced version of Camellia with FL/FL -1 functions. IET Inf. Secur. 10(6): 425-432 (2016) - [j10]Wei Li, Wenwen Zhang, Dawu Gu, Yanqin Cao, Zhi Tao, Zhihong Zhou, Ya Liu, Zhiqiang Liu:
Impossible Differential Fault Analysis on the LED Lightweight Cryptosystem in the Vehicular Ad-Hoc Networks. IEEE Trans. Dependable Secur. Comput. 13(1): 84-92 (2016) - 2015
- [j9]Wei Li, Wenwen Zhang, Dawu Gu, Zhi Tao, Zhihong Zhou, Ya Liu, Zhiqiang Liu:
Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things. KSII Trans. Internet Inf. Syst. 9(2): 793-810 (2015) - [j8]Zhiqiang Liu, Ya Liu, Qingju Wang, Dawu Gu, Wei Li:
Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers. Secur. Commun. Networks 8(4): 672-681 (2015) - 2013
- [j7]Wei Li, Zhi Tao, Dawu Gu, Yi Wang, Zhiqiang Liu, Ya Liu:
Differential Fault Analysis on the MD5 Compression Function. J. Comput. 8(11): 2888-2894 (2013) - [j6]Ya Liu, Dawu Gu, Bailan Li, Bo Qu:
Legitimate-reader-only attack on MIFARE Classic. Math. Comput. Model. 58(1-2): 219-226 (2013) - 2012
- [j5]Wei Li, Dawu Gu, Xiaoling Xia, Chen Zhao, Zhiqiang Liu, Ya Liu, Qingju Wang:
Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network. Int. J. Comput. Intell. Syst. 5(5): 896-904 (2012) - [j4]Wei Li, Dawu Gu, Xiaoling Xia, Ya Liu, Zhiqiang Liu:
Fault Detection on the Software Implementation of CLEFIA Lightweight Cipher. J. Networks 7(8): 1288-1294 (2012) - [j3]Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li:
Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256. J. Syst. Softw. 85(11): 2451-2458 (2012) - [c6]Zhiqiang Liu, Dawu Gu, Ya Liu, Wei Li:
Linear Fault Analysis of Block Ciphers. ACNS 2012: 241-256 - [c5]Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, Jiazhe Chen, Wei Li:
New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia. FSE 2012: 90-109 - [c4]Qingju Wang, Dawu Gu, Vincent Rijmen, Ya Liu, Jiazhe Chen, Andrey Bogdanov:
Improved Impossible Differential Attacks on Large-Block Rijndael. ICISC 2012: 126-140 - [c3]Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li:
Impossible Differential Attacks on Reduced-Round LBlock. ISPEC 2012: 97-108 - [i2]Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li:
Improved Impossible Differential Attack on Reduced Version of Camellia-192/256. IACR Cryptol. ePrint Arch. 2012: 594 (2012) - 2011
- [j2]Wei Li, Xiaoling Xia, Dawu Gu, Zhiqiang Liu, Juanru Li, Ya Liu:
A New Differential Fault Attack on SPN Structure, with Application to AES Cipher. J. Comput. 6(2): 216-223 (2011) - [c2]Zhiqiang Liu, Dawu Gu, Ya Liu, Juanru Li, Wei Li:
Linear Cryptanalysis of ARIA Block Cipher. ICICS 2011: 242-254 - [c1]Wei Li, Dawu Gu, Zhiqiang Liu, Ya Liu, Xiaohu Huang:
Fault Detection of the MacGuffin Cipher against Differential Fault Attack. INTRUST 2011: 102-112 - [i1]Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li, Ying Man:
Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256. IACR Cryptol. ePrint Arch. 2011: 671 (2011) - 2010
- [j1]Wei Li, Dawu Gu, Juanru Li, Zhiqiang Liu, Ya Liu:
Differential fault analysis on Camellia. J. Syst. Softw. 83(5): 844-851 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint