Yuejun Liu

Orcid: 0000-0002-3821-4050

According to our database1, Yuejun Liu authored at least 31 papers between 2011 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
NTRU with Hints: Recovering NTRU Secret Keys from Partial Leakage.
IACR Cryptol. ePrint Arch., 2025

Efficient CNN-Based Side-Channel Attacks on Dilithium without Device Access.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2025

A Versatile Decentralized Attribute Based Signature Scheme for IoT.
Proceedings of the Information and Communications Security - 27th International Conference, 2025

Enhanced Key Mismatch Attacks on Lattice-Based KEMs: Multi-bit Inference and Ciphertext Generalization.
Proceedings of the Computer Security - ESORICS 2025, 2025

Breaking the Shield: Novel Fault Attacks on CRYSTALS-Dilithium.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025

2024
In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium.
Cybersecur., December, 2024

New partial key exposure attacks on RSA with additive exponent blinding.
Cybersecur., December, 2024

Partial key exposure attacks on Prime Power RSA with non-consecutive blocks.
Theor. Comput. Sci., 2024

Unveiling Luxury Consumption Intention in Scarcity: The Role of Locus of Control and Economic Mobility Perceptions.
J. Theor. Appl. Electron. Commer. Res., 2024

On the Security of LWE-based KEMs under Various Distributions: A Case Study of Kyber.
IACR Cryptol. ePrint Arch., 2024

Single Trace is All It Takes: Efficient Side-channel Attack on Dilithium.
IACR Cryptol. ePrint Arch., 2024

Enhancing Higher-Order Masking: A Faster and Secure Implementation to Mitigate Bit Interaction Leakage.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

Towards High-Quality Electromagnetic Leakage Acquisition in Side-Channel Analysis.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

Heterogeneous Performs Better: High Throughput Implementations of Falcon in Multi-Client Scenarios.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2024

A Novel Power Analysis Attack against CRYSTALS-Dilithium Implementation.
Proceedings of the IEEE European Test Symposium, 2024

Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
CKDAN: Content and keystroke dual attention networks with pre-trained models for continuous authentication.
Comput. Secur., May, 2023

Practical Public Template Attack Attacks on CRYSTALS-Dilithium With Randomness Leakages.
IEEE Trans. Inf. Forensics Secur., 2023

When NTT Meets SIS: Efficient Side-channel Attacks on Dilithium and Kyber.
IACR Cryptol. ePrint Arch., 2023

Recovering Multi-prime RSA Keys with Erasures and Errors.
Proceedings of the Information Security Practice and Experience, 2023

Low Latency Implementations of CRYSTALS-Dilithium for Cloud Applications.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

2022
(Full) Leakage resilience of Fiat-Shamir signatures over lattices.
Frontiers Comput. Sci., October, 2022

A Theoretical Study of the Sensing Mechanism of a Schiff-Based Sensor for Fluoride.
Sensors, 2022

2021
On the Security of Lattice-Based Fiat-Shamir Signatures in the Presence of Randomness Leakage.
IEEE Trans. Inf. Forensics Secur., 2021

Integer LWE with Non-subgaussian Error and Related Attacks.
Proceedings of the Information Security - 24th International Conference, 2021

2020
Thyroid Extraction Based on Artificial Immune Network with Firefly Algorithm in Single Photon Emission Computed Tomography Image.
J. Medical Imaging Health Informatics, 2020

Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
On Security of Fiat-Shamir Signatures over Lattice in the Presence of Randomness Leakage.
IACR Cryptol. ePrint Arch., 2019

Predicate encryption against master-key tampering attacks.
Cybersecur., 2019

Thyroid Diagnosis from SPECT Images Using Convolutional Neural Network with Optimization.
Comput. Intell. Neurosci., 2019

2011
Performance analysis of seasonal soil heat storage air conditioning system in solar ground coupled heat pump.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011


  Loading...