Zhiqiang Liu

Orcid: 0000-0002-0846-4825

Affiliations:
  • Shanghai Jiao Tong University, Department of Computer Science and Engineering, China


According to our database1, Zhiqiang Liu authored at least 58 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
${\sf PBT}$PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions.
IEEE Trans. Dependable Secur. Comput., 2022

Ciphertext-only fault analysis of GIFT lightweight cryptosystem.
Sci. China Inf. Sci., 2022

2021
Redactable Blockchain Supporting Supervision and Self-Management.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256.
Comput. J., 2020

New insights on linear cryptanalysis.
Sci. China Inf. Sci., 2020

Ciphertext-only fault analysis on the Midori lightweight cryptosystem.
Sci. China Inf. Sci., 2020

Improved Cryptanalysis of Reduced-Version QARMA-64/128.
IEEE Access, 2020

Deep Transferring Quantization.
Proceedings of the Computer Vision - ECCV 2020, 2020

2019
Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2019

New Analysis of Reduced-Version of Piccolo in the Single-Key Scenario.
KSII Trans. Internet Inf. Syst., 2019

Fork-free hybrid consensus with flexible Proof-of-Activity.
Future Gener. Comput. Syst., 2019

Towards a Multi-Chain Future of Proof-of-Space.
CoRR, 2019

Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC.
Comput. J., 2019

Improved impossible differential cryptanalysis of large-block Rijndael.
Sci. China Inf. Sci., 2019

A Secure and Practical Blockchain Scheme for IoT.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Making Monero Hard-to-Trace and More Efficient.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Towards a Multi-chain Future of Proof-of-Space.
Proceedings of the Security and Privacy in Communication Networks, 2019

TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility.
Proceedings of the Provable Security, 2019

A Practical Dynamic Enhanced BFT Protocol.
Proceedings of the Network and System Security - 13th International Conference, 2019

Gnocchi: Multiplexed Payment Channels for Cryptocurrencies.
Proceedings of the Network and System Security - 13th International Conference, 2019

Fast-to-Finalize Nakamoto-Like Consensus.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks.
KSII Trans. Internet Inf. Syst., 2018

Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network.
KSII Trans. Internet Inf. Syst., 2018

Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol.
IACR Cryptol. ePrint Arch., 2018

Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128.
Comput. J., 2018

Improved meet-in-the-middle attacks on reduced-round Piccolo.
Sci. China Inf. Sci., 2018

Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain.
Proceedings of the Network and System Security - 12th International Conference, 2018

Dynamic Practical Byzantine Fault Tolerance.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Security Analysis of the Whirlpool Hash Function in the Cloud of Things.
KSII Trans. Internet Inf. Syst., 2017

Z-Channel: Scalable and Efficient Scheme in Zerocash.
IACR Cryptol. ePrint Arch., 2017

Forking-Free Hybrid Consensus with Generalized Proof-of-Activity.
IACR Cryptol. ePrint Arch., 2017

2016
Impossible Differential Fault Analysis on the LED Lightweight Cryptosystem in the Vehicular Ad-Hoc Networks.
IEEE Trans. Dependable Secur. Comput., 2016

Improved impossible differential attack on reduced version of Camellia with <i>FL</i>/<i>FL</i> <sup>-1</sup> functions.
IET Inf. Secur., 2016

Improved zero-correlation linear cryptanalysis of reduced-round Camellia under weak keys.
IET Inf. Secur., 2016

2015
Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers.
Secur. Commun. Networks, 2015

Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things.
KSII Trans. Internet Inf. Syst., 2015

Related-key rectangle cryptanalysis of Rijndael-160 and Rijndael-192.
IET Inf. Secur., 2015

Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2015

2014
Cryptanalysis of Reduced-round SIMON32 and SIMON48.
IACR Cryptol. ePrint Arch., 2014

2013
Differential Fault Analysis on the MD5 Compression Function.
J. Comput., 2013

Research and Appliance of the Zero-burden based SoS Comprehensive Evaluation Method.
Proceedings of the Complex Adaptive Systems 2013 Conference, 2013

2012
Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256.
J. Syst. Softw., 2012

Fault Detection on the Software Implementation of CLEFIA Lightweight Cipher.
J. Networks, 2012

Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network.
Int. J. Comput. Intell. Syst., 2012

Improved Impossible Differential Attack on Reduced Version of Camellia-192/256.
IACR Cryptol. ePrint Arch., 2012

Impossible Differential Attacks on Reduced-Round LBlock.
Proceedings of the Information Security Practice and Experience, 2012

New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Fault Analysis of the Piccolo Block Cipher.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Linear Fault Analysis of Block Ciphers.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
A New Differential Fault Attack on SPN Structure, with Application to AES Cipher.
J. Comput., 2011

Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256.
IACR Cryptol. ePrint Arch., 2011

Fault Detection of the MacGuffin Cipher against Differential Fault Attack.
Proceedings of the Trusted Systems - Third International Conference, 2011

Linear Cryptanalysis of ARIA Block Cipher.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

2010
Differential fault analysis on Camellia.
J. Syst. Softw., 2010

Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

2009
Multiple Linear Cryptanalysis of Reduced-Round SMS4 Block Cipher.
IACR Cryptol. ePrint Arch., 2009

An Extension of Differential Fault Analysis on AES.
Proceedings of the Third International Conference on Network and System Security, 2009

Differential-Multiple Linear Cryptanalysis.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009


  Loading...