关注
guozhen liu
guozhen liu
在 sjtu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Detection of SQL injection based on artificial neural network
P Tang, W Qiu, Z Huang, H Lian, G Liu
Knowledge-Based Systems 190, 105528, 2020
1132020
Security analysis of SKINNY under related-tweakey settings
G Liu, M Ghosh, L Song
Cryptology ePrint Archive, 2016
772016
Practical collision attacks against round-reduced SHA-3
J Guo, G Liao, G Liu, M Liu, K Qiao, L Song
Journal of Cryptology 33, 228-270, 2020
542020
Exploring SAT for cryptanalysis:(quantum) collision attacks against 6-round SHA-3
J Guo, G Liu, L Song, Y Tu
International Conference on the Theory and Application of Cryptology and …, 2022
162022
SQL injection behavior mining based deep learning
P Tang, W Qiu, Z Huang, H Lian, G Liu
Advanced Data Mining and Applications: 14th International Conference, ADMA …, 2018
162018
Preimage attacks against lightweight scheme Xoodyak based on deep learning
G Liu, J Lu, H Li, P Tang, W Qiu
Advances in Information and Communication: Proceedings of the 2021 Future of …, 2021
122021
Optimized password recovery for SHA-512 on GPUs
C Ge, L Xu, W Qiu, Z Huang, J Guo, G Liu, Z Gong
2017 IEEE International Conference on Computational Science and Engineering …, 2017
122017
New techniques for searching differential trails in Keccak
G Liu, W Qiu, Y Tu
IACR Transactions on Symmetric Cryptology, 2020
72020
AlgSAT---a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective
H Li, H Zhang, G Liu, K Hu, J Guo, W Qiu
Cryptology ePrint Archive, 2022
32022
Rebound Attacks on  Hashing with Automatic Tools
S Li, G Liu, P Pham
International Conference on Network and System Security, 649-666, 2022
12022
Exploring SAT for Cryptanalysis:(Quantum) Collision Attacks against 6-Round SHA-3 (Full Version)
J Guo, G Liu, L Song, Y Tu
Cryptology ePrint Archive, 2022
12022
AlgSAT—A SAT Method for Verification of Differential Trails from an Algebraic Perspective
H Li, H Zhang, K Hu, G Liu, W Qiu
Australasian Conference on Information Security and Privacy, 450-471, 2024
2024
Automatic Search of Linear Structure: Applications to Keccak and Ascon
H Li, G Liu, H Zhang, P Tang, W Qiu
International Conference on Information Security and Cryptology, 172-192, 2023
2023
Protecting lightweight block cipher implementation in mobile big data computing: A GPU-based approach
W Qiu, B Liu, C Ge, L Xu, X Tang, G Liu
Peer-to-Peer Networking and Applications 11, 252-264, 2018
2018
系统目前无法执行此操作,请稍后再试。
文章 1–14