Follow
Guozhen Liu
Guozhen Liu
Verified email at ucas.ac.cn
Title
Cited by
Cited by
Year
Detection of SQL injection based on artificial neural network
P Tang, W Qiu, Z Huang, H Lian, G Liu
Knowledge-Based Systems 190, 105528, 2020
1312020
Security analysis of SKINNY under related-tweakey settings
G Liu, M Ghosh, L Song
Cryptology ePrint Archive, 2016
802016
Practical collision attacks against round-reduced SHA-3
J Guo, G Liao, G Liu, M Liu, K Qiao, L Song
Journal of Cryptology 33, 228-270, 2020
542020
Exploring SAT for cryptanalysis:(quantum) collision attacks against 6-round SHA-3
J Guo, G Liu, L Song, Y Tu
International Conference on the Theory and Application of Cryptology and …, 2022
182022
SQL injection behavior mining based deep learning
P Tang, W Qiu, Z Huang, H Lian, G Liu
Advanced Data Mining and Applications: 14th International Conference, ADMA …, 2018
172018
Preimage attacks against lightweight scheme Xoodyak based on deep learning
G Liu, J Lu, H Li, P Tang, W Qiu
Advances in Information and Communication: Proceedings of the 2021 Future of …, 2021
132021
Optimized password recovery for SHA-512 on GPUs
C Ge, L Xu, W Qiu, Z Huang, J Guo, G Liu, Z Gong
2017 IEEE International Conference on Computational Science and Engineering …, 2017
132017
New techniques for searching differential trails in Keccak
G Liu, W Qiu, Y Tu
IACR Transactions on Symmetric Cryptology, 407-437, 2019
72019
AlgSAT---a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective
H Li, H Zhang, G Liu, K Hu, J Guo, W Qiu
Cryptology ePrint Archive, 2022
32022
Rebound Attacks on  Hashing with Automatic Tools
S Li, G Liu, P Pham
International Conference on Network and System Security, 649-666, 2022
12022
Exploring SAT for Cryptanalysis:(Quantum) Collision Attacks against 6-Round SHA-3 (Full Version)
J Guo, G Liu, L Song, Y Tu
Cryptology ePrint Archive, 2022
12022
AlgSAT—A SAT Method for Verification of Differential Trails from an Algebraic Perspective
H Li, H Zhang, K Hu, G Liu, W Qiu
Australasian Conference on Information Security and Privacy, 450-471, 2024
2024
Meet-in-the-Middle Attack on 4+ 4 Rounds of SCARF under Single-Tweak Setting
S Chen, K Hu, G Liu, Z Niu, QQ Tan, S Wang
Cryptology ePrint Archive, 2024
2024
Automatic Search of Linear Structure: Applications to Keccak and Ascon
H Li, G Liu, H Zhang, P Tang, W Qiu
International Conference on Information Security and Cryptology, 172-192, 2023
2023
Protecting lightweight block cipher implementation in mobile big data computing: A GPU-based approach
W Qiu, B Liu, C Ge, L Xu, X Tang, G Liu
Peer-to-Peer Networking and Applications 11, 252-264, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–15