Follow
guozhen liu
guozhen liu
Verified email at sjtu.edu.cn
Title
Cited by
Cited by
Year
Detection of SQL injection based on artificial neural network
P Tang, W Qiu, Z Huang, H Lian, G Liu
Knowledge-Based Systems 190, 105528, 2020
1062020
Security analysis of SKINNY under related-tweakey settings
G Liu, M Ghosh, L Song
Cryptology ePrint Archive, 2016
782016
Practical collision attacks against round-reduced SHA-3
J Guo, G Liao, G Liu, M Liu, K Qiao, L Song
Journal of Cryptology 33, 228-270, 2020
512020
SQL injection behavior mining based deep learning
P Tang, W Qiu, Z Huang, H Lian, G Liu
Advanced Data Mining and Applications: 14th International Conference, ADMA …, 2018
172018
Exploring SAT for cryptanalysis:(quantum) collision attacks against 6-round SHA-3
J Guo, G Liu, L Song, Y Tu
International Conference on the Theory and Application of Cryptology and …, 2022
132022
Preimage attacks against lightweight scheme Xoodyak based on deep learning
G Liu, J Lu, H Li, P Tang, W Qiu
Advances in Information and Communication: Proceedings of the 2021 Future of …, 2021
112021
Optimized password recovery for SHA-512 on GPUs
C Ge, L Xu, W Qiu, Z Huang, J Guo, G Liu, Z Gong
2017 IEEE International Conference on Computational Science and Engineering …, 2017
112017
New techniques for searching differential trails in Keccak
G Liu, W Qiu, Y Tu
IACR Transactions on Symmetric Cryptology, 2020
72020
AlgSAT---a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective
H Li, H Zhang, G Liu, K Hu, J Guo, W Qiu
Cryptology ePrint Archive, 2022
32022
Exploring SAT for Cryptanalysis:(Quantum) Collision Attacks against 6-Round SHA-3 (Full Version)
J Guo, G Liu, L Song, Y Tu
Cryptology ePrint Archive, 2022
12022
Automatic Search of Linear Structure: Applications to Keccak and Ascon
H Li, G Liu, H Zhang, P Tang, W Qiu
International Conference on Information Security and Cryptology, 172-192, 2023
2023
Rebound Attacks on  Hashing with Automatic Tools
S Li, G Liu, P Pham
International Conference on Network and System Security, 649-666, 2022
2022
SQL Injection Behavior Mining Based Deep Learning
G Liu
Advanced Data Mining and Applications: 14th International Conference, ADMA …, 2018
2018
Protecting lightweight block cipher implementation in mobile big data computing: A GPU-based approach
W Qiu, B Liu, C Ge, L Xu, X Tang, G Liu
Peer-to-Peer Networking and Applications 11, 252-264, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–14