Detection of SQL injection based on artificial neural network P Tang, W Qiu, Z Huang, H Lian, G Liu Knowledge-Based Systems 190, 105528, 2020 | 131 | 2020 |
Security analysis of SKINNY under related-tweakey settings G Liu, M Ghosh, L Song Cryptology ePrint Archive, 2016 | 80 | 2016 |
Practical collision attacks against round-reduced SHA-3 J Guo, G Liao, G Liu, M Liu, K Qiao, L Song Journal of Cryptology 33, 228-270, 2020 | 54 | 2020 |
Exploring SAT for cryptanalysis:(quantum) collision attacks against 6-round SHA-3 J Guo, G Liu, L Song, Y Tu International Conference on the Theory and Application of Cryptology and …, 2022 | 18 | 2022 |
SQL injection behavior mining based deep learning P Tang, W Qiu, Z Huang, H Lian, G Liu Advanced Data Mining and Applications: 14th International Conference, ADMA …, 2018 | 17 | 2018 |
Preimage attacks against lightweight scheme Xoodyak based on deep learning G Liu, J Lu, H Li, P Tang, W Qiu Advances in Information and Communication: Proceedings of the 2021 Future of …, 2021 | 13 | 2021 |
Optimized password recovery for SHA-512 on GPUs C Ge, L Xu, W Qiu, Z Huang, J Guo, G Liu, Z Gong 2017 IEEE International Conference on Computational Science and Engineering …, 2017 | 13 | 2017 |
New techniques for searching differential trails in Keccak G Liu, W Qiu, Y Tu IACR Transactions on Symmetric Cryptology, 407-437, 2019 | 7 | 2019 |
AlgSAT---a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective H Li, H Zhang, G Liu, K Hu, J Guo, W Qiu Cryptology ePrint Archive, 2022 | 3 | 2022 |
Rebound Attacks on Hashing with Automatic Tools S Li, G Liu, P Pham International Conference on Network and System Security, 649-666, 2022 | 1 | 2022 |
Exploring SAT for Cryptanalysis:(Quantum) Collision Attacks against 6-Round SHA-3 (Full Version) J Guo, G Liu, L Song, Y Tu Cryptology ePrint Archive, 2022 | 1 | 2022 |
AlgSAT—A SAT Method for Verification of Differential Trails from an Algebraic Perspective H Li, H Zhang, K Hu, G Liu, W Qiu Australasian Conference on Information Security and Privacy, 450-471, 2024 | | 2024 |
Meet-in-the-Middle Attack on 4+ 4 Rounds of SCARF under Single-Tweak Setting S Chen, K Hu, G Liu, Z Niu, QQ Tan, S Wang Cryptology ePrint Archive, 2024 | | 2024 |
Automatic Search of Linear Structure: Applications to Keccak and Ascon H Li, G Liu, H Zhang, P Tang, W Qiu International Conference on Information Security and Cryptology, 172-192, 2023 | | 2023 |
Protecting lightweight block cipher implementation in mobile big data computing: A GPU-based approach W Qiu, B Liu, C Ge, L Xu, X Tang, G Liu Peer-to-Peer Networking and Applications 11, 252-264, 2018 | | 2018 |