Zhe Liu
Title
Cited by
Cited by
Year
On emerging family of elliptic curves to secure internet of things: ECC comes of age
Z Liu, X Huang, Z Hu, MK Khan, H Seo, L Zhou
IEEE Transactions on Dependable and Secure Computing 14 (3), 237-248, 2016
922016
Efficient Ring-LWE encryption on 8-bit AVR processors
Z Liu, H Seo, SS Roy, J Großschädl, H Kim, I Verbauwhede
International Workshop on Cryptographic Hardware and Embedded Systems, 663-682, 2015
782015
Elliptic curve cryptography with efficiently computable endomorphisms and its hardware implementations for the internet of things
Z Liu, J Großschädl, Z Hu, K Järvinen, H Wang, I Verbauwhede
IEEE Transactions on Computers 66 (5), 773-785, 2016
552016
MoTE-ECC: Energy-scalable elliptic curve cryptography for wireless sensor networks
Z Liu, E Wenger, J Großschädl
International Conference on Applied Cryptography and Network Security, 361-379, 2014
542014
Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes
Z Liu, H Seo, J Großschädl, H Kim
IEEE Transactions on Information Forensics and Security 11 (7), 1385-1397, 2015
532015
Efficient and Side-Channel Resistant RSA Implementation for 8-bit AVR Microcontrollers
Z Liu, J Großschädl, I Kizhvatov
Workshop on the Security of the Internet of Things-SOCIOT, 2010
472010
Securing edge devices in the post-quantum internet of things using lattice-based cryptography
Z Liu, KKR Choo, J Grossschadl
IEEE Communications Magazine 56 (2), 158-162, 2018
402018
Multi-precision squaring for public-key cryptography on embedded microprocessors
H Seo, Z Liu, J Choi, H Kim
International Conference on Cryptology in India, 227-243, 2013
352013
Generative neural networks for anomaly detection in crowded scenes
T Wang, M Qiao, Z Lin, C Li, H Snoussi, Z Liu, C Choi
IEEE Transactions on Information Forensics and Security 14 (5), 1390-1399, 2018
332018
On the soundness and security of privacy-preserving SVM for outsourcing data classification
X Li, Y Zhu, J Wang, Z Liu, Y Liu, M Zhang
IEEE Transactions on Dependable and Secure Computing 15 (5), 906-912, 2018
332018
FourQ on embedded devices with strong countermeasures against side-channel attacks
Z Liu, P Longa, G Pereira, O Reparaz, H Seo
IEEE Transactions on Dependable and Secure Computing, 2018
322018
New speed records for Montgomery modular multiplication on 8-bit AVR microcontrollers
Z Liu, J Großschädl
International Conference on Cryptology in Africa, 215-234, 2014
302014
Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions
Z Liu, KKR Choo, M Zhao
Computers & Security 69, 97-113, 2017
282017
Efficient arithmetic on ARM‐NEON and its application for high‐speed RSA implementation
H Seo, Z Liu, J Großschädl, H Kim
Security and Communication Networks 9 (18), 5401-5411, 2016
262016
Montgomery modular multiplication on ARM-NEON revisited
H Seo, Z Liu, J Großschädl, J Choi, H Kim
International Conference on Information Security and Cryptology, 328-342, 2014
262014
Twisted Edwards-form elliptic curve cryptography for 8-bit AVR-based sensor nodes
D Chu, J Großschädl, Z Liu, V Müller, Y Zhang
Proceedings of the first ACM workshop on Asia public-key cryptography, 39-44, 2013
252013
Efficient implementation of NIST-compliant elliptic curve cryptography for sensor nodes
Z Liu, H Seo, J Großschädl, H Kim
International Conference on Information and Communications Security, 302-317, 2013
222013
High-performance ideal lattice-based cryptography on 8-bit AVR microcontrollers
Z Liu, T Pöppelmann, T Oder, H Seo, SS Roy, T Güneysu, J Großschädl, ...
ACM Transactions on Embedded Computing Systems (TECS) 16 (4), 1-24, 2017
202017
Parallel implementations of LEA
H Seo, Z Liu, T Park, H Kim, Y Lee, J Choi, H Kim
International Conference on Information Security and Cryptology, 256-274, 2013
202013
Efficient software implementation of ring-LWE encryption on IoT processors
Z Liu, R Azarderakhsh, H Kim, H Seo
IEEE Transactions on Computers, 2017
192017
The system can't perform the operation now. Try again later.
Articles 1–20