Zhe Liu

Adresse postale Université du Luxembourg
2, Avenue de l'Université
L-4365 Esch-sur-Alzette

Research support technician in the Neuroinflammation group (Heneka Lab)

Last updated on: lundi 30 janvier 2023

powered by
orbilu.uni.lu

2019

Full Text
See detailFast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism
Groszschädl, Johann; Liu, Zhe; Hu, Zhi; Su, Chunhua; Zhou, Lu

in Proceedings of the 8th International Workshop on Secure Internet of Things 2019 (SIoT 2019) (2019, September)

Top of Page

2018

Full Text
See detailA Family of Lightweight Twisted Edwards Curves for the Internet of Things
Ghatpande, Sankalp; Groszschädl, Johann; Liu, Zhe

in Blazy, Olivier; Yeun, Chan Y. (Eds.) Information Security Theory and Practice, 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Proceedings (2018, December)

Full Text
See detailSecuring Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography
Liu, Zhe; Choo, Kim-Kwang Raymond; Groszschädl, Johann

in IEEE Communications Magazine (2018), 56(2), 158-162

Top of Page

2017

Full Text
See detailElliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things
Liu, Zhe; Groszschädl, Johann; Hu, Zhi; Järvinen, Kimmo; Wang, Husen; Verbauwhede, Ingrid

in IEEE Transactions on Computers (2017), 66(5), 773-785

Full Text
See detailMultiprecision Multiplication on ARMv8
Liu, Zhe; Järvinen, Kimmo; Liu, Weiqiang; Seo, Hwajeong

in IEEE 24th Symposium on Computer Arithmetic - ARITH24 (2017, August 01)

Full Text
See detailFourQ on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks
Liu, Zhe; Longa, Patrick; Pereira, Geovandro; Reparaz, Oscar; Seo, Hwajoneg

in Homma, Naofumi; Fischer, Wieland (Eds.) International Conference on Cryptographic Hardware and Embedded Systems - CHES2017 (2017, August 25)

Full Text
See detailExploring Effect of Location Number on Map-Based Graphical Password Authentication
Meng, Weizhi; Lee, Wanghao; Au, Man ho; Liu, Zhe

in 22nd Australasian Conference on Information Security and Privacy - ACISP2017 (2017, July 03)

Full Text
See detailEvaluating the Impact of Juice Filming Charging Attack in Practical Environments
Meng, Weizhi; Lee, Wanghao; Liu, Zhe; Su, Chunhua; Li, Yan

in The 20th Annual International Conference on Information Security and Cryptology - ICISC2017 (2017, December 01)

Full Text
See detailSecure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors
Seo, Hwajeong; Liu, Zhe; Park, Taehwan; Kwon, Hyeokchan; Lee, Sokjoon; Kim, Howon

in The 20th Annual International Conference on Information Security and Cryptology - ICISC2017 (2017, December 30)

Full Text
See detailFast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite
Xinwei, Gao; Li, Lin; Jintai, Ding; Jiqiang, Liu; Rv, Saraswathy; Liu, Zhe

in The 13th International Conference on Information Security Practice and Experience - ISPEC 2017 (2017, December 01)

Full Text
See detailHidden-Token Searchable Public-Key Encryption
Zuo, Cong; Shao, Jun; Liu, Zhe; Ling, Yun; Wei, Guiyi

in The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications - IEEE TrustCom-17 (2017, August)

Top of Page

2016

Full Text
See detailImplementation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism
Galindo, David; Groszschädl, Johann; Liu, Zhe; Vadnala, Praveen Kumar; Venkatesh, Srinivas Vivek

in Journal of Cryptographic Engineering (2016), 6(3), 229-238

Full Text
See detailEnergy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes
Liu, Zhe; Groszschädl, Johann; Li, Lin; Xu, Qiuliang

in Liu, Joseph K.; Steinfeld, Ron (Eds.) Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I (2016, July)

Full Text
See detailEfficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes
Liu, Zhe; Seo, Hwajeong; Groszschädl, Johann; Kim, Howon

in IEEE Transactions on Information Forensics and Security (2016), 11(7), 1385-1397

Full Text
See detailEfficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation
Seo, Hwajeong; Liu, Zhe; Groszschädl, Johann; Kim, Howon

in Security and Communication Networks (2016), 9(18), 5401-5411

Top of Page

2015

Full Text
See detailEfficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks
Liu, Zhe; Seo, Hwajeong; Hu, Zhi; Huang, Xinyi; Groszschädl, Johann

in Bao, Feng; Miller, Steven; Zhou, Jianying; Ahn, Gail-Joon (Eds.) ASIACCS'15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, April 14-17, 2015, Singapore (2015, April)

Full Text
See detailEfficient Ring-LWE Encryption on 8-bit AVR Processors
Liu, Zhe; Seo, Hwajeong; Roy, Sujoy Sinha; Groszschädl, Johann; Kim, Howon; Verbauwhede, Ingrid

in Güneysu, Tim; Handschuh, Helena (Eds.) Cryptographic Hardware and Embedded Systems - CHES 2015, 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings (2015, September)

Top of Page

2014

Full Text
See detailHigh-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit
Cui, Shujie; Liu, Zhe; Groszschädl, Johann; Xu, Qiuliang

in Huang, Xinyi; Zhou, Jianying (Eds.) Information Security Practice and Experience, 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings (2014, May)

Full Text
See detailNew Speed Records for Montgomery Modular Multiplication on 8-Bit AVR Microcontrollers
Liu, Zhe; Groszschädl, Johann

in Pointcheval, David; Vergnaud, Damien (Eds.) Progress in Cryptology - AFRICACRYPT 2014, 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings (2014, May)

Full Text
See detailReverse Product-Scanning Multiplication and Squaring on 8-bit AVR Processors
Liu, Zhe; Seo, Hwajeong; Groszschädl, Johann; Kim, Howon

in Hui, Lucas C. K.; Qing, Sihan; Shi, Elaine; Yiu, Siu-Ming (Eds.) Information and Communications Security - 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014. Proceedings (2014, December)

Full Text
See detailMoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks
Liu, Zhe; Wenger, Erich; Groszschädl, Johann

in Boureanu, Ioana; Owezarski, Philippe; Vaudenay, Serge (Eds.) Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings (2014, June)

Full Text
See detailMontgomery Modular Multiplication on ARM-NEON Revisited
Seo, Hwajeong; Liu, Zhe; Groszschädl, Johann; Choi, Jongseok; Kim, Howon

in Kim, Jongsung; Lee, Jooyoung (Eds.) Information Security and Cryptology - ICISC 2014, 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers (2014, December)

Full Text
See detailImproved Modular Multiplication for Optimal Prime Fields
Seo, Hwajeong; Liu, Zhe; Nogami, Yasuyuki; Choi, Jongseok; Kim, Howon

E-print/Working paper (2014)

Full Text
See detailProtecting Elliptic Curve Cryptography Against Memory Disclosure Attacks
Yang, Yang; Guan, Zhi; Liu, Zhe; Chen, Zhong

in Shi, Elaine; Yiu, S.M. (Eds.) Information and Communications Security (2014, December)

Top of Page

2013

Full Text
See detailTwisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes
Chu, Dalin; Groszschädl, Johann; Liu, Zhe; Müller, Volker; Zhang, Yang

in Chen, Kefei; Xie, Qi; Qiu, Weidong; Xu, Shouhuai; Zhao, Yunlei (Eds.) Proceedings of the first ACM Workshop on Asia Public-Key Cryptography (ASIAPKC 2013) (2013, May)

Full Text
See detailLow-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors
Liu, Zhe; Groszschädl, Johann; Wong, Duncan S.

in Lin, Dongdai; Xu, Shouhuai; Yung, Moti (Eds.) Information Security and Cryptology - 9th International Conference, INSCRYPT 2013, Guangzhou, China, November 27-30, 2013 (2013, November)

Full Text
See detailEfficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes
Liu, Zhe; Seo, Hwajeong; Groszschädl, Johann; Kim, Howon

in Qing, Sihan; Zhou, Jianying; Liu, Dongmei (Eds.) Information and Communications Security - 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings (2013, November)

Full Text
See detailMulti-precision Squaring for Public-Key Cryptography on Embedded Microprocessors
Seo, Hwajeong; Liu, Zhe; Choi, Jongseok; Kim, Kowon

in The 14th International Conference on Cryptology in India -- INDOCRYPT 2013 (2013), 8250

Full Text
See detailFixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication
Seo, Hwajeong; Liu, Zhe; Kim, Hyunjin; Park, Taehwan; Lee, Yeoncheol; Kim, Howon

in Sensors (2013)

See detailParallel Implementation of LEA
Seo, Hwajeong; Liu, Zhe; Park, Taehwan; Kim, Hyunjin; Lee, Yeoncheol; Choi, Jongseok; Kim, Howon

E-print/Working paper (2013)

Full Text
See detailA Comprehensive Study of Multiple Deductions-based Algebraic Trace Driven Cache Attacks on AES
Zhao, Xinjie; Guo, Shize; Zhang, Fan; Wang, Tao; Shi, Zhijie; Liu, Zhe; Gallais, Jean-Fran\c{c}ois

in Computers and Security (2013), 39

Top of Page