default search action
Yuejun Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Huaxin Wang, Yiwen Gao, Yuejun Liu, Qian Zhang, Yongbin Zhou:
In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium. Cybersecur. 7(1): 21 (2024) - [j10]Ziming Jiang, Yongbin Zhou, Yuejun Liu:
New partial key exposure attacks on RSA with additive exponent blinding. Cybersecur. 7(1): 26 (2024) - [j9]Ziming Jiang, Yongbin Zhou, Yuejun Liu:
Partial key exposure attacks on Prime Power RSA with non-consecutive blocks. Theor. Comput. Sci. 1019: 114845 (2024) - [c7]Mingyao Shao, Yuejun Liu, Yongbin Zhou:
Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond. AsiaCCS 2024 - [c6]Yong Liu, Yuejun Liu, Yongbin Zhou, Yiwen Gao, Zehua Qiao, Huaxin Wang:
A Novel Power Analysis Attack against CRYSTALS-Dilithium Implementation. ETS 2024: 1-6 - [i6]Yong Liu, Yuejun Liu, Yongbin Zhou, Yiwen Gao, Zehua Qiao, Huaxin Wang:
A Novel Power Analysis Attack against CRYSTALS-Dilithium Implementation. IACR Cryptol. ePrint Arch. 2024: 111 (2024) - [i5]Zehua Qiao, Yuejun Liu, Yongbin Zhou, Yuhan Zhao, Shuyi Chen:
Single Trace is All It Takes: Efficient Side-channel Attack on Dilithium. IACR Cryptol. ePrint Arch. 2024: 512 (2024) - 2023
- [j8]Haitian Yang, Xiang Meng, Xuan Zhao, Yan Wang, Yuejun Liu, Xiaoyu Kang, Jiahui Shen, Weiqing Huang:
CKDAN: Content and keystroke dual attention networks with pre-trained models for continuous authentication. Comput. Secur. 128: 103159 (2023) - [j7]Zehua Qiao, Yuejun Liu, Yongbin Zhou, Jingdian Ming, Chengbin Jin, Huizhong Li:
Practical Public Template Attack Attacks on CRYSTALS-Dilithium With Randomness Leakages. IEEE Trans. Inf. Forensics Secur. 18: 1-14 (2023) - [c5]Ya-nan Chen, Yiwen Gao, Yuejun Liu, Yongbin Zhou:
Low Latency Implementations of CRYSTALS-Dilithium for Cloud Applications. HPCC/DSS/SmartCity/DependSys 2023: 679-686 - [c4]Guanghui Liu, Yuejun Liu, Yongbin Zhou, Yiwen Gao:
Recovering Multi-prime RSA Keys with Erasures and Errors. ISPEC 2023: 266-283 - [i4]Mingyao Shao, Yuejun Liu, Yongbin Zhou:
Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond. IACR Cryptol. ePrint Arch. 2023: 887 (2023) - [i3]Zehua Qiao, Yuejun Liu, Yongbin Zhou, Mingyao Shao, Shuo Sun:
When NTT Meets SIS: Efficient Side-channel Attacks on Dilithium and Kyber. IACR Cryptol. ePrint Arch. 2023: 1866 (2023) - [i2]Huaxin Wang, Yiwen Gao, Yuejun Liu, Qian Zhang, Yongbin Zhou:
In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium. IACR Cryptol. ePrint Arch. 2023: 1891 (2023) - 2022
- [j6]Yuejun Liu, Yongbin Zhou, Rui Zhang, Yang Tao:
(Full) Leakage resilience of Fiat-Shamir signatures over lattices. Frontiers Comput. Sci. 16(5) (2022) - [j5]Sha Ding, Yong Xia, Xiaoqi Lin, Aokui Sun, Xianggang Li, Yuejun Liu:
A Theoretical Study of the Sensing Mechanism of a Schiff-Based Sensor for Fluoride. Sensors 22(10): 3958 (2022) - 2021
- [j4]Yuejun Liu, Yongbin Zhou, Shuo Sun, Tianyu Wang, Rui Zhang, Jingdian Ming:
On the Security of Lattice-Based Fiat-Shamir Signatures in the Presence of Randomness Leakage. IEEE Trans. Inf. Forensics Secur. 16: 1868-1879 (2021) - [c3]Tianyu Wang, Yuejun Liu, Jun Xu, Lei Hu, Yang Tao, Yongbin Zhou:
Integer LWE with Non-subgaussian Error and Related Attacks. ISC 2021: 3-25 - 2020
- [j3]Yuejun Liu, Liyong Ma, Yong Zhang:
Thyroid Extraction Based on Artificial Immune Network with Firefly Algorithm in Single Photon Emission Computed Tomography Image. J. Medical Imaging Health Informatics 10(3): 614-619 (2020) - [c2]Ti Wang, Yongbin Zhou, Hui Ma, Yuejun Liu, Rui Zhang:
Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack. Inscrypt 2020: 83-103
2010 – 2019
- 2019
- [j2]Liyong Ma, Chengkuan Ma, Yuejun Liu, Xuguang Wang:
Thyroid Diagnosis from SPECT Images Using Convolutional Neural Network with Optimization. Comput. Intell. Neurosci. 2019: 6212759:1-6212759:11 (2019) - [j1]Yuejun Liu, Rui Zhang, Yongbin Zhou:
Predicate encryption against master-key tampering attacks. Cybersecur. 2(1): 22 (2019) - [i1]Yuejun Liu, Yongbin Zhou, Shuo Sun, Tianyu Wang, Rui Zhang:
On Security of Fiat-Shamir Signatures over Lattice in the Presence of Randomness Leakage. IACR Cryptol. ePrint Arch. 2019: 715 (2019) - 2011
- [c1]Fang Wang, Zhilong Liu, Zhongjian Li, Yuejun Liu, Zuomin Wang, Maoyu Zheng:
Performance analysis of seasonal soil heat storage air conditioning system in solar ground coupled heat pump. EMEIT 2011: 1599-1602
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint