Profil

LIU Zhe

Main Referenced Co-authors
GROSZSCHÄDL, Johann  (18)
Seo, Hwajeong (13)
Kim, Howon (10)
Choi, Jongseok (4)
Hu, Zhi (3)
Main Referenced Keywords
Elliptic Curve Cryptography (8); Multiple-Precision Arithmetic (7); Twisted Edwards Curve (4); Wireless Sensor Networks (4); ECDH Key Exchange (3);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Applied Security and Information Assurance Group (APSIA) (1)
Main Referenced Disciplines
Computer science (32)

Publications (total 32)

The most downloaded
1207 downloads
Liu, Z., Seo, H., Groszschädl, J., & Kim, H. (2013). Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes. In S. Qing, J. Zhou, ... D. Liu (Eds.), Information and Communications Security - 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings (pp. 302-317). Springer Verlag. doi:10.1007/978-3-319-02726-5_22 https://hdl.handle.net/10993/12934

The most cited

93 citations (Scopus®)

Liu, Z., Choo, K.-K. R., & Groszschädl, J. (February 2018). Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography. IEEE Communications Magazine, 56 (2), 158-162. doi:10.1109/MCOM.2018.1700330 https://hdl.handle.net/10993/37496

Groszschädl, J., Liu, Z., Hu, Z., Su, C., & Zhou, L. (2019). Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism. In Proceedings of the 8th International Workshop on Secure Internet of Things 2019 (SIoT 2019) (pp. 1-8). IEEE. doi:10.1109/SIOT48044.2019.9637091
Peer reviewed

Ghatpande, S., Groszschädl, J., & Liu, Z. (2018). A Family of Lightweight Twisted Edwards Curves for the Internet of Things. In O. Blazy & C. Y. Yeun (Eds.), Information Security Theory and Practice, 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Proceedings (pp. 193-206). Springer Verlag. doi:10.1007/978-3-030-20074-9_14
Peer reviewed

Liu, Z., Choo, K.-K. R., & Groszschädl, J. (February 2018). Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography. IEEE Communications Magazine, 56 (2), 158-162. doi:10.1109/MCOM.2018.1700330
Peer Reviewed verified by ORBi

Seo, H., Liu, Z., Park, T., Kwon, H., Lee, S., & Kim, H. (2017). Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors. In The 20th Annual International Conference on Information Security and Cryptology - ICISC2017.
Peer reviewed

Meng, W., Lee, W., Liu, Z., Su, C., & Li, Y. (2017). Evaluating the Impact of Juice Filming Charging Attack in Practical Environments. In The 20th Annual International Conference on Information Security and Cryptology - ICISC2017.
Peer reviewed

Xinwei, G., Li, L., Jintai, D., Jiqiang, L., Rv, S., & Liu, Z. (2017). Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite. In The 13th International Conference on Information Security Practice and Experience - ISPEC 2017.
Peer reviewed

Liu, Z., Longa, P., Pereira, G., Reparaz, O., & Seo, H. (2017). FourQ on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks. In N. Homma & W. Fischer (Ed.), International Conference on Cryptographic Hardware and Embedded Systems - CHES2017 (pp. 665-686).
Peer reviewed

Liu, Z., Järvinen, K., Liu, W., & Seo, H. (2017). Multiprecision Multiplication on ARMv8. In IEEE 24th Symposium on Computer Arithmetic - ARITH24 (pp. 10-17).
Peer reviewed

Zuo, C., Shao, J., Liu, Z., Ling, Y., & Wei, G. (2017). Hidden-Token Searchable Public-Key Encryption. In The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications - IEEE TrustCom-17.
Peer reviewed

Meng, W., Lee, W., Au, M. H., & Liu, Z. (2017). Exploring Effect of Location Number on Map-Based Graphical Password Authentication. In 22nd Australasian Conference on Information Security and Privacy - ACISP2017.
Peer reviewed

Liu, Z., Groszschädl, J., Hu, Z., Järvinen, K., Wang, H., & Verbauwhede, I. (May 2017). Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things. IEEE Transactions on Computers, 66 (5), 773-785. doi:10.1109/TC.2016.2623609
Peer Reviewed verified by ORBi

Seo, H., Liu, Z., Groszschädl, J., & Kim, H. (December 2016). Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation. Security and Communication Networks, 9 (18), 5401-5411. doi:10.1002/sec.1706
Peer reviewed

Galindo, D., Groszschädl, J., Liu, Z., Vadnala, P. K., & Venkatesh, S. V. (September 2016). Implementation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism. Journal of Cryptographic Engineering, 6 (3), 229-238. doi:10.1007/s13389-016-0121-x
Peer reviewed

Liu, Z., Groszschädl, J., Li, L., & Xu, Q. (2016). Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes. In J. K. Liu & R. Steinfeld (Eds.), Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I (pp. 94-112). Springer Verlag. doi:10.1007/978-3-319-40253-6_6
Peer reviewed

Liu, Z., Seo, H., Groszschädl, J., & Kim, H. (July 2016). Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes. IEEE Transactions on Information Forensics and Security, 11 (7), 1385-1397. doi:10.1109/TIFS.2015.2491261
Peer reviewed

Liu, Z. (2015). Lightweight Public-Key Cryptography for Wireless Sensor Nodes [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/24365

Liu, Z., Seo, H., Roy, S. S., Groszschädl, J., Kim, H., & Verbauwhede, I. (2015). Efficient Ring-LWE Encryption on 8-bit AVR Processors. In T. Güneysu & H. Handschuh (Eds.), Cryptographic Hardware and Embedded Systems - CHES 2015, 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings (pp. 663-682). Springer Verlag. doi:10.1007/978-3-662-48324-4_33
Peer reviewed

Liu, Z., Seo, H., Hu, Z., Huang, X., & Groszschädl, J. (2015). Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks. In F. Bao, S. Miller, J. Zhou, ... G.-J. Ahn (Eds.), ASIACCS'15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, April 14-17, 2015, Singapore (pp. 145-153). ACM Press. doi:10.1145/2714576.2714608
Peer reviewed

Liu, Z., Seo, H., Groszschädl, J., & Kim, H. (2014). Reverse Product-Scanning Multiplication and Squaring on 8-bit AVR Processors. In L. C. K. Hui, S. Qing, E. Shi, ... S.-M. Yiu (Eds.), Information and Communications Security - 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014. Proceedings (pp. 158–175). Springer Verlag. doi:10.1007/978-3-319-21966-0_12
Peer reviewed

Seo, H., Liu, Z., Groszschädl, J., Choi, J., & Kim, H. (2014). Montgomery Modular Multiplication on ARM-NEON Revisited. In J. Kim & J. Lee (Eds.), Information Security and Cryptology - ICISC 2014, 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers. Springer Verlag.
Peer reviewed

Yang, Y., Guan, Z., Liu, Z., & Chen, Z. (2014). Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks. In E. Shi & S. M. Yiu (Eds.), Information and Communications Security. Springer.
Peer reviewed

Seo, H., Liu, Z., Nogami, Y., Choi, J., & Kim, H. (2014). Improved Modular Multiplication for Optimal Prime Fields. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/19574.

Liu, Z., Wenger, E., & Groszschädl, J. (2014). MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks. In I. Boureanu, P. Owezarski, ... S. Vaudenay (Eds.), Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings (pp. 361-379). Springer Verlag. doi:10.1007/978-3-319-07536-5_22
Peer reviewed

Liu, Z., & Groszschädl, J. (2014). New Speed Records for Montgomery Modular Multiplication on 8-Bit AVR Microcontrollers. In D. Pointcheval & D. Vergnaud (Eds.), Progress in Cryptology - AFRICACRYPT 2014, 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings (pp. 215-234). Springer Verlag.
Peer reviewed

Cui, S., Liu, Z., Groszschädl, J., & Xu, Q. (2014). High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit. In X. Huang & J. Zhou (Eds.), Information Security Practice and Experience, 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings (pp. 202-216). Springer Verlag.
Peer reviewed

Seo, H., Liu, Z., Choi, J., & Kim, K. (December 2013). Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors. The 14th International Conference on Cryptology in India -- INDOCRYPT 2013, 8250, 227-243.
Peer reviewed

Seo, H., Liu, Z., Park, T., Kim, H., Lee, Y., Choi, J., & Kim, H. (2013). Parallel Implementation of LEA. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/12938.

Liu, Z., Seo, H., Groszschädl, J., & Kim, H. (2013). Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes. In S. Qing, J. Zhou, ... D. Liu (Eds.), Information and Communications Security - 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings (pp. 302-317). Springer Verlag. doi:10.1007/978-3-319-02726-5_22
Peer reviewed

Liu, Z., Groszschädl, J., & Wong, D. S. (2013). Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors. In D. Lin, S. Xu, ... M. Yung (Eds.), Information Security and Cryptology - 9th International Conference, INSCRYPT 2013, Guangzhou, China, November 27-30, 2013 (pp. 217-235). Springer Verlag. doi:10.1007/978-3-319-12087-4_14
Peer reviewed

Zhao, X., Guo, S., Zhang, F., Wang, T., Shi, Z., Liu, Z., & Gallais, J.-F. C. C. O. (November 2013). A Comprehensive Study of Multiple Deductions-based Algebraic Trace Driven Cache Attacks on AES. Computers and Security, 39, 173-189. doi:10.1016/j.cose.2013.07.002
Peer Reviewed verified by ORBi

Seo, H., Liu, Z., Kim, H., Park, T., Lee, Y., & Kim, H. (2013). Fixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication. Sensors. doi:10.3390/s130709483
Peer reviewed

Chu, D., Groszschädl, J., Liu, Z., Müller, V., & Zhang, Y. (2013). Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes. In K. Chen, Q. Xie, W. Qiu, S. Xu, ... Y. Zhao (Eds.), Proceedings of the first ACM Workshop on Asia Public-Key Cryptography (ASIAPKC 2013) (pp. 39-44). ACM Press. doi:10.1145/2484389.2484398
Peer reviewed

Contact ORBilu