What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Xiangyu Liu
Google Scholar
15
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ctrsa
Universal Adaptor Signatures from Blackbox Multi-party Computation.
Michele Ciampi
Xiangyu Liu
Ioannis Tzannetos
Vassilis Zikas
2024
conf/asiacrypt
Adaptor Signatures: New Security Definition and a Generic Construction for NP Relations.
Xiangyu Liu
Ioannis Tzannetos
Vassilis Zikas
2023
conf/uss
Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android Systems.
Rui Li
Wenrui Diao
Shishuai Yang
Xiangyu Liu
Shanqing Guo
Kehuan Zhang
2023
conf/pkc
Fine-Grained Verifier NIZK and Its Applications.
Xiangyu Liu
Shengli Liu
Shuai Han
Dawu Gu
2023
conf/pkc
EKE Meets Tight Security in the Universally Composable Framework.
Xiangyu Liu
Shengli Liu
Shuai Han
Dawu Gu
2020
conf/acisp
Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications.
Xiangyu Liu
Shengli Liu
Dawu Gu
2020
conf/asiacrypt
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security.
Xiangyu Liu
Shengli Liu
Dawu Gu
Jian Weng
2017
journals/popets
Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU.
Zhe Zhou
Wenrui Diao
Xiangyu Liu
Zhou Li
Kehuan Zhang
Rui Liu
2016
conf/sp
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis.
Wenrui Diao
Xiangyu Liu
Zhou Li
Kehuan Zhang
2016
conf/wisec
Evading Android Runtime Analysis Through Detecting Programmed Interactions.
Wenrui Diao
Xiangyu Liu
Zhou Li
Kehuan Zhang
2015
conf/ccs
When Good Becomes Evil: Keystroke Inference with Smartwatch.
Xiangyu Liu
Zhe Zhou
Wenrui Diao
Zhou Li
Kehuan Zhang
2015
conf/sec
An Empirical Study on Android for Saving Non-shared Data on Public Storage.
Xiangyu Liu
Zhe Zhou
Wenrui Diao
Zhou Li
Kehuan Zhang
2015
conf/esorics
Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections.
Wenrui Diao
Xiangyu Liu
Zhe Zhou
Kehuan Zhang
Zhou Li
2014
conf/ccs
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone.
Wenrui Diao
Xiangyu Liu
Zhe Zhou
Kehuan Zhang
2014
conf/ccs
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound.
Zhe Zhou
Wenrui Diao
Xiangyu Liu
Kehuan Zhang
Coauthors
Dawu Gu
(4)
Ioannis Tzannetos
(2)
Jian Weng
(1)
Kehuan Zhang
(9)
Michele Ciampi
(1)
Rui Li
(1)
Rui Liu
(1)
Shanqing Guo
(1)
Shengli Liu
(4)
Shishuai Yang
(1)
Shuai Han
(2)
Vassilis Zikas
(2)
Wenrui Diao
(9)
Xiangyu Liu
(15)
Zhe Zhou
(6)
Zhou Li
(6)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to