Distributed E-voting and E-bidding systems based on smart contract R Tso, ZY Liu, JH Hsiao Electronics 8 (4), 422, 2019 | 64 | 2019 |
Malware image classification using one-shot learning with siamese networks SC Hsiao, DY Kao, ZY Liu, R Tso Procedia Computer Science 159, 1863-1871, 2019 | 58 | 2019 |
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation ZY Liu, YF Tseng, R Tso, M Mambo, YC Chen Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 40 | 2022 |
An improved non-interactive zero-knowledge range proof for decentralized applications YC Tsai, R Tso, ZY Liu, K Chen 2019 IEEE International Conference on Decentralized Applications and …, 2019 | 23 | 2019 |
Public-key authenticated encryption with keyword search: A generic construction and its quantum-resistant instantiation ZY Liu, YF Tseng, R Tso, M Mambo, YC Chen The Computer Journal 65 (10), 2828-2844, 2022 | 22 | 2022 |
Identity-certifying authority-aided identity-based searchable encryption framework in cloud systems ZY Liu, YF Tseng, R Tso, YC Chen, M Mambo IEEE Systems Journal 16 (3), 4629-4640, 2022 | 21 | 2022 |
Cryptanalysis of a round optimal lattice-based multisignature scheme ZY Liu, YF Tseng, R Tso Information Processing Letters 182, 106364, 2023 | 13 | 2023 |
Designated-ciphertext Searchable Encryption ZY Liu, YF Tseng, R Tso, M Mambo Journal of Information Security and Applications 58, 102709, 2021 | 10 | 2021 |
Partially Blind ECDSA Scheme and Its Application to Bitcoin H Huang, ZY Liu, R Tso 2021 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2021 | 8 | 2021 |
Identity-based blind multisignature from lattices R Tso, ZY Liu, YF Tseng IEEE Access 7, 182916-182923, 2019 | 8 | 2019 |
Quantum‐resistant anonymous identity‐based encryption with traceable identities ZY Liu, YF Tseng, R Tso, M Mambo, YC Chen IET Information Security 16 (2), 111-126, 2022 | 6* | 2022 |
Defense against N-pixel Attacks based on Image Reconstruction ZY Liu, PS Wang, SC Hsiao, R Tso Proceedings of the 8th International Workshop on Security in Blockchain and …, 2020 | 6 | 2020 |
Cryptanalysis of "FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things" ZY Liu, YF Tseng, R Tso IACR Cryptol. ePrint Arch. 2020, 651, 2020 | 6 | 2020 |
Practical inner product encryption with constant private key YF Tseng, ZY Liu, R Tso Applied Sciences 10 (23), 8669, 2020 | 5 | 2020 |
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT CY Lee, ZY Liu, R Tso, YF Tseng Journal of Systems Architecture 130, 102642, 2022 | 4 | 2022 |
Extension of elliptic curve qu–vanstone certificates and their applications ZY Liu, YF Tseng, R Tso, PS Wang, QW Su Journal of Information Security and Applications 67, 103176, 2022 | 4 | 2022 |
Notes on a lattice-based proxy-oriented identity-based encryption with keyword search ZY Liu, YF Tseng, R Tso, CY Lee | 4 | 2021 |
Improved proxy re-encryption scheme with equality test CC Yang, R Tso, ZY Liu, JC Hsu, YF Tseng 2021 16th Asia Joint Conference on Information Security (AsiaJCIS), 37-44, 2021 | 3 | 2021 |
PrivGRU: Privacy-preserving GRU inference using additive secret sharing SC Hsiao, ZY Liu, R Tso, DY Kao, CM Chen Journal of Intelligent & Fuzzy Systems 38 (5), 5627-5638, 2020 | 3 | 2020 |
Signcryption from NTRU lattices without random oracles ZY Liu, R Tso, YF Tseng, M Mambo 2019 14th Asia Joint Conference on Information Security (AsiaJCIS), 134-141, 2019 | 3 | 2019 |