Zi-Yuan Liu
zyliutw
Languages
Top Repositories
Establish a onion website with docker for CTF
Implement Password-based Authenticated Key Exchange from Lattices protocol
NCCU Bioinformatics Final Project
This is an impementation of paper, Lattice-based public key searchable encryption with fine-grained access control for edge computing.
A simple and elegant jekyll theme for academic personal homepage
基于机器学习的社工字典生成工具. A Machine Learning Approach for Password Guessing. The reproduction of (https://www.usenix.org/conference/usenixsecurity23/presentation/wang-ding-password-guessing)
Repositories
78A simple and elegant jekyll theme for academic personal homepage
基于机器学习的社工字典生成工具. A Machine Learning Approach for Password Guessing. The reproduction of (https://www.usenix.org/conference/usenixsecurity23/presentation/wang-ding-password-guessing)
NCCU Bioinformatics Final Project
Collection of LaTeX resources and examples.
Establish a onion website with docker for CTF
No description provided.
A modern LaTeX Beamer theme
初學者寫給初學者的演算法教學
The code implementation of Hierarchical Identity-based Puncturable Inner-product Functional Encryption
No description provided.
NCCU thesis Chinese version template
Implement Password-based Authenticated Key Exchange from Lattices protocol
Password-authenticated Decentralized Identities
This is an impementation of paper, Lattice-based public key searchable encryption with fine-grained access control for edge computing.
No description provided.
Ethereum JavaScript API
No description provided.
No description provided.
A library for lattice-based homomorphic encryption in Go
practical quantum-secure key encapsulation from generic lattices
Platform to host Capture the Flag competitions
Keras implementation of "One pixel attack for fooling deep neural networks" using differential evolution on Cifar10 and ImageNet
WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes
Software implementation of Gaussian sampling algorithms in C++ using NTL library.
No description provided.
C library for quantum-resistant cryptographic algorithms.
A curated list of cryptography resources and links.
A curated list of cryptography papers, articles, tutorials and howtos.
Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine for Malware Classification
First, we generate images from benign files and malware. Second, by using deep learning, we train a model to detect malware. Then, by the trained model, we detect malware. By using malware images and deep learning, we can detect malware fast since we do not need any static analysis or dynamic analysis.