WARP: Revisiting GFN for lightweight 128-bit block cipher S Banik, Z Bao, T Isobe, H Kubo, F Liu, K Minematsu, K Sakamoto, ... Selected Areas in Cryptography: 27th International Conference, Halifax, NS …, 2021 | 58 | 2021 |
Cryptanalysis of full LowMC and LowMC-M with algebraic techniques F Liu, T Isobe, W Meier Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021 | 44 | 2021 |
Rocca: an efficient AES-based encryption scheme for beyond 5G K Sakamoto, F Liu, Y Nakano, S Kiyomoto, T Isobe IACR Transactions on Symmetric Cryptology, 1-30, 2021 | 31 | 2021 |
Automatic verification of differential characteristics: application to reduced gimli F Liu, T Isobe, W Meier Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 31 | 2020 |
Orthros: a low-latency PRF S Banik, T Isobe, F Liu, K Minematsu, K Sakamoto IACR Transactions on Symmetric Cryptology, 37-77, 2021 | 30 | 2021 |
Algebraic meet-in-the-middle attack on LowMC F Liu, S Sarkar, G Wang, W Meier, T Isobe International Conference on the Theory and Application of Cryptology and …, 2022 | 24 | 2022 |
Algebraic attacks on rasta and dasta using low-degree equations F Liu, S Sarkar, W Meier, T Isobe International Conference on the Theory and Application of Cryptology and …, 2021 | 23 | 2021 |
Coefficient grouping: Breaking chaghri and more F Liu, R Anand, L Wang, W Meier, T Isobe Annual International Conference on the Theory and Applications of …, 2023 | 22 | 2023 |
Algebraic attacks on round-reduced Keccak F Liu, T Isobe, W Meier, Z Yang Information Security and Privacy: 26th Australasian Conference, ACISP 2021 …, 2021 | 22 | 2021 |
New low-memory algebraic attacks on LowMC in the picnic setting F Liu, W Meier, S Sarkar, T Isobe IACR Transactions on Symmetric Cryptology, 102-122, 2022 | 19 | 2022 |
Algebraic attacks on RAIN and AIM using equivalent representations F Liu, M Mahzoun, M Øygarden, W Meier Cryptology ePrint Archive, 2023 | 16 | 2023 |
Rocca: an efficient AES-based encryption scheme for beyond 5G (full version) K Sakamoto, F Liu, Y Nakano, S Kiyomoto, T Isobe Cryptology ePrint Archive, 2022 | 15 | 2022 |
Weak keys in reduced AEGIS and tiaoxin F Liu, T Isobe, W Meier, K Sakamoto Cryptology ePrint Archive, 2021 | 15 | 2021 |
The Inverse of and Its Applications to Rasta-Like Ciphers F Liu, S Sarkar, W Meier, T Isobe Journal of Cryptology 35 (4), 28, 2022 | 14 | 2022 |
Atom: a stream cipher with double key filter S Banik, A Caforio, T Isobe, F Liu, W Meier, K Sakamoto, S Sarkar IACR Transactions on Symmetric Cryptology, 5-36, 2021 | 13 | 2021 |
Cube-based cryptanalysis of Subterranean-SAE F Liu, T Isobe, W Meier IACR Transactions on Symmetric Cryptology, 192-222, 2019 | 13 | 2019 |
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi J Hoki, T Isobe, R Ito, F Liu, K Sakamoto Journal of Information Security and Applications 65, 103100, 2022 | 12 | 2022 |
Efficient collision attack frameworks for RIPEMD-160 F Liu, C Dobraunig, F Mendel, T Isobe, G Wang, Z Cao Annual International Cryptology Conference, 117-149, 2019 | 12 | 2019 |
Algebraic attacks on round-reduced keccak/xoodoo F Liu, T Isobe, W Meier, Z Yang Cryptology ePrint Archive, 2020 | 11 | 2020 |
Cryptanalysis of 48-step RIPEMD-160 G Wang, Y Shen, F Liu IACR Transactions on Symmetric Cryptology, 177-202, 2017 | 10 | 2017 |