关注
Fukang Liu
Fukang Liu
在 m.titech.ac.jp 的电子邮件经过验证
标题
引用次数
引用次数
年份
WARP: Revisiting GFN for lightweight 128-bit block cipher
S Banik, Z Bao, T Isobe, H Kubo, F Liu, K Minematsu, K Sakamoto, ...
Selected Areas in Cryptography: 27th International Conference, Halifax, NS …, 2021
522021
Cryptanalysis of full LowMC and LowMC-M with algebraic techniques
F Liu, T Isobe, W Meier
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
392021
Automatic verification of differential characteristics: application to reduced gimli
F Liu, T Isobe, W Meier
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
312020
Rocca: an efficient AES-based encryption scheme for beyond 5G
K Sakamoto, F Liu, Y Nakano, S Kiyomoto, T Isobe
IACR Transactions on Symmetric Cryptology, 1-30, 2021
252021
Algebraic attacks on round-reduced Keccak
F Liu, T Isobe, W Meier, Z Yang
Information Security and Privacy: 26th Australasian Conference, ACISP 2021 …, 2021
222021
Orthros: a low-latency PRF
S Banik, T Isobe, F Liu, K Minematsu, K Sakamoto
IACR Transactions on Symmetric Cryptology, 37-77, 2021
212021
Algebraic meet-in-the-middle attack on LowMC
F Liu, S Sarkar, G Wang, W Meier, T Isobe
International Conference on the Theory and Application of Cryptology and …, 2022
202022
Algebraic attacks on rasta and dasta using low-degree equations
F Liu, S Sarkar, W Meier, T Isobe
International Conference on the Theory and Application of Cryptology and …, 2021
192021
Coefficient grouping: Breaking chaghri and more
F Liu, R Anand, L Wang, W Meier, T Isobe
Annual International Conference on the Theory and Applications of …, 2023
182023
New low-memory algebraic attacks on LowMC in the picnic setting
F Liu, W Meier, S Sarkar, T Isobe
IACR Transactions on Symmetric Cryptology, 102-122, 2022
172022
Cube-based cryptanalysis of Subterranean-SAE
F Liu, T Isobe, W Meier
IACR Transactions on Symmetric Cryptology, 192-222, 2019
132019
Algebraic attacks on RAIN and AIM using equivalent representations
F Liu, M Mahzoun, M Øygarden, W Meier
Cryptology ePrint Archive, 2023
122023
The Inverse of and Its Applications to Rasta-Like Ciphers
F Liu, S Sarkar, W Meier, T Isobe
Journal of Cryptology 35 (4), 28, 2022
122022
Weak keys in reduced AEGIS and tiaoxin
F Liu, T Isobe, W Meier, K Sakamoto
Cryptology ePrint Archive, 2021
122021
Efficient collision attack frameworks for RIPEMD-160
F Liu, C Dobraunig, F Mendel, T Isobe, G Wang, Z Cao
Annual International Cryptology Conference, 117-149, 2019
122019
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi
J Hoki, T Isobe, R Ito, F Liu, K Sakamoto
Journal of Information Security and Applications 65, 103100, 2022
112022
Algebraic attacks on round-reduced keccak/xoodoo
F Liu, T Isobe, W Meier, Z Yang
Cryptology ePrint Archive, 2020
112020
Cryptanalysis of 48-step RIPEMD-160
G Wang, Y Shen, F Liu
IACR Transactions on Symmetric Cryptology, 177-202, 2017
102017
Atom: a stream cipher with double key filter
S Banik, A Caforio, T Isobe, F Liu, W Meier, K Sakamoto, S Sarkar
IACR Transactions on Symmetric Cryptology, 5-36, 2021
92021
Rocca: an efficient AES-based encryption scheme for beyond 5G (full version)
K Sakamoto, F Liu, Y Nakano, S Kiyomoto, T Isobe
Cryptology ePrint Archive, 2022
82022
系统目前无法执行此操作,请稍后再试。
文章 1–20