What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Fukang Liu
Google Scholar
43
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/crypto
New Collision Attacks on Round-Reduced SHA-512.
Yingxin Li
Fukang Liu
Gaoli Wang
Haifeng Qian
Keting Jia
Xiangyu Kong
2024
journals/tches
Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption.
Ravi Anand
Subhadeep Banik
Andrea Caforio
Tatsuya Ishikawa
Takanori Isobe
Fukang Liu
Kazuhiko Minematsu
Mostafizar Rahman
Kosei Sakamoto
2024
journals/tosc
Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions.
Fukang Liu
Abul Kalam
Santanu Sarkar
Willi Meier
2024
journals/tosc
Opening the Blackbox: Collision Attacks on Round-Reduced Tip5, Tip4, Tip4' and Monolith.
Fukang Liu
Katharina Koschatko
Lorenzo Grassi
Hailun Yan
Shiyao Chen
Subhadeep Banik
Willi Meier
2024
conf/eurocrypt
New Records in Collision Attacks on SHA-2.
Yingxin Li
Fukang Liu
Gaoli Wang
2024
conf/asiacrypt
Modelling Ciphers with Overdefined Systems of Quadratic Equations: Application to Friday, Vision, RAIN and Biscuit.
Fukang Liu
Mohammad Mahzoun
Willi Meier
2024
conf/asiacrypt
The First Practical Collision for 31-Step SHA-256.
Yingxin Li
Fukang Liu
Gaoli Wang
Xiaoyang Dong
Siwei Sun
2024
conf/sacrypt
Minimize the Randomness in Rasta-Like Designs: How Far Can We Go? - Application to Pasta.
Lorenzo Grassi
Fukang Liu
Christian Rechberger
Fabian Schmid
Roman Walch
Qingju Wang
2023
journals/tches
Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input.
Takanori Isobe
Ryoma Ito
Fukang Liu
Kazuhiko Minematsu
Motoki Nakahashi
Kosei Sakamoto
Rentaro Shiba
2023
journals/tosc
Automating Collision Attacks on RIPEMD-160.
Yingxin Li
Fukang Liu
Gaoli Wang
2023
journals/tosc
Algebraic Attacks on RAIN and AIM Using Equivalent Representations.
Fukang Liu
Mohammad Mahzoun
Morten Øygarden
Willi Meier
2023
conf/acisp
Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security.
Motoki Nakahashi
Rentaro Shiba
Ravi Anand
Mostafizar Rahman
Kosei Sakamoto
Fukang Liu
Takanori Isobe
2023
conf/crypto
Coefficient Grouping for Complex Affine Layers.
Fukang Liu
Lorenzo Grassi
Clémence Bouvier
Willi Meier
Takanori Isobe
2023
conf/esorics
An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation.
Ravi Anand
Subhadeep Banik
Andrea Caforio
Kazuhide Fukushima
Takanori Isobe
Shinsaku Kiyomoto
Fukang Liu
Yuto Nakano
Kosei Sakamoto
Nobuyuki Takeuchi
2023
conf/eurocrypt
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP.
Fukang Liu
Gaoli Wang
Santanu Sarkar
Ravi Anand
Willi Meier
Yingxin Li
Takanori Isobe
2023
conf/eurocrypt
Coefficient Grouping: Breaking Chaghri and More.
Fukang Liu
Ravi Anand
Libo Wang
Willi Meier
Takanori Isobe
2023
conf/sacrypt
A Closer Look at the S-Box: Deeper Analysis of Round-Reduced ASCON-HASH.
Xiaorui Yu
Fukang Liu
Gaoli Wang
Siwei Sun
Willi Meier
2022
journals/istr
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi.
Jin Hoki
Takanori Isobe
Ryoma Ito
Fukang Liu
Kosei Sakamoto
2022
journals/tosc
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting.
Fukang Liu
Willi Meier
Santanu Sarkar
Takanori Isobe
2022
journals/tosc
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences.
Fukang Liu
Willi Meier
Santanu Sarkar
Gaoli Wang
Ryoma Ito
Takanori Isobe
2022
journals/joc
The Inverse of χ and Its Applications to Rasta-Like Ciphers.
Fukang Liu
Santanu Sarkar
Willi Meier
Takanori Isobe
2022
conf/asiacrypt
Algebraic Meet-in-the-Middle Attack on LowMC.
Fukang Liu
Santanu Sarkar
Gaoli Wang
Willi Meier
Takanori Isobe
2021
journals/istr
Bit-wise cryptanalysis on AND-RX permutation Friet-PC.
Ryoma Ito
Rentaro Shiba
Kosei Sakamoto
Fukang Liu
Takanori Isobe
2021
journals/tosc
Atom: A Stream Cipher with Double Key Filter.
Subhadeep Banik
Andrea Caforio
Takanori Isobe
Fukang Liu
Willi Meier
Kosei Sakamoto
Santanu Sarkar
2021
journals/tosc
Weak Keys in Reduced AEGIS and Tiaoxin.
Fukang Liu
Takanori Isobe
Willi Meier
Kosei Sakamoto
2021
journals/tosc
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives.
Andrea Caforio
Subhadeep Banik
Yosuke Todo
Willi Meier
Takanori Isobe
Fukang Liu
Bin Zhang
2021
journals/tosc
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G.
Kosei Sakamoto
Fukang Liu
Yuto Nakano
Shinsaku Kiyomoto
Takanori Isobe
2021
journals/tosc
Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks.
Fukang Liu
Takanori Isobe
Willi Meier
2021
journals/tosc
Orthros: A Low-Latency PRF.
Subhadeep Banik
Takanori Isobe
Fukang Liu
Kazuhiko Minematsu
Kosei Sakamoto
2021
conf/acisp
Algebraic Attacks on Round-Reduced Keccak.
Fukang Liu
Takanori Isobe
Willi Meier
Zhonghao Yang
2021
conf/acisp
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V.
Jin Hoki
Takanori Isobe
Ryoma Ito
Fukang Liu
Kosei Sakamoto
2021
conf/crypto
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques.
Fukang Liu
Takanori Isobe
Willi Meier
2021
conf/asiacrypt
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations.
Fukang Liu
Santanu Sarkar
Willi Meier
Takanori Isobe
2020
conf/crypto
Automatic Verification of Differential Characteristics: Application to Reduced Gimli.
Fukang Liu
Takanori Isobe
Willi Meier
2020
conf/sacrypt
WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher.
Subhadeep Banik
Zhenzhen Bao
Takanori Isobe
Hiroyasu Kubo
Fukang Liu
Kazuhiko Minematsu
Kosei Sakamoto
Nao Shibata
Maki Shigeri
2019
journals/tosc
Cube-Based Cryptanalysis of Subterranean-SAE.
Fukang Liu
Takanori Isobe
Willi Meier
2019
journals/tosc
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160.
Fukang Liu
Christoph Dobraunig
Florian Mendel
Takanori Isobe
Gaoli Wang
Zhenfu Cao
2019
conf/crypto
Efficient Collision Attack Frameworks for RIPEMD-160.
Fukang Liu
Christoph Dobraunig
Florian Mendel
Takanori Isobe
Gaoli Wang
Zhenfu Cao
2019
conf/iwsec
Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods.
Fukang Liu
Takanori Isobe
2019
conf/iwsec
Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm.
Fukang Liu
Zhenfu Cao
Gaoli Wang
2019
conf/sacrypt
Iterative Differential Characteristic of TRIFLE-BC.
Fukang Liu
Takanori Isobe
2017
journals/tosc
Cryptanalysis of 48-step RIPEMD-160.
Gaoli Wang
Yanzhao Shen
Fukang Liu
2017
conf/asiacrypt
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160.
Fukang Liu
Florian Mendel
Gaoli Wang
Coauthors
Abul Kalam
(1)
Andrea Caforio
(4)
Bin Zhang
(1)
Christian Rechberger
(1)
Christoph Dobraunig
(2)
Clémence Bouvier
(1)
Fabian Schmid
(1)
Florian Mendel
(3)
Fukang Liu
(43)
Gaoli Wang
(13)
Haifeng Qian
(1)
Hailun Yan
(1)
Hiroyasu Kubo
(1)
Jin Hoki
(2)
Katharina Koschatko
(1)
Kazuhide Fukushima
(1)
Kazuhiko Minematsu
(4)
Keting Jia
(1)
Kosei Sakamoto
(12)
Libo Wang
(1)
Lorenzo Grassi
(3)
Maki Shigeri
(1)
Mohammad Mahzoun
(2)
Morten Øygarden
(1)
Mostafizar Rahman
(2)
Motoki Nakahashi
(2)
Nao Shibata
(1)
Nobuyuki Takeuchi
(1)
Qingju Wang
(1)
Ravi Anand
(5)
Rentaro Shiba
(3)
Roman Walch
(1)
Ryoma Ito
(5)
Santanu Sarkar
(8)
Shinsaku Kiyomoto
(2)
Shiyao Chen
(1)
Siwei Sun
(2)
Subhadeep Banik
(7)
Takanori Isobe
(30)
Tatsuya Ishikawa
(1)
Willi Meier
(21)
Xiangyu Kong
(1)
Xiaorui Yu
(1)
Xiaoyang Dong
(1)
Yanzhao Shen
(1)
Yingxin Li
(5)
Yosuke Todo
(1)
Yuto Nakano
(2)
Zhenfu Cao
(3)
Zhenzhen Bao
(1)
Zhonghao Yang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to