Fukang Liu

Orcid: 0000-0002-8915-3382

According to our database1, Fukang Liu authored at least 70 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Dual stage black-box adversarial attack against vision transformer.
Int. J. Mach. Learn. Cybern., August, 2024

Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions.
IACR Trans. Symmetric Cryptol., 2024

Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Background-focused contrastive learning for unpaired image-to-image translation.
J. Electronic Imaging, 2024

Modelling Ciphers with Overdefined Systems of Quadratic Equations: Application to Friday, Vision, RAIN and Biscuit.
IACR Cryptol. ePrint Arch., 2024

Opening the Blackbox: Collision Attacks on Round-Reduced Tip5, Tip4, Tip4' and Monolith.
IACR Cryptol. ePrint Arch., 2024

New Records in Collision Attacks on SHA-2.
IACR Cryptol. ePrint Arch., 2024

Minimize the Randomness in Rasta-Like Designs: How Far Can We Go?
IACR Cryptol. ePrint Arch., 2024

Opt2Skill: Imitating Dynamically-feasible Whole-Body Trajectories for Versatile Humanoid Loco-Manipulation.
CoRR, 2024

SkinGrip: An Adaptive Soft Robotic Manipulator with Capacitive Sensing for Whole-Limb Bathing Assistance.
CoRR, 2024

2023
Hairstyle transfer via manipulating decoupled latent codes of StyleGAN2.
Comput. Graph., November, 2023

High-fidelity GAN inversion by frequency domain guidance.
Comput. Graph., August, 2023

Hybrid Robotic Grasping With a Soft Multimodal Gripper and a Deep Multistage Learning Scheme.
IEEE Trans. Robotics, June, 2023

Algebraic Attacks on RAIN and AIM Using Equivalent Representations.
IACR Trans. Symmetric Cryptol., 2023

Automating Collision Attacks on RIPEMD-160.
IACR Trans. Symmetric Cryptol., 2023

Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Contrastive knowledge-augmented self-distillation approach for few-shot learning.
J. Electronic Imaging, 2023

A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH.
IACR Cryptol. ePrint Arch., 2023

Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP.
IACR Cryptol. ePrint Arch., 2023

Algebraic Attacks on RAIN and AIM Using Equivalent Representations.
IACR Cryptol. ePrint Arch., 2023

Coefficient Grouping for Complex Affine Layers.
IACR Cryptol. ePrint Arch., 2023

New Records in Collision Attacks on RIPEMD-160 and SHA-256.
IACR Cryptol. ePrint Arch., 2023

Areion: Highly-Efficient Permutations and Its Applications (Extended Version).
IACR Cryptol. ePrint Arch., 2023

BAKSHEESH: Similar Yet Different From GIFT.
IACR Cryptol. ePrint Arch., 2023

An Efficient Frequency Domain Separation Network for Paired and Unpaired Image Super-Resolution.
Proceedings of the International Joint Conference on Neural Networks, 2023

An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation.
Proceedings of the Computer Security - ESORICS 2023, 2023

Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences.
IACR Trans. Symmetric Cryptol., 2022

New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting.
IACR Trans. Symmetric Cryptol., 2022

The Inverse of χ and Its Applications to Rasta-Like Ciphers.
J. Cryptol., 2022

Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi.
J. Inf. Secur. Appl., 2022

Integral and impossible-differential attacks on the reduced-round Lesamnta-LW-BC.
IET Inf. Secur., 2022

Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version).
IACR Cryptol. ePrint Arch., 2022

Algebraic Meet-in-the-Middle Attack on LowMC.
IACR Cryptol. ePrint Arch., 2022

Coefficient Grouping: Breaking Chaghri and More.
IACR Cryptol. ePrint Arch., 2022

An 풪(n) Algorithm for Coefficient Grouping.
IACR Cryptol. ePrint Arch., 2022

Characterization of a Meso-Scale Wearable Robot for Bathing Assistance.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2022

2021
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G.
IACR Trans. Symmetric Cryptol., 2021

Weak Keys in Reduced AEGIS and Tiaoxin.
IACR Trans. Symmetric Cryptol., 2021

Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks.
IACR Trans. Symmetric Cryptol., 2021

Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives.
IACR Trans. Symmetric Cryptol., 2021

Orthros: A Low-Latency PRF.
IACR Trans. Symmetric Cryptol., 2021

Atom: A Stream Cipher with Double Key Filter.
IACR Trans. Symmetric Cryptol., 2021

Bit-wise cryptanalysis on AND-RX permutation Friet-PC.
J. Inf. Secur. Appl., 2021

MILP-Aided Security Evaluation of Differential Attacks on KCipher-2.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Finding Practical Distinguishers for ZUC-256 Using Modular Differences.
IACR Cryptol. ePrint Arch., 2021

Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations.
IACR Cryptol. ePrint Arch., 2021

A Simple Algebraic Attack on 3-Round LowMC.
IACR Cryptol. ePrint Arch., 2021

Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V.
IACR Cryptol. ePrint Arch., 2021

Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Algebraic Attacks on Round-Reduced Keccak.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Algebraic Attacks on Round-Reduced Keccak/Xoodoo.
IACR Cryptol. ePrint Arch., 2020

Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques.
IACR Cryptol. ePrint Arch., 2020

Automatic Verification of Differential Characteristics: Application to Reduced Gimli.
IACR Cryptol. ePrint Arch., 2020

Exploiting Weak Diffusion of Gimli: A Full-Round Distinguisher and Reduced-Round Preimage Attacks.
IACR Cryptol. ePrint Arch., 2020

WARP : Revisiting GFN for Lightweight 128-bit Block Cipher.
IACR Cryptol. ePrint Arch., 2020

Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160.
Des. Codes Cryptogr., 2020

A Privacy-Preserving Friend Recommendation Mechanism for Online Social Networks.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

2019
Cube-Based Cryptanalysis of Subterranean-SAE.
IACR Trans. Symmetric Cryptol., 2019

New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160.
IACR Trans. Symmetric Cryptol., 2019

Preimages and Collisions for Up to 5-Round Gimli-Hash Using Divide-and-Conquer Methods.
IACR Cryptol. ePrint Arch., 2019

Cryptanalysis of Subterranean-SAE.
IACR Cryptol. ePrint Arch., 2019

Iterative Differential Characteristic of TRIFLE-BC.
IACR Cryptol. ePrint Arch., 2019

Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm.
Proceedings of the Advances in Information and Computer Security, 2019

Efficient Collision Attack Frameworks for RIPEMD-160.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm.
IACR Cryptol. ePrint Arch., 2018

Efficient Collision Attack Frameworks for RIPEMD-160.
IACR Cryptol. ePrint Arch., 2018

2017
Cryptanalysis of 48-step RIPEMD-160.
IACR Trans. Symmetric Cryptol., 2017

Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160.
IACR Cryptol. ePrint Arch., 2017


  Loading...