The Inverse of χ and Its Applications to Rasta-Like Ciphers
Liu, Fukang, Sarkar, Santanu, Meier, Willi, Isobe, Takanori
Published in Journal of cryptology (01.10.2022)
Published in Journal of cryptology (01.10.2022)
Get full text
Journal Article
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting
Liu, Fukang, Meier, Willi, Sarkar, Santanu, Isobe, Takanori
Published in IACR Transactions on Symmetric Cryptology (09.09.2022)
Published in IACR Transactions on Symmetric Cryptology (09.09.2022)
Get full text
Journal Article
Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions
Liu, Fukang, Kalam, Abul, Sarkar, Santanu, Meier, Willi
Published in IACR Transactions on Symmetric Cryptology (01.03.2024)
Published in IACR Transactions on Symmetric Cryptology (01.03.2024)
Get full text
Journal Article
Automating Collision Attacks on RIPEMD-160
Li, Yingxin, Liu, Fukang, Wang, Gaoli
Published in IACR Transactions on Symmetric Cryptology (08.12.2023)
Published in IACR Transactions on Symmetric Cryptology (08.12.2023)
Get full text
Journal Article
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G
Sakamoto, Kosei, Liu, Fukang, Nakano, Yuto, Kiyomoto, Shinsaku, Isobe, Takanori
Published in IACR Transactions on Symmetric Cryptology (11.06.2021)
Published in IACR Transactions on Symmetric Cryptology (11.06.2021)
Get full text
Journal Article
Algebraic Attacks on RAIN and AIM Using Equivalent Representations
Liu, Fukang, Mahzoun, Mohammad, Øygarden, Morten, Meier, Willi
Published in IACR Transactions on Symmetric Cryptology (08.12.2023)
Published in IACR Transactions on Symmetric Cryptology (08.12.2023)
Get full text
Journal Article
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi
Hoki, Jin, Isobe, Takanori, Ito, Ryoma, Liu, Fukang, Sakamoto, Kosei
Published in Journal of information security and applications (01.03.2022)
Published in Journal of information security and applications (01.03.2022)
Get full text
Journal Article
Integral and impossible‐differential attacks on the reduced‐round Lesamnta‐LW‐BC
Shiba, Rentaro, Sakamoto, Kosei, Liu, Fukang, Minematsu, Kazuhiko, Isobe, Takanori
Published in IET information security (01.03.2022)
Published in IET information security (01.03.2022)
Get full text
Journal Article
Orthros: A Low-Latency PRF
Banik, Subhadeep, Isobe, Takanori, Liu, Fukang, Minematsu, Kazuhiko, Sakamoto, Kosei
Published in IACR Transactions on Symmetric Cryptology (19.03.2021)
Published in IACR Transactions on Symmetric Cryptology (19.03.2021)
Get full text
Journal Article
Bit-wise cryptanalysis on AND-RX permutation Friet-PC
Ito, Ryoma, Shiba, Rentaro, Sakamoto, Kosei, Liu, Fukang, Isobe, Takanori
Published in Journal of information security and applications (01.06.2021)
Published in Journal of information security and applications (01.06.2021)
Get full text
Journal Article
Weak Keys in Reduced AEGIS and Tiaoxin
Liu, Fukang, Isobe, Takanori, Meier, Willi, Sakamoto, Kosei
Published in IACR Transactions on Symmetric Cryptology (11.06.2021)
Published in IACR Transactions on Symmetric Cryptology (11.06.2021)
Get full text
Journal Article
Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks
Liu, Fukang, Isobe, Takanori, Meier, Willi
Published in IACR Transactions on Symmetric Cryptology (19.03.2021)
Published in IACR Transactions on Symmetric Cryptology (19.03.2021)
Get full text
Journal Article
Practical Application of Antidiabetic Efficacy of Lycium barbarum Polysaccharide in Patients with Type 2 Diabetes
Cai, Huizhen, Liu, Fukang, Zuo, Pingguo, Huang, Guiling, Song, Zhixiu, Wang, Tingting, Lu, Huixia, Guo, Fei, Han, Chao, Sun, Guiju
Published in Medicinal chemistry (Shp-sariqah, United Arab Emirates) (01.01.2015)
Published in Medicinal chemistry (Shp-sariqah, United Arab Emirates) (01.01.2015)
Get more information
Journal Article