WARP: Revisiting GFN for lightweight 128-bit block cipher S Banik, Z Bao, T Isobe, H Kubo, F Liu, K Minematsu, K Sakamoto, ...
Selected Areas in Cryptography: 27th International Conference, Halifax, NS …, 2021
52 2021 Cryptanalysis of full LowMC and LowMC-M with algebraic techniques F Liu, T Isobe, W Meier
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
36 2021 Automatic verification of differential characteristics: Application to reduced Gimli F Liu, T Isobe, W Meier
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
28 2020 Orthros: a low-latency PRF S Banik, T Isobe, F Liu, K Minematsu, K Sakamoto
IACR Transactions on Symmetric Cryptology, 37-77, 2021
21 2021 Algebraic meet-in-the-middle attack on LowMC F Liu, S Sarkar, G Wang, W Meier, T Isobe
International Conference on the Theory and Application of Cryptology and …, 2022
20 2022 Rocca: an efficient AES-based encryption scheme for beyond 5G K Sakamoto, F Liu, Y Nakano, S Kiyomoto, T Isobe
IACR Transactions on Symmetric Cryptology, 1-30, 2021
19 2021 Algebraic attacks on round-reduced Keccak F Liu, T Isobe, W Meier, Z Yang
Information Security and Privacy: 26th Australasian Conference, ACISP 2021 …, 2021
19 2021 Algebraic attacks on rasta and dasta using low-degree equations F Liu, S Sarkar, W Meier, T Isobe
International Conference on the Theory and Application of Cryptology and …, 2021
17 2021 New low-memory algebraic attacks on LowMC in the picnic setting F Liu, W Meier, S Sarkar, T Isobe
IACR Transactions on Symmetric Cryptology, 102-122, 2022
16 2022 Coefficient grouping: Breaking chaghri and more F Liu, R Anand, L Wang, W Meier, T Isobe
Annual International Conference on the Theory and Applications of …, 2023
14 2023 Cube-based cryptanalysis of Subterranean-SAE F Liu, T Isobe, W Meier
IACR Transactions on Symmetric Cryptology, 192-222, 2019
13 2019 Weak keys in reduced AEGIS and tiaoxin F Liu, T Isobe, W Meier, K Sakamoto
Cryptology ePrint Archive, 2021
11 2021 Efficient collision attack frameworks for RIPEMD-160 F Liu, C Dobraunig, F Mendel, T Isobe, G Wang, Z Cao
Annual International Cryptology Conference, 117-149, 2019
11 2019 Algebraic attacks on RAIN and AIM using equivalent representations F Liu, M Mahzoun, M Øygarden, W Meier
Cryptology ePrint Archive, 2023
10 2023 The Inverse of and Its Applications to Rasta-Like Ciphers F Liu, S Sarkar, W Meier, T Isobe
Journal of Cryptology 35 (4), 28, 2022
10 2022 Algebraic attacks on round-reduced keccak/xoodoo F Liu, T Isobe, W Meier, Z Yang
Cryptology ePrint Archive, 2020
10 2020 Cryptanalysis of 48-step RIPEMD-160 G Wang, Y Shen, F Liu
IACR Transactions on Symmetric Cryptology, 177-202, 2017
10 2017 Exploiting weak diffusion of Gimli: Improved distinguishers and preimage attacks F Liu, T Isobe, W Meier
IACR Transactions on Symmetric Cryptology, 185-216, 2021
9 2021 Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi J Hoki, T Isobe, R Ito, F Liu, K Sakamoto
Journal of Information Security and Applications 65, 103100, 2022
8 2022 Atom: a stream cipher with double key filter S Banik, A Caforio, T Isobe, F Liu, W Meier, K Sakamoto, S Sarkar
IACR Transactions on Symmetric Cryptology, 5-36, 2021
8 2021