Fukang Liu

Orcid: 0000-0002-0551-580X

According to our database1, Fukang Liu authored at least 78 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Opt2Skill: Imitating Dynamically-Feasible Whole-Body Trajectories for Versatile Humanoid Loco-Manipulation.
IEEE Robotics Autom. Lett., November, 2025

Contrastive local constraint for irregular image reconstruction and editability.
Vis. Comput., February, 2025

Practical Key Collision on AES and Kiasu-BC.
IACR Cryptol. ePrint Arch., 2025

Finding the Inverse of some Shift Invariant Transformations.
IACR Cryptol. ePrint Arch., 2025

Cryptanalysis of TFHE-friendly Cipher FRAST.
IACR Cryptol. ePrint Arch., 2025

New Collision Attacks on Round-Reduced SHA-512.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Dual stage black-box adversarial attack against vision transformer.
Int. J. Mach. Learn. Cybern., August, 2024

Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Background-focused contrastive learning for unpaired image-to-image translation.
J. Electronic Imaging, 2024

Opening the Blackbox: Collision Attacks on Round-Reduced Tip5, Tip4, Tip4' and Monolith.
IACR Cryptol. ePrint Arch., 2024

Automating Collision Attacks on RIPEMD-160.
IACR Cryptol. ePrint Arch., 2024

Minimize the Randomness in Rasta-Like Designs: How Far Can We Go?
IACR Cryptol. ePrint Arch., 2024

Opt2Skill: Imitating Dynamically-feasible Whole-Body Trajectories for Versatile Humanoid Loco-Manipulation.
CoRR, 2024

SkinGrip: An Adaptive Soft Robotic Manipulator with Capacitive Sensing for Whole-Limb Bathing Assistance.
CoRR, 2024

Minimize the Randomness in Rasta-Like Designs: How Far Can We Go? - Application to Pasta.
Proceedings of the Selected Areas in Cryptography - SAC 2024, 2024

New Records in Collision Attacks on SHA-2.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Modelling Ciphers with Overdefined Systems of Quadratic Equations: Application to Friday, Vision, RAIN and Biscuit.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

The First Practical Collision for 31-Step SHA-256.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Hairstyle transfer via manipulating decoupled latent codes of StyleGAN2.
Comput. Graph., November, 2023

High-fidelity GAN inversion by frequency domain guidance.
Comput. Graph., August, 2023

Hybrid Robotic Grasping With a Soft Multimodal Gripper and a Deep Multistage Learning Scheme.
IEEE Trans. Robotics, June, 2023

Algebraic Attacks on RAIN and AIM Using Equivalent Representations.
IACR Trans. Symmetric Cryptol., 2023

Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Contrastive knowledge-augmented self-distillation approach for few-shot learning.
J. Electronic Imaging, 2023

Algebraic Attacks on RAIN and AIM Using Equivalent Representations.
IACR Cryptol. ePrint Arch., 2023

Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions.
IACR Cryptol. ePrint Arch., 2023

New Records in Collision Attacks on RIPEMD-160 and SHA-256.
IACR Cryptol. ePrint Arch., 2023

Areion: Highly-Efficient Permutations and Its Applications (Extended Version).
IACR Cryptol. ePrint Arch., 2023

BAKSHEESH: Similar Yet Different From GIFT.
IACR Cryptol. ePrint Arch., 2023

A Closer Look at the S-Box: Deeper Analysis of Round-Reduced ASCON-HASH.
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023

An Efficient Frequency Domain Separation Network for Paired and Unpaired Image Super-Resolution.
Proceedings of the International Joint Conference on Neural Networks, 2023

Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Coefficient Grouping: Breaking Chaghri and More.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation.
Proceedings of the Computer Security - ESORICS 2023, 2023

Coefficient Grouping for Complex Affine Layers.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences.
IACR Trans. Symmetric Cryptol., 2022

Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi.
J. Inf. Secur. Appl., 2022

Integral and impossible-differential attacks on the reduced-round Lesamnta-LW-BC.
IET Inf. Secur., 2022

Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version).
IACR Cryptol. ePrint Arch., 2022

The Inverse of χ and Its Applications to Rasta-like Ciphers.
IACR Cryptol. ePrint Arch., 2022

New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting.
IACR Cryptol. ePrint Arch., 2022

An 풪(n) Algorithm for Coefficient Grouping.
IACR Cryptol. ePrint Arch., 2022

Characterization of a Meso-Scale Wearable Robot for Bathing Assistance.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2022

Algebraic Meet-in-the-Middle Attack on LowMC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G.
IACR Trans. Symmetric Cryptol., 2021

Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks.
IACR Trans. Symmetric Cryptol., 2021

Bit-wise cryptanalysis on AND-RX permutation Friet-PC.
J. Inf. Secur. Appl., 2021

MILP-Aided Security Evaluation of Differential Attacks on KCipher-2.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Finding Practical Distinguishers for ZUC-256 Using Modular Differences.
IACR Cryptol. ePrint Arch., 2021

Weak Keys in Reduced AEGIS and Tiaoxin.
IACR Cryptol. ePrint Arch., 2021

Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations.
IACR Cryptol. ePrint Arch., 2021

A Simple Algebraic Attack on 3-Round LowMC.
IACR Cryptol. ePrint Arch., 2021

Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives.
IACR Cryptol. ePrint Arch., 2021

Atom: A Stream Cipher with Double Key Filter.
IACR Cryptol. ePrint Arch., 2021

Orthros: A Low-Latency PRF.
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Algebraic Attacks on Round-Reduced Keccak.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Algebraic Attacks on Round-Reduced Keccak/Xoodoo.
IACR Cryptol. ePrint Arch., 2020

Exploiting Weak Diffusion of Gimli: A Full-Round Distinguisher and Reduced-Round Preimage Attacks.
IACR Cryptol. ePrint Arch., 2020

Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160.
Des. Codes Cryptogr., 2020

WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

A Privacy-Preserving Friend Recommendation Mechanism for Online Social Networks.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

Automatic Verification of Differential Characteristics: Application to Reduced Gimli.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Cube-Based Cryptanalysis of Subterranean-SAE.
IACR Trans. Symmetric Cryptol., 2019

Preimages and Collisions for Up to 5-Round Gimli-Hash Using Divide-and-Conquer Methods.
IACR Cryptol. ePrint Arch., 2019

Cryptanalysis of Subterranean-SAE.
IACR Cryptol. ePrint Arch., 2019

New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160.
IACR Cryptol. ePrint Arch., 2019

Iterative Differential Characteristic of TRIFLE-BC.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods.
Proceedings of the Advances in Information and Computer Security, 2019

Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm.
Proceedings of the Advances in Information and Computer Security, 2019

Efficient Collision Attack Frameworks for RIPEMD-160.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm.
IACR Cryptol. ePrint Arch., 2018

Efficient Collision Attack Frameworks for RIPEMD-160.
IACR Cryptol. ePrint Arch., 2018

2017
Cryptanalysis of 48-step RIPEMD-160.
IACR Trans. Symmetric Cryptol., 2017

Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017


  Loading...