Search

Your search keyword '"Liu, Fukang"' showing total 200 results

Search Constraints

Start Over You searched for: Author "Liu, Fukang" Remove constraint Author: "Liu, Fukang"
200 results on '"Liu, Fukang"'

Search Results

1. Opt2Skill: Imitating Dynamically-feasible Whole-Body Trajectories for Versatile Humanoid Loco-Manipulation

2. SkinGrip: An Adaptive Soft Robotic Manipulator with Capacitive Sensing for Whole-Limb Bathing Assistance

5. New Records in Collision Attacks on SHA-2

6. A Closer Look at the S-Box: Deeper Analysis of Round-Reduced ASCON-HASH

7. An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation

9. Characterization of a Meso-Scale Wearable Robot for Bathing Assistance

10. Hybrid Robotic Grasping with a Soft Multimodal Gripper and a Deep Multistage Learning Scheme

11. Coefficient Grouping for Complex Affine Layers

12. Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security

13. Coefficient Grouping: Breaking Chaghri and More

14. Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP

21. Failure Analysis of 304 Stainless Steel Plate Oil Cooler in Thermal Power Plant

25. Algebraic Meet-in-the-Middle Attack on LowMC

27. Modeling the Color Characteristics of Sapphires through the Statistical Method and Function Simulation Method.

28. Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations

29. Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V

30. Algebraic Attacks on Round-Reduced Keccak

31. Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques

32. WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher

37. Automatic Verification of Differential Characteristics: Application to Reduced Gimli

38. Iterative Differential Characteristic of TRIFLE-BC

43. Efficient Collision Attack Frameworks for RIPEMD-160

44. Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods

45. Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm

49. Atom: A Stream Cipher with Double Key Filter

50. Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G

Catalog

Books, media, physical & digital resources