Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems (Q2102068): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-56877-1_11 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3011201404 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Feistel structures for MPC, and more / rank
 
Normal rank
Property / cites work
 
Property / cites work: MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Ciphers for MPC and FHE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distinguishers for the Compression Function and Output Transformation of Hamsi-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The hash function \texttt{BLAKE} / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of SP Networks with Partial Non-Linear Layers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sponge-Based Pseudo-Random Number Generators / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Indifferentiability of the Sponge Construction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Keccak / rank
 
Normal rank
Property / cites work
 
Property / cites work: Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Higher-Order Differential Properties of Keccak and Luffa / rank
 
Normal rank
Property / cites work
 
Property / cites work: Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimized Interpolation Attacks on LowMC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rasta: a cipher with low ANDdepth and few ANDs per bit / rank
 
Normal rank
Property / cites work
 
Property / cites work: Higher-Order Cryptanalysis of LowMC / rank
 
Normal rank
Property / cites work
 
Property / cites work: On a generalization of substitution-permutation networks: the HADES design strategy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Known-Key Distinguishers for Some Block Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3046344 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Higher Order Derivatives and Differential Cryptanalysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: On construction of involutory MDS matrices from Vandermonde matrices in \(\mathrm{GF}(2^q)\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Higher order differentiation over finite fields with applications to generalising the cube attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: The first collision for full SHA-1 / rank
 
Normal rank

Latest revision as of 01:14, 31 July 2024

scientific article
Language Label Description Also known as
English
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
scientific article

    Statements

    Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    7 December 2022
    0 references
    0 references
    hash functions
    0 references
    integrity proof systems
    0 references
    integral attacks
    0 references
    GMiMC
    0 references
    HadesMiMC
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references