Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
From MaRDI portal
Publication:2102068
DOI10.1007/978-3-030-56877-1_11zbMath1504.94105OpenAlexW3011201404MaRDI QIDQ2102068
Yu Sasaki, Anne Canteaut, María Naya-Plasencia, Itai Dinur, Yosuke Todo, Friedrich Wiemer, Gregor Leander, Gaëtan Leurent, Tim Beyne, Léo Perrin, Maria Eichlseder
Publication date: 7 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56877-1_11
Related Items
Interpolation cryptanalysis of unbalanced Feistel networks with low degree round functions, \(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryption, Coefficient grouping: breaking Chaghri and more, Cryptanalysis of Ciminion, Algebraic meet-in-the-middle attack on LowMC, On the field-based division property: applications to MiMC, Feistel MiMC and GMiMC, Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}, Algebraic attacks on Rasta and Dasta using low-degree equations, Transciphering framework for approximate homomorphic encryption, Related-key differential cryptanalysis of GMiMC used in post-quantum signatures, \textsc{Poseidon}2: a faster version of the \textsc{Poseidon} hash function, Coefficient grouping for complex affine layers, \texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications, On the algebraic degree of iterated power functions, \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields, Mind the middle layer: the HADES design strategy revisited, The inverse of \(\chi\) and its applications to Rasta-like ciphers, Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
Uses Software
Cites Work
- Unnamed Item
- On construction of involutory MDS matrices from Vandermonde matrices in \(\mathrm{GF}(2^q)\)
- The hash function \texttt{BLAKE}
- Rasta: a cipher with low ANDdepth and few ANDs per bit
- The first collision for full SHA-1
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- On a generalization of substitution-permutation networks: the HADES design strategy
- Feistel structures for MPC, and more
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC
- Higher order differentiation over finite fields with applications to generalising the cube attack
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Optimized Interpolation Attacks on LowMC
- Higher-Order Cryptanalysis of LowMC
- Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts
- Cryptanalysis of SP Networks with Partial Non-Linear Layers
- Ciphers for MPC and FHE
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
- Higher-Order Differential Properties of Keccak and Luffa
- Distinguishers for the Compression Function and Output Transformation of Hamsi-256
- Sponge-Based Pseudo-Random Number Generators
- Higher Order Derivatives and Differential Cryptanalysis
- Keccak
- Known-Key Distinguishers for Some Block Ciphers
- On the Indifferentiability of the Sponge Construction