The inverse of \(\chi\) and its applications to Rasta-like ciphers
From MaRDI portal
Publication:2089404
DOI10.1007/s00145-022-09439-xzbMath1498.94071OpenAlexW4301185346WikidataQ121224730 ScholiaQ121224730MaRDI QIDQ2089404
Santanu Sarkar, Willi Meier, Takanori Isobe, Fukang Liu
Publication date: 6 October 2022
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-022-09439-x
Related Items
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Keccak
- A new efficient algorithm for computing Gröbner bases \((F_4)\)
- Rasta: a cipher with low ANDdepth and few ANDs per bit
- Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- On a generalization of substitution-permutation networks: the HADES design strategy
- Cryptanalysis of full LowMC and LowMC-M with algebraic techniques
- Feistel structures for MPC, and more
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Gaussian elimination is not optimal
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- Optimized Interpolation Attacks on LowMC
- Higher-Order Cryptanalysis of LowMC
- Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts
- Cryptanalysis of the FLIP Family of Stream Ciphers
- Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
- Ciphers for MPC and FHE
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
- Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
- Fast Exhaustive Search for Polynomial Systems in ${\mathbb{F}_2}$
- Beating Brute Force for Systems of Polynomial Equations over Finite Fields
- Ideals, Varieties, and Algorithms
- Algebraic attacks on Rasta and Dasta using low-degree equations