Algebraic attacks on Rasta and Dasta using low-degree equations
From MaRDI portal
Publication:6157492
DOI10.1007/978-3-030-92062-3_8zbMath1514.94115OpenAlexW3196520766MaRDI QIDQ6157492
Fukang Liu, Takanori Isobe, Santanu Sarkar, Willi Meier
Publication date: 12 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-92062-3_8
Related Items (4)
Coefficient grouping: breaking Chaghri and more ⋮ Algebraic meet-in-the-middle attack on LowMC ⋮ Coefficient grouping for complex affine layers ⋮ The inverse of \(\chi\) and its applications to Rasta-like ciphers
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A new efficient algorithm for computing Gröbner bases \((F_4)\)
- Rasta: a cipher with low ANDdepth and few ANDs per bit
- Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- On a generalization of substitution-permutation networks: the HADES design strategy
- Cryptanalysis of full LowMC and LowMC-M with algebraic techniques
- Feistel structures for MPC, and more
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC
- Gaussian elimination is not optimal
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- Optimized Interpolation Attacks on LowMC
- Higher-Order Cryptanalysis of LowMC
- Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts
- Cryptanalysis of the FLIP Family of Stream Ciphers
- Ciphers for MPC and FHE
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
- Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
- Algebraic Immunity of S-Boxes and Augmented Functions
- Fast Exhaustive Search for Polynomial Systems in ${\mathbb{F}_2}$
- Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks
- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
- Beating Brute Force for Systems of Polynomial Equations over Finite Fields
- Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
- Keccak
- Advances in Cryptology - CRYPTO 2003
- Fast Software Encryption
This page was built for publication: Algebraic attacks on Rasta and Dasta using low-degree equations