MiMC
From MaRDI portal
swMATH44582MaRDI QIDQ5972442FDOQ5972442
Author name not available (Why is that?)
Official website: https://link.springer.com/chapter/10.1007/978-3-662-53887-6_7
Cited In (37)
- ginger-lib
- WAGE
- SPEck
- MARVELlous
- Interpolation cryptanalysis of unbalanced Feistel networks with low degree round functions
- Lightweight authenticated encryption mode suitable for threshold implementation
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- On the guaranteed number of activations in \(\mathsf{XS}\)-circuits
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC
- Boomerang uniformity of popular S-box constructions
- The \(t\)-wise independence of substitution-permutation networks
- CAPA
- Post-quantum ID-based ring signatures from symmetric-key primitives
- ISAP
- M4RI
- Keccak
- BLAKE
- SEAL
- SHARK
- libiop
- LowMC
- Compact privacy protocols from post-quantum and timed classical assumptions
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- Ciminion
- XKCP
- On a generalization of substitution-permutation networks: the HADES design strategy
- CPSNARKs-Set
- FreePDK45
- TinyGarble
- Lattigo
- maskVerif
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- SWIFFTX
- On the algebraic degree of iterated power functions
- New cryptanalysis of LowMC with algebraic techniques
- The inverse of \(\chi\) and its applications to Rasta-like ciphers
This page was built for software: MiMC