The inverse of and its applications to Rasta-like ciphers
From MaRDI portal
Publication:2089404
Recommendations
Cites work
- scientific article; zbMATH DE number 2151220 (Why is no real title available?)
- scientific article; zbMATH DE number 7561519 (Why is no real title available?)
- A new efficient algorithm for computing Gröbner bases (F₄)
- Algebraic attacks on Rasta and Dasta using low-degree equations
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- Beating brute force for systems of polynomial equations over finite fields
- Ciphers for MPC and FHE
- Cryptanalysis of full LowMC and LowMC-M with algebraic techniques
- Cryptanalysis of the FLIP family of stream ciphers
- Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)
- Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
- Efficient algorithms for solving overdefined systems of multivariate polynomial equations
- Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\)
- Feistel structures for MPC, and more
- Gaussian elimination is not optimal
- Higher-Order Cryptanalysis of LowMC
- Ideals, Varieties, and Algorithms
- Keccak
- Linear structures: applications to cryptanalysis of round-reduced \textsc{Keccak}
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- On a generalization of substitution-permutation networks: the HADES design strategy
- Optimized interpolation attacks on lowMC
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- Rasta: a cipher with low ANDdepth and few ANDs per bit
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Towards stream ciphers for efficient FHE with low-noise ciphertexts
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
Cited in
(7)- Rasta: a cipher with low ANDdepth and few ANDs per bit
- APPLICATIONS OF THE DRAZIN INVERSE TO THE HILL CRYPTOGRAPHIC SYSTEM. PART II.
- Algebraic properties of the maps \(\chi_n\)
- Coefficient grouping for complex affine layers
- Algebraic attacks on Rasta and Dasta using low-degree equations
- Algebraic structure of the iterates of \(\chi \)
- The state diagram of $$\chi $$
This page was built for publication: The inverse of \(\chi\) and its applications to Rasta-like ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2089404)