The inverse of and its applications to Rasta-like ciphers
From MaRDI portal
Publication:2089404
DOI10.1007/S00145-022-09439-XzbMATH Open1498.94071OpenAlexW4301185346WikidataQ121224730 ScholiaQ121224730MaRDI QIDQ2089404FDOQ2089404
Authors: Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe
Publication date: 6 October 2022
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-022-09439-x
Recommendations
Cites Work
- Keccak
- Ideals, Varieties, and Algorithms
- A new efficient algorithm for computing Gröbner bases \((F_4)\)
- Gaussian elimination is not optimal
- Title not available (Why is that?)
- Efficient algorithms for solving overdefined systems of multivariate polynomial equations
- Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\)
- Ciphers for MPC and FHE
- Optimized interpolation attacks on lowMC
- Rasta: a cipher with low ANDdepth and few ANDs per bit
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- Feistel structures for MPC, and more
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC
- Towards stream ciphers for efficient FHE with low-noise ciphertexts
- Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- Beating brute force for systems of polynomial equations over finite fields
- Linear structures: applications to cryptanalysis of round-reduced \textsc{Keccak}
- Cryptanalysis of the FLIP family of stream ciphers
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- On a generalization of substitution-permutation networks: the HADES design strategy
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- Higher-Order Cryptanalysis of LowMC
- Title not available (Why is that?)
- Cryptanalysis of full LowMC and LowMC-M with algebraic techniques
- Algebraic attacks on Rasta and Dasta using low-degree equations
Cited In (7)
- APPLICATIONS OF THE DRAZIN INVERSE TO THE HILL CRYPTOGRAPHIC SYSTEM. PART II.
- Rasta: a cipher with low ANDdepth and few ANDs per bit
- Algebraic properties of the maps \(\chi_n\)
- Coefficient grouping for complex affine layers
- Algebraic attacks on Rasta and Dasta using low-degree equations
- Algebraic structure of the iterates of \(\chi \)
- The state diagram of $$\chi $$
Uses Software
This page was built for publication: The inverse of \(\chi\) and its applications to Rasta-like ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2089404)