Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
From MaRDI portal
Publication:2102068
DOI10.1007/978-3-030-56877-1_11zbMATH Open1504.94105OpenAlexW3011201404MaRDI QIDQ2102068FDOQ2102068
Authors: Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer
Publication date: 7 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56877-1_11
Recommendations
- Constructing and deconstructing intentional weaknesses in symmetric ciphers
- Cryptanalysis of chosen symmetric homomorphic schemes
- An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security
- On the homomorphic computation of symmetric cryptographic primitives
- On the optimality of non-linear computations for symmetric key primitives
- A survey of symbolic methods in computational analysis of cryptographic systems
- scientific article; zbMATH DE number 1759792
- An Operation-Centered Approach to Fault Detection in Symmetric Cryptography Ciphers
- “Provable” Security against Differential and Linear Cryptanalysis
- scientific article; zbMATH DE number 1759791
Cites Work
- The hash function \texttt{BLAKE}
- Keccak
- Higher-order differential properties of Keccak and Luffa
- Higher Order Derivatives and Differential Cryptanalysis
- On the Indifferentiability of the Sponge Construction
- Known-Key Distinguishers for Some Block Ciphers
- Higher order differentiation over finite fields with applications to generalising the cube attack
- On construction of involutory MDS matrices from Vandermonde matrices in \(\mathrm{GF}(2^q)\)
- Title not available (Why is that?)
- Ciphers for MPC and FHE
- Optimized interpolation attacks on lowMC
- Sponge-based pseudo-random number generators
- The first collision for full SHA-1
- Rasta: a cipher with low ANDdepth and few ANDs per bit
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- Feistel structures for MPC, and more
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC
- Towards stream ciphers for efficient FHE with low-noise ciphertexts
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- On a generalization of substitution-permutation networks: the HADES design strategy
- Higher-Order Cryptanalysis of LowMC
- Cryptanalysis of SP networks with partial non-linear layers
- Distinguishers for the compression function and output transformation of Hamsi-256
Cited In (26)
- Interpolation cryptanalysis of unbalanced Feistel networks with low degree round functions
- Algebraic meet-in-the-middle attack on LowMC
- Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}
- Cryptanalysis of a privacy preserving auditing for data integrity protocol from TrustCom 2013
- Algebraic-differential attacks on a family of arithmetization-oriented symmetric ciphers
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- Transciphering framework for approximate homomorphic encryption
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC
- Cryptanalysis of Ciminion
- Related-key differential cryptanalysis of GMiMC used in post-quantum signatures
- \textsc{Poseidon}2: a faster version of the \textsc{Poseidon} hash function
- \texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications
- Coefficient grouping for complex affine layers
- Security of the Poseidon hash function against non-binary differential and linear attacks
- Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes
- \(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryption
- Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- Mind the middle layer: the HADES design strategy revisited
- Coefficient grouping: breaking Chaghri and more
- On the field-based division property: applications to MiMC, Feistel MiMC and GMiMC
- Algebraic attacks on Rasta and Dasta using low-degree equations
- New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions
- On the algebraic degree of iterated power functions
- Linear cryptanalysis and its variants with fast Fourier transformation technique on MPC/FHE/ZK-friendly \(\mathbb{F}_p\)-based ciphers
- The inverse of \(\chi\) and its applications to Rasta-like ciphers
Uses Software
This page was built for publication: Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2102068)