Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
From MaRDI portal
Publication:2102068
Recommendations
- Constructing and deconstructing intentional weaknesses in symmetric ciphers
- Cryptanalysis of chosen symmetric homomorphic schemes
- An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security
- On the homomorphic computation of symmetric cryptographic primitives
- On the optimality of non-linear computations for symmetric key primitives
- A survey of symbolic methods in computational analysis of cryptographic systems
- scientific article; zbMATH DE number 1759792
- An Operation-Centered Approach to Fault Detection in Symmetric Cryptography Ciphers
- “Provable” Security against Differential and Linear Cryptanalysis
- scientific article; zbMATH DE number 1759791
Cites work
- scientific article; zbMATH DE number 2089131 (Why is no real title available?)
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC
- Ciphers for MPC and FHE
- Cryptanalysis of SP networks with partial non-linear layers
- Distinguishers for the compression function and output transformation of Hamsi-256
- Feistel structures for MPC, and more
- Higher Order Derivatives and Differential Cryptanalysis
- Higher order differentiation over finite fields with applications to generalising the cube attack
- Higher-Order Cryptanalysis of LowMC
- Higher-order differential properties of Keccak and Luffa
- Keccak
- Known-Key Distinguishers for Some Block Ciphers
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- On a generalization of substitution-permutation networks: the HADES design strategy
- On construction of involutory MDS matrices from Vandermonde matrices in \(\mathrm{GF}(2^q)\)
- On the Indifferentiability of the Sponge Construction
- Optimized interpolation attacks on lowMC
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- Rasta: a cipher with low ANDdepth and few ANDs per bit
- Sponge-based pseudo-random number generators
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- The first collision for full SHA-1
- The hash function \texttt{BLAKE}
- Towards stream ciphers for efficient FHE with low-noise ciphertexts
Cited in
(26)- Interpolation cryptanalysis of unbalanced Feistel networks with low degree round functions
- Algebraic meet-in-the-middle attack on LowMC
- Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}
- Cryptanalysis of a privacy preserving auditing for data integrity protocol from TrustCom 2013
- Algebraic-differential attacks on a family of arithmetization-oriented symmetric ciphers
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC
- Transciphering framework for approximate homomorphic encryption
- Cryptanalysis of Ciminion
- Related-key differential cryptanalysis of GMiMC used in post-quantum signatures
- \textsc{Poseidon}2: a faster version of the \textsc{Poseidon} hash function
- \texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications
- Coefficient grouping for complex affine layers
- Security of the Poseidon hash function against non-binary differential and linear attacks
- Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes
- \(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryption
- Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- Mind the middle layer: the HADES design strategy revisited
- Coefficient grouping: breaking Chaghri and more
- On the field-based division property: applications to MiMC, Feistel MiMC and GMiMC
- Algebraic attacks on Rasta and Dasta using low-degree equations
- New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions
- On the algebraic degree of iterated power functions
- The inverse of \(\chi\) and its applications to Rasta-like ciphers
- Linear cryptanalysis and its variants with fast Fourier transformation technique on MPC/FHE/ZK-friendly \(\mathbb{F}_p\)-based ciphers
This page was built for publication: Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2102068)