Cryptanalysis of full LowMC and LowMC-M with algebraic techniques
From MaRDI portal
Publication:2129003
DOI10.1007/978-3-030-84252-9_13zbMATH Open1487.94130OpenAlexW3090660998MaRDI QIDQ2129003FDOQ2129003
Authors: Fukang Liu, Takanori Isobe, Willi Meier
Publication date: 22 April 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84252-9_13
Recommendations
Cites Work
- Block ciphers that are easier to mask: how far can we go?
- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
- Parallel collision search with cryptanalytic applications
- Title not available (Why is that?)
- New attacks on Keccak-224 and Keccak-256
- Ciphers for MPC and FHE
- Optimized interpolation attacks on lowMC
- New collision attacks on round-reduced Keccak
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC
- Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function
- Conditional cube attack on reduced-round Keccak sponge function
- Non-full Sbox linearization: applications to collision attacks on round-reduced \textsc{keccak}
- Linear structures: applications to cryptanalysis of round-reduced \textsc{Keccak}
- Preimage attacks on round-reduced Keccak-224/256 via an allocating approach
- Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)
- Automatic verification of differential characteristics: application to reduced Gimli
- Higher-Order Cryptanalysis of LowMC
- Polytopic cryptanalysis
- Cryptanalysis of SP networks with partial non-linear layers
Cited In (13)
- Algebraic meet-in-the-middle attack on LowMC
- Differential power analysis of the Picnic signature scheme
- DORAM revisited: maliciously secure RAM-MPC with logarithmic overhead
- Algebraic attacks on round-reduced \textsc{Rain} and full \textsf{AIM-III}
- Coefficient grouping for complex affine layers
- A three-stage MITM attack on LowMC from a single plaintext-ciphertext pair
- A closer look at the S-box: deeper analysis of round-reduced ASCON-HASH
- Coefficient grouping: breaking Chaghri and more
- Algebraic attacks on Rasta and Dasta using low-degree equations
- Higher-Order Cryptanalysis of LowMC
- Meet-in-the-filter and dynamic counting with applications to \textsc{Speck}
- New cryptanalysis of LowMC with algebraic techniques
- The inverse of \(\chi\) and its applications to Rasta-like ciphers
Uses Software
This page was built for publication: Cryptanalysis of full LowMC and LowMC-M with algebraic techniques
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2129003)