Cryptanalysis of full LowMC and LowMC-M with algebraic techniques
From MaRDI portal
Publication:2129003
Recommendations
Cites work
- scientific article; zbMATH DE number 1942409 (Why is no real title available?)
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC
- Automatic verification of differential characteristics: application to reduced Gimli
- Block ciphers that are easier to mask: how far can we go?
- Ciphers for MPC and FHE
- Conditional cube attack on reduced-round Keccak sponge function
- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
- Cryptanalysis of SP networks with partial non-linear layers
- Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)
- Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function
- Higher-Order Cryptanalysis of LowMC
- Linear structures: applications to cryptanalysis of round-reduced \textsc{Keccak}
- New attacks on Keccak-224 and Keccak-256
- New collision attacks on round-reduced Keccak
- Non-full Sbox linearization: applications to collision attacks on round-reduced \textsc{keccak}
- Optimized interpolation attacks on lowMC
- Parallel collision search with cryptanalytic applications
- Polytopic cryptanalysis
- Preimage attacks on round-reduced Keccak-224/256 via an allocating approach
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
Cited in
(13)- A closer look at the S-box: deeper analysis of round-reduced ASCON-HASH
- Higher-Order Cryptanalysis of LowMC
- Coefficient grouping for complex affine layers
- Differential power analysis of the Picnic signature scheme
- The inverse of \(\chi\) and its applications to Rasta-like ciphers
- DORAM revisited: maliciously secure RAM-MPC with logarithmic overhead
- A three-stage MITM attack on LowMC from a single plaintext-ciphertext pair
- Coefficient grouping: breaking Chaghri and more
- Algebraic meet-in-the-middle attack on LowMC
- Algebraic attacks on round-reduced \textsc{Rain} and full \textsf{AIM-III}
- New cryptanalysis of LowMC with algebraic techniques
- Meet-in-the-filter and dynamic counting with applications to \textsc{Speck}
- Algebraic attacks on Rasta and Dasta using low-degree equations
This page was built for publication: Cryptanalysis of full LowMC and LowMC-M with algebraic techniques
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2129003)