Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC
From MaRDI portal
Publication:2178862
DOI10.1007/978-3-030-34618-8_13zbMath1455.94104OpenAlexW2972668960MaRDI QIDQ2178862
Lorenzo Grassi, Carlos Cid, Reinhard Lüftenegger, Markus Schofnegger, Christian Rechberger, Martin R. Albrecht, Dmitry Khovratovich
Publication date: 11 May 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-34618-8_13
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Gröbner bases; other bases for ideals and modules (e.g., Janet and border bases) (13P10)
Related Items (17)
Cryptanalysis of full LowMC and LowMC-M with algebraic techniques ⋮ Boolean polynomials, BDDs and CRHS equations -- connecting the dots with CryptaPath ⋮ Coefficient grouping: breaking Chaghri and more ⋮ Cryptanalysis of Ciminion ⋮ Algebraic meet-in-the-middle attack on LowMC ⋮ Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato} ⋮ Algebraic attacks on Rasta and Dasta using low-degree equations ⋮ \textsc{Poseidon}2: a faster version of the \textsc{Poseidon} hash function ⋮ Coefficient grouping for complex affine layers ⋮ \texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications ⋮ An algebraic attack on ciphers with low-degree round functions: application to full MiMC ⋮ On the algebraic degree of iterated power functions ⋮ MARVELlous ⋮ \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields ⋮ The inverse of \(\chi\) and its applications to Rasta-like ciphers ⋮ Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems ⋮ On a generalization of substitution-permutation networks: the HADES design strategy
Uses Software
This page was built for publication: Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC