Higher-Order Cryptanalysis of LowMC
From MaRDI portal
Publication:2806764
DOI10.1007/978-3-319-30840-1_6zbMATH Open1384.94056OpenAlexW2485873601MaRDI QIDQ2806764FDOQ2806764
Authors: Christoph Dobraunig, Maria Eichlseder, Florian Mendel
Publication date: 19 May 2016
Published in: Information Security and Cryptology - ICISC 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-30840-1_6
Recommendations
- New cryptanalysis of LowMC with algebraic techniques
- Cryptanalysis of full LowMC and LowMC-M with algebraic techniques
- New attacks on LowMC instances with a single plaintext/ciphertext pair
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- Cryptanalysis of compact-LWE
- Algebraic meet-in-the-middle attack on LowMC
- Low probability differentials and the cryptanalysis of full-round CLEFIA-128
- Low order approximation of cipher functions
- Attacks on block ciphers of low algebraic degree
Cited In (20)
- Algebraic meet-in-the-middle attack on LowMC
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function
- Algebraic attacks on round-reduced \textsc{Rain} and full \textsf{AIM-III}
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- Transciphering framework for approximate homomorphic encryption
- Cryptanalysis of Ciminion
- A three-stage MITM attack on LowMC from a single plaintext-ciphertext pair
- New attacks on LowMC instances with a single plaintext/ciphertext pair
- Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes
- \(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryption
- Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch
- Mind the middle layer: the HADES design strategy revisited
- On a generalization of substitution-permutation networks: the HADES design strategy
- Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ
- Algebraic attacks on Rasta and Dasta using low-degree equations
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- New cryptanalysis of LowMC with algebraic techniques
- The inverse of \(\chi\) and its applications to Rasta-like ciphers
- Cryptanalysis of full LowMC and LowMC-M with algebraic techniques
This page was built for publication: Higher-Order Cryptanalysis of LowMC
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2806764)