On the homomorphic computation of symmetric cryptographic primitives
From MaRDI portal
Publication:2870083
Recommendations
Cited in
(15)- Homomorphic public-key cryptosystems and encrypting Boolean circuits
- Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}
- Improved homomorphic evaluation for hash function based on TFHE
- Universally Composable Symbolic Analysis for Two-Party Protocols Based on Homomorphic Encryption
- Homomorphic operation of block cipher circuits based on MGSW15 scheme
- Revisiting homomorphic encryption schemes for finite fields
- Homomorphic evaluation of lattice-based symmetric encryption schemes
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- Homomorphic AES evaluation using the modified LTV scheme
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Practical Parameters for Somewhat Homomorphic Encryption (SHE) Schemes on Binary Circuits
- CLAASP: a cryptographic library for the automated analysis of symmetric primitives
- On the computational hardness of the code equivalence problem in cryptography
- An algebraic approach to symmetric linear layers in cryptographic primitives
This page was built for publication: On the homomorphic computation of symmetric cryptographic primitives
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2870083)