Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
From MaRDI portal
Publication:4639486
DOI10.1007/978-3-662-52993-5_16zbMATH Open1387.94071OpenAlexW2289561827MaRDI QIDQ4639486FDOQ4639486
Authors: Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey
Publication date: 9 May 2018
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-52993-5_16
Recommendations
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Towards stream ciphers for efficient FHE with low-noise ciphertexts
- Towards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipher
- On the homomorphic computation of symmetric cryptographic primitives
- Homomorphic evaluation of lattice-based symmetric encryption schemes
Cites Work
- Trivium
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- Homomorphic evaluation of the AES circuit
- Fully homomorphic encryption using ideal lattices
- (Leveled) fully homomorphic encryption without bootstrapping
- Conditional Differential Cryptanalysis of Trivium and KATAN
- Conditional differential cryptanalysis of NLFSR-based cryptosystems
- Cube Attacks on Tweakable Black Box Polynomials
- Title not available (Why is that?)
- Fully homomorphic SIMD operations
- A comparison of the homomorphic encryption schemes FV and YASHE
- Introduction to modern cryptography.
- Title not available (Why is that?)
- A new variant of PMAC: beyond the birthday bound
- The interpolation attack on block ciphers
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- Cryptanalysis of the two-dimensional circulation encryption algorithm
- Batch fully homomorphic encryption over the integers
- New Applications of Time Memory Data Tradeoffs
- TriviA: a fast and secure authenticated encryption scheme
- Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks
- Ciphers for MPC and FHE
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- Two Trivial Attacks on Trivium
- Optimized interpolation attacks on lowMC
- Some (in)sufficient conditions for secure hybrid encryption
- On the Security of IV Dependent Stream Ciphers
- Scale-invariant fully homomorphic encryption over the integers
- On lightweight stream ciphers with shorter internal states
- Algorithms in HElib
- Private computation on encrypted genomic data
- New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
- ML confidential: machine learning on encrypted data
- On key recovery attacks against existing somewhat homomorphic encryption schemes
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Match box meet-in-the-middle attack against KATAN
Cited In (28)
- On the cryptographic properties of weightwise affine and weightwise quadratic functions
- Towards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipher
- How to compress encrypted data
- Interpolation cryptanalysis of unbalanced Feistel networks with low degree round functions
- New cube distinguishers on NFSR-based stream ciphers
- Cryptanalysis of the FLIP family of stream ciphers
- Transciphering, using FiLIP and TFHE for an efficient delegation of computation
- Theoretical differential fault attacks on FLIP and FiLIP
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- Practical and efficient FHE-based MPC
- Low-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2]\)
- Homomorphic evaluation of lattice-based symmetric encryption schemes
- An improved degree evaluation method of NFSR-based cryptosystems
- The lower bound of the weightwise nonlinearity profile of a class of weightwise perfectly balanced functions
- Correlation cube attacks: from weak-key distinguisher to key recovery
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- From unbalanced to perfect: implementation of low energy stream ciphers
- FASTA -- a stream cipher for fast FHE evaluation
- The patching landscape of Elisabeth-4 and the mixed filter permutator paradigm
- Modeling for three-subset division property without unknown subset
- Coefficient grouping: breaking Chaghri and more
- Algebraic attacks on Rasta and Dasta using low-degree equations
- Somewhat/fully homomorphic encryption: implementation progresses and challenges
- The algebraic FreeLunch: efficient Gröbner basis attacks against arithmetization-oriented primitives
- Multi-user security bound for filter permutators in the random oracle model
- Conditional Cube Searching and Applications on Trivium-Variant Ciphers
- QUAD: A Practical Stream Cipher with Provable Security
- Improved filter permutators for efficient FHE: better instances and implementations
Uses Software
This page was built for publication: Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4639486)