Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
From MaRDI portal
Publication:4639486
Recommendations
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Towards stream ciphers for efficient FHE with low-noise ciphertexts
- Towards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipher
- On the homomorphic computation of symmetric cryptographic primitives
- Homomorphic evaluation of lattice-based symmetric encryption schemes
Cites work
- scientific article; zbMATH DE number 1583765 (Why is no real title available?)
- scientific article; zbMATH DE number 2009966 (Why is no real title available?)
- (Leveled) fully homomorphic encryption without bootstrapping
- A comparison of the homomorphic encryption schemes FV and YASHE
- A new variant of PMAC: beyond the birthday bound
- Algorithms in HElib
- Batch fully homomorphic encryption over the integers
- Ciphers for MPC and FHE
- Conditional Differential Cryptanalysis of Trivium and KATAN
- Conditional differential cryptanalysis of NLFSR-based cryptosystems
- Cryptanalysis of the two-dimensional circulation encryption algorithm
- Cube Attacks on Tweakable Black Box Polynomials
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- Fully homomorphic SIMD operations
- Fully homomorphic encryption using ideal lattices
- Homomorphic evaluation of the AES circuit
- Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks
- Introduction to modern cryptography.
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- ML confidential: machine learning on encrypted data
- Match box meet-in-the-middle attack against KATAN
- New Applications of Time Memory Data Tradeoffs
- New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
- On key recovery attacks against existing somewhat homomorphic encryption schemes
- On lightweight stream ciphers with shorter internal states
- On the Security of IV Dependent Stream Ciphers
- Optimized interpolation attacks on lowMC
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- Private computation on encrypted genomic data
- Scale-invariant fully homomorphic encryption over the integers
- Some (in)sufficient conditions for secure hybrid encryption
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- The interpolation attack on block ciphers
- TriviA: a fast and secure authenticated encryption scheme
- Trivium
- Two Trivial Attacks on Trivium
Cited in
(28)- Homomorphic evaluation of lattice-based symmetric encryption schemes
- The patching landscape of Elisabeth-4 and the mixed filter permutator paradigm
- Modeling for three-subset division property without unknown subset
- From unbalanced to perfect: implementation of low energy stream ciphers
- The algebraic FreeLunch: efficient Gröbner basis attacks against arithmetization-oriented primitives
- On the cryptographic properties of weightwise affine and weightwise quadratic functions
- Interpolation cryptanalysis of unbalanced Feistel networks with low degree round functions
- Transciphering, using FiLIP and TFHE for an efficient delegation of computation
- New cube distinguishers on NFSR-based stream ciphers
- An improved degree evaluation method of NFSR-based cryptosystems
- FASTA -- a stream cipher for fast FHE evaluation
- Coefficient grouping: breaking Chaghri and more
- The lower bound of the weightwise nonlinearity profile of a class of weightwise perfectly balanced functions
- Multi-user security bound for filter permutators in the random oracle model
- QUAD: A Practical Stream Cipher with Provable Security
- Correlation cube attacks: from weak-key distinguisher to key recovery
- Somewhat/fully homomorphic encryption: implementation progresses and challenges
- Conditional Cube Searching and Applications on Trivium-Variant Ciphers
- Practical and efficient FHE-based MPC
- Towards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipher
- How to compress encrypted data
- Improved filter permutators for efficient FHE: better instances and implementations
- Cryptanalysis of the FLIP family of stream ciphers
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- Algebraic attacks on Rasta and Dasta using low-degree equations
- Low-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2]\)
- Theoretical differential fault attacks on FLIP and FiLIP
This page was built for publication: Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4639486)