Algebraic meet-in-the-middle attack on LowMC
From MaRDI portal
Publication:6135398
DOI10.1007/978-3-031-22963-3_8zbMath1519.94161MaRDI QIDQ6135398
Fukang Liu, Takanori Isobe, Willi Meier, Gaoli Wang, Santanu Sarkar
Publication date: 25 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Related Items (3)
Coefficient grouping: breaking Chaghri and more ⋮ Algebraic meet-in-the-middle attack on LowMC ⋮ Coefficient grouping for complex affine layers
Cites Work
- Rasta: a cipher with low ANDdepth and few ANDs per bit
- Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- On a generalization of substitution-permutation networks: the HADES design strategy
- Cryptanalysis of full LowMC and LowMC-M with algebraic techniques
- Feistel structures for MPC, and more
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- Optimized Interpolation Attacks on LowMC
- Higher-Order Cryptanalysis of LowMC
- Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts
- Cryptanalysis of the FLIP Family of Stream Ciphers
- Cryptanalysis of SP Networks with Partial Non-Linear Layers
- Ciphers for MPC and FHE
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
- The interpolation attack on block ciphers
- Algebraic meet-in-the-middle attack on LowMC
- Algebraic attacks on Rasta and Dasta using low-degree equations
- New attacks on LowMC instances with a single plaintext/ciphertext pair
This page was built for publication: Algebraic meet-in-the-middle attack on LowMC