Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}
From MaRDI portal
Publication:6145950
DOI10.1007/978-3-031-38548-3_11MaRDI QIDQ6145950FDOQ6145950
Authors: Lorenzo Grassi, Irati Manterola Ayala, Martha Norberg Hovd, Morten Øygarden, Håvard Raddum, Qingju Wang
Publication date: 2 February 2024
Published in: Advances in Cryptology – CRYPTO 2023 (Search for Journal in Brave)
Recommendations
- \(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryption
- scientific article; zbMATH DE number 1759791
- Algebraic attacks on Rasta and Dasta using low-degree equations
- On the homomorphic computation of symmetric cryptographic primitives
- Algebraic analysis of the Simon block cipher family
algebraic cryptanalysiscomposite moduluskey recovery attack\textsf{Rubato}arithmetization oriented primitives
Cites Work
- A new efficient algorithm for computing Gröbner bases \((F_4)\)
- Gaussian elimination is not optimal
- Title not available (Why is that?)
- Exact solution of linear equations using p-adic expansions
- Title not available (Why is that?)
- Higher Order Derivatives and Differential Cryptanalysis
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- Differential cryptanalysis of DES-like cryptosystems
- Efficient computation of zero-dimensional Gröbner bases by change of ordering
- Biclique Cryptanalysis of the Full AES
- Title not available (Why is that?)
- Title not available (Why is that?)
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- On polynomial functions (mod m)
- The Wide Trail Design Strategy
- The interpolation attack on block ciphers
- On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses
- Title not available (Why is that?)
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro
- Query-Efficient Algorithms for Polynomial Interpolation over Composites
- Permutation polynomials modulo \(2^w\)
- Polynomial interpolation over the residue rings \(\mathbb Z_n\)
- \(\mathrm{SPD}\mathbb {Z}_{2^k}\): efficient MPC \(\mod 2^k\) for dishonest majority
- Rasta: a cipher with low ANDdepth and few ANDs per bit
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- Factoring modular polynomials
- On polynomial functions Modulo \(p^e\) and faster bootstrapping for homomorphic encryption
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- Mind the middle layer: the HADES design strategy revisited
- On a generalization of substitution-permutation networks: the HADES design strategy
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- The complexity of MinRank
- \(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryption
- Transciphering framework for approximate homomorphic encryption
- Rinocchio: SNARKs for ring arithmetic
- Moz\(\mathbb{Z}_{2^k}\)arella: efficient vector-OLE and zero-knowledge proofs over \(\mathbb{Z}_{2^k}\)
- From Farfalle to \textsc{Megafono} via Ciminion: the PRF \textsc{Hydra} for MPC applications
- Towards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipher
This page was built for publication: Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6145950)