Linear cryptanalysis and its variants with fast Fourier transformation technique on MPC/FHE/ZK-friendly F_p-based ciphers
From MaRDI portal
Publication:6535476
DOI10.1007/978-3-031-35486-1_2zbMATH Open1545.94079MaRDI QIDQ6535476FDOQ6535476
Authors: Zeyu Xu, Shiyao Chen, Meiqin Wang, Puwen Wei
Publication date: 11 January 2024
Recommendations
- Ciphers for MPC and FHE
- General application of FFT in cryptanalysis and improved attack on CAST-256
- Improving key-recovery in linear attacks: application to 28-round PRESENT
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- Zero-correlation linear cryptanalysis with FFT and improved attacks on ISO standards Camellia and CLEFIA
linear cryptanalysisdifferential-linear cryptanalysisfast Fourier transformationHADESMPC-friendly block ciphers
Cites Work
- DLCT: a new tool for differential-linear cryptanalysis
- An Algorithm for the Machine Calculation of Complex Fourier Series
- The complexity of theorem-proving procedures
- Title not available (Why is that?)
- PRESENT: An Ultra-Lightweight Block Cipher
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Improving the Time Complexity of Matsui’s Linear Cryptanalysis
- Differential cryptanalysis of DES-like cryptosystems
- Advances in Cryptology – CRYPTO 2004
- Linear hulls with correlation zero and linear cryptanalysis of block ciphers
- Title not available (Why is that?)
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- Linear Cryptanalysis of Non Binary Ciphers
- Differential-linear cryptanalysis revisited
- Differential-multiple linear cryptanalysis
- Enhancing Differential-Linear Cryptanalysis
- A methodology for differential-linear cryptanalysis and its applications
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- Observations on the \textsf{SIMON} block cipher family
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- Feistel structures for MPC, and more
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- New links between differential and linear cryptanalysis
- Improving key-recovery in linear attacks: application to 28-round PRESENT
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- On a generalization of substitution-permutation networks: the HADES design strategy
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- Improved differential-linear attacks with applications to ARX ciphers
- Optimising linear key recovery attacks with affine Walsh transform pruning
This page was built for publication: Linear cryptanalysis and its variants with fast Fourier transformation technique on MPC/FHE/ZK-friendly \(\mathbb{F}_p\)-based ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6535476)