Cited in
(37)- ginger-lib
- WAGE
- SPEck
- MARVELlous
- The \(t\)-wise independence of substitution-permutation networks
- Interpolation cryptanalysis of unbalanced Feistel networks with low degree round functions
- Lightweight authenticated encryption mode suitable for threshold implementation
- On the guaranteed number of activations in \(\mathsf{XS}\)-circuits
- The inverse of \(\chi\) and its applications to Rasta-like ciphers
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC
- CAPA
- ISAP
- M4RI
- Keccak
- BLAKE
- SEAL
- SHARK
- libiop
- LowMC
- Compact privacy protocols from post-quantum and timed classical assumptions
- Boomerang uniformity of popular S-box constructions
- Ciminion
- XKCP
- New cryptanalysis of LowMC with algebraic techniques
- Post-quantum ID-based ring signatures from symmetric-key primitives
- CPSNARKs-Set
- FreePDK45
- TinyGarble
- Lattigo
- maskVerif
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- SWIFFTX
- On a generalization of substitution-permutation networks: the HADES design strategy
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- On the algebraic degree of iterated power functions
This page was built for software: MiMC