MiMC
From MaRDI portal
Software:5972442
swMATH44582MaRDI QIDQ5972442FDOQ5972442
Author name not available (Why is that?)
Cited In (16)
- Interpolation cryptanalysis of unbalanced Feistel networks with low degree round functions
- Lightweight authenticated encryption mode suitable for threshold implementation
- Compact Privacy Protocols from Post-quantum and Timed Classical Assumptions
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC
- Boomerang uniformity of popular S-box constructions
- The \(t\)-wise independence of substitution-permutation networks
- Post-quantum ID-based ring signatures from symmetric-key primitives
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- On a generalization of substitution-permutation networks: the HADES design strategy
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- On the algebraic degree of iterated power functions
- New cryptanalysis of LowMC with algebraic techniques
- On the guaranteed number of activations in $\mathsf{XS}$-circuits
- The inverse of \(\chi\) and its applications to Rasta-like ciphers
This page was built for software: MiMC