swMATH46562MaRDI QIDQ5972843FDOQ5972843
Author name not available (Why is that?)
Official website: https://eprint.iacr.org/2018/1098.pdf
Source code repository: https://github.com/IAIK/marvellous-attacks
Cited In (23)
- ginger-lib
- MiMC
- Boolean polynomials, BDDs and CRHS equations -- connecting the dots with CryptaPath
- Interpolation cryptanalysis of unbalanced Feistel networks with low degree round functions
- ADD-Lib
- dd
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- M4RI
- BLAKE
- SHARK
- Blowfish
- Arya
- LowMC
- On succinct non-interactive arguments in relativized worlds
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- Ciminion
- On a generalization of substitution-permutation networks: the HADES design strategy
- CryptaPath
- TinyGarble
- Lattigo
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- On the algebraic degree of iterated power functions
- The inverse of \(\chi\) and its applications to Rasta-like ciphers
This page was built for software: MARVELlous