The following pages link to Ciphers for MPC and FHE (Q2948338):
Displaying 50 items.
- Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity (Q510448) (← links)
- Improving the security and efficiency of block ciphers based on LS-designs (Q510503) (← links)
- SoK: how (not) to design and implement post-quantum cryptography (Q826276) (← links)
- Boolean polynomials, BDDs and CRHS equations -- connecting the dots with CryptaPath (Q832343) (← links)
- Interpolation cryptanalysis of unbalanced Feistel networks with low degree round functions (Q832348) (← links)
- Exploring crypto dark matter: new simple PRF candidates and their applications (Q1631360) (← links)
- Multiplicative complexity of vector valued Boolean functions (Q1704580) (← links)
- MRHS solver based on linear algebra and exhaustive search (Q1787192) (← links)
- The lower bound of the weightwise nonlinearity profile of a class of weightwise perfectly balanced functions (Q2022507) (← links)
- Traceable ring signatures: general framework and post-quantum security (Q2034982) (← links)
- Boolean functions with multiplicative complexity 3 and 4 (Q2040305) (← links)
- Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\) (Q2056692) (← links)
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields (Q2056720) (← links)
- Mind the middle layer: the HADES design strategy revisited (Q2056722) (← links)
- Generic compiler for publicly verifiable covert multi-party computation (Q2056768) (← links)
- Banquet: short and fast signatures from AES (Q2061922) (← links)
- The inverse of \(\chi\) and its applications to Rasta-like ciphers (Q2089404) (← links)
- Post-quantum ID-based ring signatures from symmetric-key primitives (Q2096649) (← links)
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers (Q2102066) (← links)
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems (Q2102068) (← links)
- Efficient homomorphic conversion between (ring) LWE ciphertexts (Q2117044) (← links)
- TurboIKOS: improved non-interactive zero knowledge and post-quantum signatures (Q2117059) (← links)
- Differential power analysis of the Picnic signature scheme (Q2118537) (← links)
- Implementing Grover oracles for quantum key search on AES and LowMC (Q2119015) (← links)
- On a generalization of substitution-permutation networks: the HADES design strategy (Q2119029) (← links)
- Lightweight authenticated encryption mode suitable for threshold implementation (Q2119030) (← links)
- Cryptanalysis of full LowMC and LowMC-M with algebraic techniques (Q2129003) (← links)
- Low-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2]\) (Q2139645) (← links)
- MPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applications (Q2139646) (← links)
- One-time traceable ring signatures (Q2148766) (← links)
- Transciphering, using FiLIP and TFHE for an efficient delegation of computation (Q2152020) (← links)
- Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128 (Q2152163) (← links)
- FASTA -- a stream cipher for fast FHE evaluation (Q2152175) (← links)
- Differential uniformity and linearity of S-boxes by multiplicative complexity (Q2154885) (← links)
- \(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryption (Q2170018) (← links)
- Improved filter permutators for efficient FHE: better instances and implementations (Q2179380) (← links)
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression (Q2413618) (← links)
- Multi-user security bound for filter permutators in the random oracle model (Q2420473) (← links)
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC (Q2692352) (← links)
- Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature (Q2698345) (← links)
- New cryptanalysis of LowMC with algebraic techniques (Q2701509) (← links)
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures (Q2807223) (← links)
- Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes (Q2817869) (← links)
- Cryptanalysis of the FLIP Family of Stream Ciphers (Q2835597) (← links)
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function (Q2958116) (← links)
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity (Q2958119) (← links)
- Optimizing S-Box Implementations for Several Criteria Using SAT Solvers (Q4639475) (← links)
- Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression (Q4639486) (← links)
- Privacy-Preserving Prescription Drug Management Using Fully Homomorphic Encryption (Q5044583) (← links)
- Somewhat/Fully Homomorphic Encryption: Implementation Progresses and Challenges (Q5739024) (← links)