The following pages link to MiMC (Q5972442):
Displayed 16 items.
- Interpolation cryptanalysis of unbalanced Feistel networks with low degree round functions (Q832348) (← links)
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields (Q2056720) (← links)
- The inverse of \(\chi\) and its applications to Rasta-like ciphers (Q2089404) (← links)
- Post-quantum ID-based ring signatures from symmetric-key primitives (Q2096649) (← links)
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems (Q2102068) (← links)
- On a generalization of substitution-permutation networks: the HADES design strategy (Q2119029) (← links)
- Lightweight authenticated encryption mode suitable for threshold implementation (Q2119030) (← links)
- The \(t\)-wise independence of substitution-permutation networks (Q2139644) (← links)
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC (Q2178862) (← links)
- Boomerang uniformity of popular S-box constructions (Q2200524) (← links)
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC (Q2692352) (← links)
- On the algebraic degree of iterated power functions (Q2692966) (← links)
- New cryptanalysis of LowMC with algebraic techniques (Q2701509) (← links)
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity (Q2958119) (← links)
- Compact Privacy Protocols from Post-quantum and Timed Classical Assumptions (Q5041222) (← links)
- On the guaranteed number of activations in $\mathsf{XS}$-circuits (Q5071454) (← links)