Pages that link to "Item:Q2413618"
From MaRDI portal
The following pages link to Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression (Q2413618):
Displaying 27 items.
- A note on generalization of bent Boolean functions (Q2025371) (← links)
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields (Q2056720) (← links)
- The inverse of \(\chi\) and its applications to Rasta-like ciphers (Q2089404) (← links)
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems (Q2102068) (← links)
- New general framework for algebraic degree evaluation of NFSR-based cryptosystems (Q2104459) (← links)
- A generic method for investigating nonsingular Galois NFSRs (Q2115724) (← links)
- Efficient homomorphic conversion between (ring) LWE ciphertexts (Q2117044) (← links)
- Transciphering, using FiLIP and TFHE for an efficient delegation of computation (Q2152020) (← links)
- \(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryption (Q2170018) (← links)
- The MILP-aided conditional differential attack and its application to Trivium (Q2227128) (← links)
- An improved degree evaluation method of NFSR-based cryptosystems (Q2243894) (← links)
- New cryptanalysis of LowMC with algebraic techniques (Q2701509) (← links)
- Boolean Functions for Homomorphic-Friendly Stream Ciphers (Q3294876) (← links)
- QUAD: A Practical Stream Cipher with Provable Security (Q3593092) (← links)
- Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression (Q4639486) (← links)
- Computation of a 30750-bit binary field discrete logarithm (Q4956935) (← links)
- On the algebraic immunity -- resiliency trade-off, implications for Goldreich's pseudorandom generator (Q6095188) (← links)
- Algebraic meet-in-the-middle attack on LowMC (Q6135398) (← links)
- Towards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipher (Q6135425) (← links)
- Revisiting key switching techniques with applications to light-key FHE (Q6547847) (← links)
- GL-S-NFSR: a new NFSR structure and its period properties (Q6587211) (← links)
- A Fibonacci view on the Galois NFSR used in Trivium (Q6595030) (← links)
- How do the arbiter PUFs sample the Boolean function class? (Q6618585) (← links)
- More balanced polynomials: cube attacks on 810- and 825-round Trivium with practical complexities (Q6620028) (← links)
- Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes (Q6632061) (← links)
- Massive superpoly recovery with a meet-in-the-middle framework. Improved cube attacks on \textsc{Trivium} and Kreyvium (Q6636398) (← links)
- The algebraic FreeLunch: efficient Gröbner basis attacks against arithmetization-oriented primitives (Q6652914) (← links)