Rasta: a cipher with low ANDdepth and few ANDs per bit

From MaRDI portal
Publication:1673415

DOI10.1007/978-3-319-96884-1_22zbMath1444.94064OpenAlexW2953015727MaRDI QIDQ1673415

Lorenzo Grassi, Maria Eichlseder, Gregor Leander, Virginie Lallemand, Christian Rechberger, Eik List, Christoph Dobraunig, Florian Mendel

Publication date: 12 September 2018

Full work available at URL: https://doi.org/10.1007/978-3-319-96884-1_22




Related Items (24)

Interpolation cryptanalysis of unbalanced Feistel networks with low degree round functionsExploring crypto dark matter: new simple PRF candidates and their applicationsTransciphering, using FiLIP and TFHE for an efficient delegation of computationIntegral attacks on Pyjamask-96 and round-reduced Pyjamask-128FASTA -- a stream cipher for fast FHE evaluation\(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryptionImproved filter permutators for efficient FHE: better instances and implementationsCoefficient grouping: breaking Chaghri and moreLighter is better: a lighter multi-client verifiable outsourced computation with hybrid homomorphic encryptionCryptanalysis of CiminionAlgebraic meet-in-the-middle attack on LowMCTowards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipherCryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}Algebraic attacks on Rasta and Dasta using low-degree equationsTransciphering framework for approximate homomorphic encryptionCoefficient grouping for complex affine layersNew cryptanalysis of LowMC with algebraic techniquesBoolean Functions for Homomorphic-Friendly Stream CiphersBoolean functions with multiplicative complexity 3 and 4\textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fieldsThe inverse of \(\chi\) and its applications to Rasta-like ciphersOut of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systemsEfficient homomorphic conversion between (ring) LWE ciphertextsOn a generalization of substitution-permutation networks: the HADES design strategy




This page was built for publication: Rasta: a cipher with low ANDdepth and few ANDs per bit