An algebraic attack on ciphers with low-degree round functions: application to full MiMC
From MaRDI portal
Publication:2692352
DOI10.1007/978-3-030-64837-4_16OpenAlexW3009904134MaRDI QIDQ2692352
Christian Rechberger, Qingju Wang, Maria Eichlseder, Reinhard Lüftenegger, Morten Øygarden, Lorenzo Grassi, Markus Schofnegger
Publication date: 21 March 2023
Full work available at URL: https://doi.org/10.1007/978-3-030-64837-4_16
Related Items
Coefficient grouping: breaking Chaghri and more ⋮ Cryptanalysis of Ciminion ⋮ Algebraic meet-in-the-middle attack on LowMC ⋮ On the field-based division property: applications to MiMC, Feistel MiMC and GMiMC ⋮ Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato} ⋮ Algebraic attacks on Rasta and Dasta using low-degree equations ⋮ Full round zero-sum distinguishers on \textsf{TinyJAMBU}-128 and \textsf{TinyJAMBU}-192 keyed-permutation in the known-key setting ⋮ Coefficient grouping for complex affine layers ⋮ On the algebraic degree of iterated power functions ⋮ \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields ⋮ The inverse of \(\chi\) and its applications to Rasta-like ciphers
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Algebraic cryptanalysis of variants of \textsc{Frit}
- Improved interpolation attacks on cryptographic primitives of low algebraic degree
- On fast multiplication of polynomials over arbitrary algebras
- Codes, bent functions and permutations suitable for DES-like cryptosystems
- Improved division property based cube attacks exploiting algebraic properties of superpoly
- Cube attacks on non-blackbox polynomials based on division property
- Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD
- On a generalization of substitution-permutation networks: the HADES design strategy
- Feistel structures for MPC, and more
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC
- MILP-aided method of searching division property using three subsets and applications
- Zero-sum partitions of PHOTON permutations
- Automatic search for a variant of division property using three subsets
- Practical collision attacks against round-reduced SHA-3
- Linear hulls with correlation zero and linear cryptanalysis of block ciphers
- Optimized Interpolation Attacks on LowMC
- Higher-Order Cryptanalysis of LowMC
- Modern Computer Algebra
- Narrow-Bicliques: Cryptanalysis of Full IDEA
- Cryptanalysis of Reduced-Round SIMON32 and SIMON48
- Structural Evaluation by Generalized Integral Property
- Ciphers for MPC and FHE
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
- On the Influence of the Algebraic Degree of $F^{-1}$ on the Algebraic Degree of $G \circ F$
- Higher-Order Differential Properties of Keccak and Luffa
- Biclique Cryptanalysis of the Full AES
- Cube Attacks on Tweakable Black Box Polynomials
- The interpolation attack on block ciphers
- Higher Order Differential Attack of a CAST Cipher
- Bit-Based Division Property and Application to Simon Family
- Higher Order Derivatives and Differential Cryptanalysis
- Zero Correlation Linear Cryptanalysis with Reduced Data Complexity
- Known-Key Distinguishers for Some Block Ciphers
- On the Indifferentiability of the Sponge Construction