Optimized Interpolation Attacks on LowMC
From MaRDI portal
Publication:2795989
DOI10.1007/978-3-662-48800-3_22zbMath1382.94092OpenAlexW2295458874MaRDI QIDQ2795989
Yunwen Liu, Qingju Wang, Willi Meier, Itai Dinur
Publication date: 23 March 2016
Published in: Advances in Cryptology – ASIACRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-48800-3_22
Related Items (23)
Cryptanalysis of full LowMC and LowMC-M with algebraic techniques ⋮ \(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryption ⋮ Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression ⋮ Algebraic meet-in-the-middle attack on LowMC ⋮ Algebraic attacks on Rasta and Dasta using low-degree equations ⋮ New attacks on LowMC instances with a single plaintext/ciphertext pair ⋮ Transciphering framework for approximate homomorphic encryption ⋮ Provable security of HADES structure ⋮ Coefficient grouping for complex affine layers ⋮ An algebraic attack on ciphers with low-degree round functions: application to full MiMC ⋮ New cryptanalysis of LowMC with algebraic techniques ⋮ Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression ⋮ Truncated differential based known-key attacks on round-reduced SIMON ⋮ Somewhat/Fully Homomorphic Encryption: Implementation Progresses and Challenges ⋮ Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes ⋮ \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields ⋮ Mind the middle layer: the HADES design strategy revisited ⋮ Banquet: short and fast signatures from AES ⋮ Another View of the Division Property ⋮ The inverse of \(\chi\) and its applications to Rasta-like ciphers ⋮ The MALICIOUS framework: embedding backdoors into tweakable block ciphers ⋮ Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems ⋮ On a generalization of substitution-permutation networks: the HADES design strategy
This page was built for publication: Optimized Interpolation Attacks on LowMC