Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Optimized Interpolation Attacks on LowMC - MaRDI portal

Optimized Interpolation Attacks on LowMC

From MaRDI portal
Publication:2795989

DOI10.1007/978-3-662-48800-3_22zbMath1382.94092OpenAlexW2295458874MaRDI QIDQ2795989

Yunwen Liu, Qingju Wang, Willi Meier, Itai Dinur

Publication date: 23 March 2016

Published in: Advances in Cryptology – ASIACRYPT 2015 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-48800-3_22




Related Items (23)

Cryptanalysis of full LowMC and LowMC-M with algebraic techniques\(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryptionStream ciphers: a practical solution for efficient homomorphic-ciphertext compressionAlgebraic meet-in-the-middle attack on LowMCAlgebraic attacks on Rasta and Dasta using low-degree equationsNew attacks on LowMC instances with a single plaintext/ciphertext pairTransciphering framework for approximate homomorphic encryptionProvable security of HADES structureCoefficient grouping for complex affine layersAn algebraic attack on ciphers with low-degree round functions: application to full MiMCNew cryptanalysis of LowMC with algebraic techniquesStream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext CompressionTruncated differential based known-key attacks on round-reduced SIMONSomewhat/Fully Homomorphic Encryption: Implementation Progresses and ChallengesHomomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes\textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fieldsMind the middle layer: the HADES design strategy revisitedBanquet: short and fast signatures from AESAnother View of the Division PropertyThe inverse of \(\chi\) and its applications to Rasta-like ciphersThe MALICIOUS framework: embedding backdoors into tweakable block ciphersOut of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systemsOn a generalization of substitution-permutation networks: the HADES design strategy




This page was built for publication: Optimized Interpolation Attacks on LowMC