Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
From MaRDI portal
Publication:4639486
DOI10.1007/978-3-662-52993-5_16zbMath1387.94071OpenAlexW2289561827MaRDI QIDQ4639486
Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey
Publication date: 9 May 2018
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-52993-5_16
Related Items (19)
Interpolation cryptanalysis of unbalanced Feistel networks with low degree round functions ⋮ Low-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2\)] ⋮ Transciphering, using FiLIP and TFHE for an efficient delegation of computation ⋮ FASTA -- a stream cipher for fast FHE evaluation ⋮ Correlation cube attacks: from weak-key distinguisher to key recovery ⋮ Improved filter permutators for efficient FHE: better instances and implementations ⋮ Multi-user security bound for filter permutators in the random oracle model ⋮ Coefficient grouping: breaking Chaghri and more ⋮ Conditional Cube Searching and Applications on Trivium-Variant Ciphers ⋮ MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity ⋮ Algebraic attacks on Rasta and Dasta using low-degree equations ⋮ From unbalanced to perfect: implementation of low energy stream ciphers ⋮ An improved degree evaluation method of NFSR-based cryptosystems ⋮ Somewhat/Fully Homomorphic Encryption: Implementation Progresses and Challenges ⋮ The lower bound of the weightwise nonlinearity profile of a class of weightwise perfectly balanced functions ⋮ New cube distinguishers on NFSR-based stream ciphers ⋮ Modeling for three-subset division property without unknown subset ⋮ Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes ⋮ Cryptanalysis of the FLIP Family of Stream Ciphers
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- (Leveled) Fully Homomorphic Encryption without Bootstrapping
- Some (in)sufficient conditions for secure hybrid encryption
- TriviA: a fast and secure authenticated encryption scheme
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Fully homomorphic SIMD operations
- Cryptanalysis of the two-dimensional circulation encryption algorithm
- Optimized Interpolation Attacks on LowMC
- Algorithms in HElib
- Conditional Differential Cryptanalysis of Trivium and KATAN
- Homomorphic Evaluation of the AES Circuit
- Private Computation on Encrypted Genomic Data
- On Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption Schemes
- Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks
- Match Box Meet-in-the-Middle Attack Against KATAN
- On Lightweight Stream Ciphers with Shorter Internal States
- Ciphers for MPC and FHE
- Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- Trivium
- On the Security of IV Dependent Stream Ciphers
- New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
- Cube Attacks on Tweakable Black Box Polynomials
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- The interpolation attack on block ciphers
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- ML Confidential: Machine Learning on Encrypted Data
- Batch Fully Homomorphic Encryption over the Integers
- A Comparison of the Homomorphic Encryption Schemes FV and YASHE
- Fully homomorphic encryption using ideal lattices
- A New Variant of PMAC: Beyond the Birthday Bound
- Scale-Invariant Fully Homomorphic Encryption over the Integers
- New Applications of Time Memory Data Tradeoffs
- Two Trivial Attacks on Trivium
This page was built for publication: Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression