From Farfalle to \textsc{Megafono} via Ciminion: the PRF \textsc{Hydra} for MPC applications
From MaRDI portal
Publication:6083131
DOI10.1007/978-3-031-30634-1_9zbMath1528.94055OpenAlexW4365807722MaRDI QIDQ6083131
Markus Schofnegger, Lorenzo Grassi, Morten Øygarden, Roman Walch
Publication date: 8 December 2023
Published in: Advances in Cryptology – EUROCRYPT 2023 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-30634-1_9
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Distributed systems (68M14)
Related Items
Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato} ⋮ Invertible quadratic non-linear functions over \(\mathbb{F}_p^n\) via multiple local maps ⋮ New design techniques for efficient arithmetization-oriented hash functions: \texttt{Anemoi} permutations and \texttt{Jive} compression mode
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Oblivious TLS via multi-party computation
- Multi-party revocation in sovrin: performance through distributed trust
- Algebraic key-recovery attacks on reduced-round Xoofff
- A new efficient algorithm for computing Gröbner bases \((F_4)\)
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- On a generalization of substitution-permutation networks: the HADES design strategy
- Thinking outside the superbox
- MPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applications
- Feistel structures for MPC, and more
- Forkcipher: a new primitive for authenticated encryption of very short messages
- From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting
- Minimalism in Cryptography: The Even-Mansour Scheme Revisited
- Multiparty Computation from Somewhat Homomorphic Encryption
- Practical Covertly Secure MPC for Dishonest Majority – Or: Breaking the SPDZ Limits
- Ciphers for MPC and FHE
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
- How to share a secret
- A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation
- Limitations of the Even-Mansour construction
- The Wide Trail Design Strategy
- Keccak
- On the Indifferentiability of the Sponge Construction
This page was built for publication: From Farfalle to \textsc{Megafono} via Ciminion: the PRF \textsc{Hydra} for MPC applications