MiMC
From MaRDI portal
Software:5972442
No author found.
Related Items (16)
Compact Privacy Protocols from Post-quantum and Timed Classical Assumptions ⋮ Interpolation cryptanalysis of unbalanced Feistel networks with low degree round functions ⋮ The \(t\)-wise independence of substitution-permutation networks ⋮ On the guaranteed number of activations in $\mathsf{XS}$-circuits ⋮ Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC ⋮ MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity ⋮ Boomerang uniformity of popular S-box constructions ⋮ An algebraic attack on ciphers with low-degree round functions: application to full MiMC ⋮ On the algebraic degree of iterated power functions ⋮ New cryptanalysis of LowMC with algebraic techniques ⋮ \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields ⋮ The inverse of \(\chi\) and its applications to Rasta-like ciphers ⋮ Post-quantum ID-based ring signatures from symmetric-key primitives ⋮ Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems ⋮ On a generalization of substitution-permutation networks: the HADES design strategy ⋮ Lightweight authenticated encryption mode suitable for threshold implementation
This page was built for software: MiMC