MRHS solver based on linear algebra and exhaustive search [PDF]
We show how to build a binary matrix from the MRHS representation of a symmetric-key cipher. The matrix contains the cipher represented as an equation system and can be used to assess a cipher’s resistance against algebraic attacks.
Raddum Håvard, Zajac Pavol
doaj +4 more sources
Cryptanalysis of Low-Data Instances of Full LowMCv2 [PDF]
LowMC is a family of block ciphers designed for a low multiplicative complexity. The specification allows a large variety of instantiations, differing in block size, key size, number of S-boxes applied per round and allowed data complexity. The number of
Christian Rechberger +2 more
doaj +5 more sources
Improving MPCitH with Preprocessing: Mask Is All You Need [PDF]
The MPC-in-the-head with preprocessing (MPCitH-PP) paradigm presents a novel approach for constructing post-quantum digital signatures like Picnic3.
Guowei Liu +6 more
doaj +4 more sources
Provable Security of SP Networks with Partial Non-Linear Layers
Motivated by the recent trend towards low multiplicative complexity blockciphers (e.g., Zorro, CHES 2013; LowMC, EUROCRYPT 2015; HADES, EUROCRYPT 2020; MALICIOUS, CRYPTO 2020), we study their underlying structure partial SPNs, i.e., Substitution ...
Chun Guo +4 more
doaj +1 more source
Algebraic Attacks on RAIN and AIM Using Equivalent Representations [PDF]
Designing novel symmetric-key primitives for advanced protocols like secure multiparty computation (MPC), fully homomorphic encryption (FHE) and zero-knowledge proof systems (ZK), has been an important research topic in recent years.
Liu, Fukang +3 more
core +3 more sources
MiMC:Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity [PDF]
We explore cryptographic primitives with low multiplicative complexity. This is motivated by recent progress in practical applications of secure multi-party computation (MPC), fully homomorphic encryption (FHE), and zero-knowledge proofs (ZK) where ...
Albrecht, Martin +4 more
core +4 more sources
Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression [PDF]
International audienceIn typical applications of homomorphic encryption, the first step consists for Alice to encrypt some plaintext m under Bob’s public key pk and to send the ciphertext c = HEpk(m) to some third-party evaluator Charlie.
Canteaut, Anne +6 more
core +6 more sources
New Method for Simultaneous Determination of Microcystins and Cylindrospermopsin in Vegetable Matrices by SPE-UPLC-MS/MS [PDF]
Cyanotoxins are a large group of noxious metabolites with different chemical structure and mechanisms of action, with a worldwide distribution, producing effects in animals, humans, and crop plants.
Cameán Fernández, Ana María +7 more
core +1 more source
Iron oxide nanoparticles fabricated by electric explosion of wire: Focus on magnetic nanofluids [PDF]
Nanoparticles of iron oxides (MNPs) were prepared using the electric explosion of wire technique (EEW). The main focus was on the fabrication of de-aggregated spherical nanoparticles with a narrow size distribution. According to XRD the major crystalline
Alonso, J. +6 more
core +2 more sources
Link between Motor Competence and Health Related Fitness in Children and Adolescents [PDF]
This study examined motor competence (MC) behavior in 6- to 14-year-old children, and investigated the differences in health-related fitness (HRF) between high and low MC groups, according to sex and age. A sample of 564 children (288 males) participated
Barnhart +7 more
core +2 more sources

