Results 1 to 10 of about 436 (71)
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting [PDF]
The security of the post-quantum signature scheme Picnic is highly related to the difficulty of recovering the secret key of LowMC from a single plaintext-ciphertext pair.
Fukang Liu +3 more
doaj +5 more sources
Improved Attacks on LowMC with Algebraic Techniques [PDF]
The LowMC family of SPN block cipher proposed by Albrecht et al. was designed specifically for MPC-/FHE-/ZKP-friendly use cases. It is especially used as the underlying block cipher of PICNIC, one of the alternate third-round candidate digital signature
Yimeng Sun, Jiamin Cui, Meiqin Wang
doaj +6 more sources
MRHS solver based on linear algebra and exhaustive search [PDF]
We show how to build a binary matrix from the MRHS representation of a symmetric-key cipher. The matrix contains the cipher represented as an equation system and can be used to assess a cipher’s resistance against algebraic attacks.
Raddum Håvard, Zajac Pavol
doaj +2 more sources
Improving MPCitH with Preprocessing: Mask Is All You Need [PDF]
The MPC-in-the-head with preprocessing (MPCitH-PP) paradigm presents a novel approach for constructing post-quantum digital signatures like Picnic3.
Guowei Liu +6 more
doaj +4 more sources
Effect of the difference enumeration attack on LowMC instances
The LowMC is an algorithm with low multiplicative complexities.For the parameter with limited data complexities and low number of S-boxes, the difference enumeration attack was proposed, which could theoretically attack all rounds of the LowMC ...
Xinxin GE, Zhihu LI, Meiqin WANG, Kai HU
doaj +3 more sources
Algebraic Attacks on RAIN and AIM Using Equivalent Representations [PDF]
Designing novel symmetric-key primitives for advanced protocols like secure multiparty computation (MPC), fully homomorphic encryption (FHE) and zero-knowledge proof systems (ZK), has been an important research topic in recent years.
Liu, Fukang +3 more
core +3 more sources
To improve the effect of English translation teaching, this paper combines the differential evolution algorithm to construct and simulate the interactive English translation teaching mode and analyzes the differential enumeration attack.
Chi Che
doaj +1 more source
MiMC:Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity [PDF]
We explore cryptographic primitives with low multiplicative complexity. This is motivated by recent progress in practical applications of secure multi-party computation (MPC), fully homomorphic encryption (FHE), and zero-knowledge proofs (ZK) where ...
Albrecht, Martin +4 more
core +4 more sources
Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression [PDF]
International audienceIn typical applications of homomorphic encryption, the first step consists for Alice to encrypt some plaintext m under Bob’s public key pk and to send the ciphertext c = HEpk(m) to some third-party evaluator Charlie.
Canteaut, Anne +6 more
core +6 more sources
Implementing Grover Oracles for Quantum Key Search on AES and LowMC [PDF]
Grover's search algorithm gives a quantum attack against block ciphers by searching for a key that matches a small number of plaintext-ciphertext pairs. This attack uses $O(\sqrt{N})$ calls to the cipher to search a key space of size $N$.
A Reyhani-Masoleh +30 more
core +2 more sources

