Results 1 to 10 of about 436 (71)

New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting [PDF]

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The security of the post-quantum signature scheme Picnic is highly related to the difficulty of recovering the secret key of LowMC from a single plaintext-ciphertext pair.
Fukang Liu   +3 more
doaj   +5 more sources

Improved Attacks on LowMC with Algebraic Techniques [PDF]

open access: yesIACR Transactions on Symmetric Cryptology, 2023
The LowMC family of SPN block cipher proposed by Albrecht et al. was designed specifically for MPC-/FHE-/ZKP-friendly use cases. It is especially used as the underlying block cipher of PICNIC, one of the alternate third-round candidate digital signature
Yimeng Sun, Jiamin Cui, Meiqin Wang
doaj   +6 more sources

MRHS solver based on linear algebra and exhaustive search [PDF]

open access: yesJournal of Mathematical Cryptology, 2018
We show how to build a binary matrix from the MRHS representation of a symmetric-key cipher. The matrix contains the cipher represented as an equation system and can be used to assess a cipher’s resistance against algebraic attacks.
Raddum Håvard, Zajac Pavol
doaj   +2 more sources

Improving MPCitH with Preprocessing: Mask Is All You Need [PDF]

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
The MPC-in-the-head with preprocessing (MPCitH-PP) paradigm presents a novel approach for constructing post-quantum digital signatures like Picnic3.
Guowei Liu   +6 more
doaj   +4 more sources

Effect of the difference enumeration attack on LowMC instances

open access: yes网络与信息安全学报, 2021
The LowMC is an algorithm with low multiplicative complexities.For the parameter with limited data complexities and low number of S-boxes, the difference enumeration attack was proposed, which could theoretically attack all rounds of the LowMC ...
Xinxin GE, Zhihu LI, Meiqin WANG, Kai HU
doaj   +3 more sources

Algebraic Attacks on RAIN and AIM Using Equivalent Representations [PDF]

open access: yes, 2023
Designing novel symmetric-key primitives for advanced protocols like secure multiparty computation (MPC), fully homomorphic encryption (FHE) and zero-knowledge proof systems (ZK), has been an important research topic in recent years.
Liu, Fukang   +3 more
core   +3 more sources

Application of Differential Evolution Algorithm in the Construction and Simulation of Interactive English Translation Teaching Mode

open access: yesAdvances in Multimedia, 2022
To improve the effect of English translation teaching, this paper combines the differential evolution algorithm to construct and simulate the interactive English translation teaching mode and analyzes the differential enumeration attack.
Chi Che
doaj   +1 more source

MiMC:Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity [PDF]

open access: yes, 2016
We explore cryptographic primitives with low multiplicative complexity. This is motivated by recent progress in practical applications of secure multi-party computation (MPC), fully homomorphic encryption (FHE), and zero-knowledge proofs (ZK) where ...
Albrecht, Martin   +4 more
core   +4 more sources

Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression [PDF]

open access: yes, 2015
International audienceIn typical applications of homomorphic encryption, the first step consists for Alice to encrypt some plaintext m under Bob’s public key pk and to send the ciphertext c = HEpk(m) to some third-party evaluator Charlie.
Canteaut, Anne   +6 more
core   +6 more sources

Implementing Grover Oracles for Quantum Key Search on AES and LowMC [PDF]

open access: yes, 2019
Grover's search algorithm gives a quantum attack against block ciphers by searching for a key that matches a small number of plaintext-ciphertext pairs. This attack uses $O(\sqrt{N})$ calls to the cipher to search a key space of size $N$.
A Reyhani-Masoleh   +30 more
core   +2 more sources

Home - About - Disclaimer - Privacy