Results 41 to 50 of about 436 (71)
New Attacks on LowMC Using Partial Sets in the Single-Data Setting [PDF]
The LowMC family of block ciphers was proposed by Albrecht et al. in Eurocrypt 2015, specifically targeting adoption in FHE and MPC applications due to its low multiplicative complexity.
Andrea Caforio +2 more
core +1 more source
One More Pair, More Information Gained: Improved Attacks on LowMC with Full S-box Layers Using Two Plaintext/Ciphertext Pairs [PDF]
Motivated by LowMC cryptanalysis challenge, research in recent years focuses more on attacking LowMC in \PICNIC application setting, \ie an attacker can see only a single plaintext/ciphertext pair.
Chao Niu +5 more
core
Improved Algebraic Attacks on Round-Reduced LowMC with Single-Data Complexity [PDF]
Recently, Picnic3 has introduced several alternative LowMC instances, which prompts the cryptanalysis competition for LowMC. In this paper, we provide new solutions to the competition with full S-box layers under single-data complexity. First, we present
Mingsheng Wang +2 more
core
Multi-user Security Bound for Filter Permutators in the Random Oracle Model [PDF]
At EUROCRYPT 2016, Méaux et al. introduced a new design strategy for symmetric ciphers for Fully Homomorphic Encryption (FHE), which they dubbed filter permutators.
Cogliati, Benoît-Michel +1 more
core
Variable Elimination - a Tool for Algebraic Cryptanalysis [PDF]
Techniques for eliminating variables from a system of nonlinear equations are used to find solutions of the system. We discuss how these methods can be used to attack certain types of symmetric block ciphers, by solving sets of equations arising from ...
Bjørn Greve +2 more
core
Efficient Post-Quantum Zero-Knowledge and Signatures [PDF]
In this paper, we present a new post-quantum digital signature algorithm that derives its security entirely from assumptions about symmetric-key primitives, which are very well studied and believed to be quantum-secure (with increased parameter sizes ...
Greg Zaverucha +2 more
core
Quantum Implementation of the SAND Algorithm and Its Quantum Resource Estimation for Brute-Force Attack. [PDF]
Wu H, Feng X, Zhang J.
europepmc +1 more source

