We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 120 results
  1. Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques

    In this paper, we revisit the difference enumeration technique for LowMC and develop new algebraic techniques to achieve efficient key-recovery...
    Fukang Liu, Takanori Isobe, Willi Meier in Advances in Cryptology – CRYPTO 2021
    Conference paper 2021
  2. Algebraic Meet-in-the-Middle Attack on LowMC

    By exploiting the feature of partial nonlinear layers, we propose a new technique called algebraic meet-in-the-middle (MITM) attack to analyze the...
    Fukang Liu, Santanu Sarkar, ... Takanori Isobe in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  3. New cryptanalysis of LowMC with algebraic techniques

    LowMC is a family of block ciphers proposed by Albrecht et al. at EUROCRYPT 2015, which is tailored specifically for FHE and MPC applications. At...

    Wenxiao Qiao, Hailun Yan, ... Jiwu **g in Designs, Codes and Cryptography
    Article Open access 17 February 2023
  4. On recovering block cipher secret keys in the cold boot attack setting

    This paper presents a general strategy to recover a block cipher secret key in the cold boot attack setting. More precisely, we propose a...

    Gustavo Banegas, Ricardo Villanueva-Polanco in Cryptography and Communications
    Article Open access 13 February 2023
  5. A Three-Stage MITM Attack on LowMC from a Single Plaintext-Ciphertext Pair

    The block cipher LowMC was proposed by Albrecht et al. at EUROCRYPT 2015 for a low multiplicative complexity. Over the years, LowMC has been...
    Lulu Zhang, Meicheng Liu, Dongdai Lin in Selected Areas in Cryptography
    Conference paper 2024
  6. The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers

    Inserting backdoors in encryption algorithms has long seemed like a very interesting, yet difficult problem. Most attempts have been unsuccessful for...
    Thomas Peyrin, Haoyang Wang in Advances in Cryptology – CRYPTO 2020
    Conference paper 2020
  7. Practical Homomorphic Evaluation of Block-Cipher-Based Hash Functions with Applications

    Fully homomorphic encryption (FHE) is a powerful cryptographic technique allowing to perform computation directly over encrypted data. Motivated by...
    Adda Akram Bendoukha, Oana Stan, ... Luciano Freitas in Foundations and Practice of Security
    Conference paper 2023
  8. Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures

    With the urgency of the threat imposed by quantum computers, there is a strong interest in making the signature schemes quantum resistant. As the...
    Shiyao Chen, Chun Guo, ... Zeyu Xu in Information Security and Cryptology – ICISC 2022
    Conference paper 2023
  9. Improved Quantum Analysis of SPECK and LowMC

    As the prevalence of quantum computing is growing in leaps and bounds over the past few years, there is an ever-growing need to analyze the...
    Kyungbae Jang, Anubhab Baksi, ... Anupam Chattopadhyay in Progress in Cryptology – INDOCRYPT 2022
    Conference paper 2022
  10. The Inverse of \(\chi \) and Its Applications to Rasta-Like Ciphers

    Rasta and Dasta are two fully homomorphic encryption friendly symmetric-key primitives proposed at CRYPTO 2018 and ToSC 2020, respectively. It can be...

    Fukang Liu, Santanu Sarkar, ... Takanori Isobe in Journal of Cryptology
    Article 04 October 2022
  11. Improved homomorphic evaluation for hash function based on TFHE

    Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic...

    Benqiang Wei, **anhui Lu in Cybersecurity
    Article Open access 02 July 2024
  12. Big Brother Is Watching You: A Closer Look at Backdoor Construction

    With the advent of Malicious (Peyrin and Wang, Crypto’20), the question of a cipher with an intentional weakness which is only known to its designer...
    Anubhab Baksi, Arghya Bhattacharjee, ... Mridul Nandi in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2022
  13. Improved Homomorphic Evaluation for Hash Function Based on TFHE

    Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic...
    Benqiang Wei, **anhui Lu in Information Security and Cryptology
    Conference paper 2024
  14. Scaling Mobile Private Contact Discovery to Billions of Users

    Mobile contact discovery is a convenience feature of messengers such as WhatsApp or Telegram that helps users to identify which of their existing...
    Laura Hetz, Thomas Schneider, Christian Weinert in Computer Security – ESORICS 2023
    Conference paper 2024
  15. 3-Party Distributed ORAM from Oblivious Set Membership

    Distributed Oblivious RAM (DORAM) protocols allow a group of participants to obliviously access a secret-shared array at a secret-shared index, and...
    Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky in Security and Cryptography for Networks
    Conference paper 2022
  16. Scalable Multi-party Private Set Union from Multi-query Secret-Shared Private Membership Test

    Multi-party private set union (MPSU) allows \(k(k\ge 3)\)...
    Conference paper 2023
  17. Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives

    Ring signatures and ID-based cryptography are considered promising in terms of application. A ring signature authenticates messages while the author...
    Maxime Buser, Joseph K. Liu, ... Amin Sakzad in Applied Cryptography and Network Security
    Conference paper 2022
  18. Differential Power Analysis of the Picnic Signature Scheme

    This work introduces the first differential side-channel analysis of the Picnic Signature Scheme, an alternate candidate in the ongoing competition...
    Tim Gellersen, Okan Seker, Thomas Eisenbarth in Post-Quantum Cryptography
    Conference paper 2021
  19. New Attacks on LowMC Instances with a Single Plaintext/Ciphertext Pair

    Cryptanalysis of the LowMC block cipher when the attacker has access to a single known plaintext/ciphertext pair is a mathematically challenging...
    Subhadeep Banik, Khashayar Barooti, ... Hailun Yan in Advances in Cryptology – ASIACRYPT 2021
    Conference paper 2021
  20. Algebraic Attacks on Round-Reduced Rain and Full AIM-III

    Picnic is a NIST PQC Round 3 Alternate signature candidate that builds upon symmetric primitives following the MPC-in-the-head paradigm. Recently,...
    Kaiyi Zhang, Qingju Wang, ... Hongrui Cui in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
Did you find what you were looking for? Share feedback.