On Generalizations of the Lai-Massey Scheme: the Birth of Amaryllises. | 0 | 0.34 | 2022 |
Security of Truncated Permutation Without Initial Value. | 0 | 0.34 | 2022 |
From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications. | 0 | 0.34 | 2022 |
Weak Bijective Quadratic Functions over 픽 p n . | 0 | 0.34 | 2022 |
A New Feistel Approach Meets Fluid-SPN: Griffin for Zero-Knowledge Applications. | 0 | 0.34 | 2022 |
Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes over 픽 p n . | 0 | 0.34 | 2021 |
The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over (F_p)^n. | 0 | 0.34 | 2021 |
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC. | 0 | 0.34 | 2020 |
Weak-Key Subspace Trails and Applications to AES. | 0 | 0.34 | 2019 |
New Rigorous Analysis of Truncated Differentials for 5-round AES. | 0 | 0.34 | 2018 |
Quantum Algorithms for the k -xor Problem. | 0 | 0.34 | 2018 |
New Limits for AES Known-Key Distinguishers. | 0 | 0.34 | 2017 |