Stream cipher designs: a review

L Jiao, Y Hao, D Feng - Science China Information Sciences, 2020 - Springer
Stream cipher is an important branch of symmetric cryptosystems, which takes obvious
advantages in speed and scale of hardware implementation. It is suitable for using in the …

Ciphers for MPC and FHE

MR Albrecht, C Rechberger, T Schneider… - Advances in Cryptology …, 2015 - Springer
Designing an efficient cipher was always a delicate balance between linear and non-linear
operations. This goes back to the design of DES, and in fact all the way back to the seminal …

Post-quantum zero-knowledge and signatures from symmetric-key primitives

M Chase, D Derler, S Goldfeder, C Orlandi… - Proceedings of the …, 2017 - dl.acm.org
We propose a new class of post-quantum digital signature schemes that:(a) derive their
security entirely from the security of symmetric-key primitives, believed to be quantum …

Towards fair and privacy-preserving federated deep models

L Lyu, J Yu, K Nandakumar, Y Li, X Ma… - … on Parallel and …, 2020 - ieeexplore.ieee.org
The current standalone deep learning framework tends to result in overfitting and low utility.
This problem can be addressed by either a centralized framework that deploys a central …

MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity

M Albrecht, L Grassi, C Rechberger, A Roy… - … Conference on the …, 2016 - Springer
We explore cryptographic primitives with low multiplicative complexity. This is motivated by
recent progress in practical applications of secure multi-party computation (MPC), fully …

Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields

C Dobraunig, L Grassi, A Guinet, D Kuijsters - … International Conference on …, 2021 - Springer
Motivated by new applications such as secure Multi-Party Computation (MPC), Fully
Homomorphic Encryption (FHE), and Zero-Knowledge proofs (ZK), the need for symmetric …

Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression

A Canteaut, S Carpov, C Fontaine, T Lepoint… - Journal of …, 2018 - Springer
In typical applications of homomorphic encryption, the first step consists for Alice of
encrypting some plaintext m under Bob's public key pk pk and of sending the ciphertext c …

The Algebraic FreeLunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives

A Bariant, A Boeuf, A Lemoine… - Annual International …, 2024 - Springer
In this paper, we present a new type of algebraic attack that applies to many recent
arithmetization-oriented families of permutations, such as those used in Griffin, Anemoi …

[PDF][PDF] Pasta: A case for hybrid homomorphic encryption

C Dobraunig, L Grassi, L Helminger, C Rechberger… - 2023 - repository.ubn.ru.nl
The idea of hybrid homomorphic encryption (HHE) is to drastically reduce bandwidth
requirements when using homomorphic encryption (HE) at the cost of more expensive …

Feistel structures for MPC, and more

MR Albrecht, L Grassi, L Perrin, S Ramacher… - … –ESORICS 2019: 24th …, 2019 - Springer
Efficient PRP/PRFs are instrumental to the design of cryptographic protocols. We investigate
the design of dedicated PRP/PRFs for three application areas-secure multiparty computation …