Stream cipher designs: a review
L Jiao, Y Hao, D Feng - Science China Information Sciences, 2020 - Springer
Stream cipher is an important branch of symmetric cryptosystems, which takes obvious
advantages in speed and scale of hardware implementation. It is suitable for using in the …
advantages in speed and scale of hardware implementation. It is suitable for using in the …
Ciphers for MPC and FHE
Designing an efficient cipher was always a delicate balance between linear and non-linear
operations. This goes back to the design of DES, and in fact all the way back to the seminal …
operations. This goes back to the design of DES, and in fact all the way back to the seminal …
Post-quantum zero-knowledge and signatures from symmetric-key primitives
We propose a new class of post-quantum digital signature schemes that:(a) derive their
security entirely from the security of symmetric-key primitives, believed to be quantum …
security entirely from the security of symmetric-key primitives, believed to be quantum …
Towards fair and privacy-preserving federated deep models
The current standalone deep learning framework tends to result in overfitting and low utility.
This problem can be addressed by either a centralized framework that deploys a central …
This problem can be addressed by either a centralized framework that deploys a central …
MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity
We explore cryptographic primitives with low multiplicative complexity. This is motivated by
recent progress in practical applications of secure multi-party computation (MPC), fully …
recent progress in practical applications of secure multi-party computation (MPC), fully …
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
Motivated by new applications such as secure Multi-Party Computation (MPC), Fully
Homomorphic Encryption (FHE), and Zero-Knowledge proofs (ZK), the need for symmetric …
Homomorphic Encryption (FHE), and Zero-Knowledge proofs (ZK), the need for symmetric …
Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression
In typical applications of homomorphic encryption, the first step consists for Alice of
encrypting some plaintext m under Bob's public key pk pk and of sending the ciphertext c …
encrypting some plaintext m under Bob's public key pk pk and of sending the ciphertext c …
The Algebraic FreeLunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives
In this paper, we present a new type of algebraic attack that applies to many recent
arithmetization-oriented families of permutations, such as those used in Griffin, Anemoi …
arithmetization-oriented families of permutations, such as those used in Griffin, Anemoi …
[PDF][PDF] Pasta: A case for hybrid homomorphic encryption
The idea of hybrid homomorphic encryption (HHE) is to drastically reduce bandwidth
requirements when using homomorphic encryption (HE) at the cost of more expensive …
requirements when using homomorphic encryption (HE) at the cost of more expensive …
Feistel structures for MPC, and more
Efficient PRP/PRFs are instrumental to the design of cryptographic protocols. We investigate
the design of dedicated PRP/PRFs for three application areas-secure multiparty computation …
the design of dedicated PRP/PRFs for three application areas-secure multiparty computation …