Letteratura scientifica selezionata sul tema "Arithmetization-Oriented"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Arithmetization-Oriented".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Arithmetization-Oriented"
Li, Zhengnan, Baofeng Wu e Dongdai Lin. "Algebraic-Differential Attacks on a Family of Arithmetization-Oriented Symmetric Ciphers". Journal of Systems Science and Complexity 36, n. 6 (dicembre 2023): 2681–702. http://dx.doi.org/10.1007/s11424-023-1511-7.
Testo completoNi, Jianqiang, Jianhui Zhang, Gaoli Wang, Rui Li e Yanzhao Shen. "Algebraic Attacks against Grendel: An Arithmetization-Oriented Primitive with the Legendre Symbol". Symmetry 15, n. 8 (10 agosto 2023): 1563. http://dx.doi.org/10.3390/sym15081563.
Testo completoGrassi, Lorenzo, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger e Roman Walch. "Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations". IACR Transactions on Symmetric Cryptology 2024, n. 3 (6 settembre 2024): 44–83. http://dx.doi.org/10.46586/tosc.v2024.i3.44-83.
Testo completoSteiner, Matthias Johann. "Solving Degree Bounds for Iterated Polynomial Systems". IACR Transactions on Symmetric Cryptology 2024, n. 1 (1 marzo 2024): 357–411. http://dx.doi.org/10.46586/tosc.v2024.i1.357-411.
Testo completoBoeuf, Aurélien, Anne Canteaut e Léo Perrin. "Propagation of Subspaces in Primitives with Monomial Sboxes: Applications to Rescue and Variants of the AES". IACR Transactions on Symmetric Cryptology 2023, n. 4 (8 dicembre 2023): 270–98. http://dx.doi.org/10.46586/tosc.v2023.i4.270-298.
Testo completoBudaghyan, Lilya, e Mohit Pal. "Arithmetization-oriented APN permutations". Designs, Codes and Cryptography, 18 settembre 2024. http://dx.doi.org/10.1007/s10623-024-01487-7.
Testo completoBariant, Augustin, Clémence Bouvier, Gaëtan Leurent e Léo Perrin. "Algebraic Attacks against Some Arithmetization-Oriented Primitives". IACR Transactions on Symmetric Cryptology, 9 settembre 2022, 73–101. http://dx.doi.org/10.46586/tosc.v2022.i3.73-101.
Testo completoAly, Abdelrahaman, Tomer Ashur, Eli Ben-Sasson, Siemen Dhooghe e Alan Szepieniec. "Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols". IACR Transactions on Symmetric Cryptology, 28 settembre 2020, 1–45. http://dx.doi.org/10.46586/tosc.v2020.i3.1-45.
Testo completoTesi sul tema "Arithmetization-Oriented"
Bariant, Augustin. "Analysis of AES-based and arithmetization-oriented symmetric cryptography primitives". Electronic Thesis or Diss., Sorbonne université, 2024. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2024SORUS182.pdf.
Testo completoCryptography plays a critical role in digital communication, by ensuring that malicious users cannot obtain sensitive information that do not belong to them. In symmetric cryptography, two parties agree on a secret key, and use a cipher to encrypt their communication, the most used of which being AES. However, the security of symmetric ciphers is not mathematically provable, therefore a lot of effort needs to be dedicated to cryptanalysis, i.e. the search for the best attacks.In this context, this thesis improves on some cryptanalysis techniques against AES-based ciphers. First, we present an attack on full ForkAES, together with an improved impossible differential attack on ForkSkinny. Second, we show some new boomerang attacks on 6-round AES and on several AES-based ciphers. In particular, we introduce a new boomerang attack framework, the truncated boomerang attack, that yields the best known attacks against Kiasu-BC, Deoxys-BC and TNT-AES.We also present an AES-based universal hash function framework, from which we design two AES-based MACs, LeMac and PetitMac. LeMac offers the best software performance among existing MAC algorithms on recent desktop CPUs.We finally study algebraic attacks against a new generation of symmetric primitives, called Arithmetization-Oriented (AO). We show that these attacks can be improved with symmetric techniques, and highlight that univariate attacks are much cheaper than multivariate attacks. We also present the FreeLunch attack, a new type of algebraic attack that challenges the security of several recent AO primitives
Bouvier, Clémence. "Cryptanalysis and design of symmetric primitives defined over large finite fields". Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS367.
Testo completoIn recent years, new symmetric cryptographic primitives have been proposed for advanced protocols, like multi-party computation, in combination with a fully homomorphic encryption or in various systems of zero-knowledge proofs. Such protocols are parts of a context marked by the development of cloud and blockchain technologies, and must therefore respond to the growing security concerns of users. These protocols have put forward the need to minimize the number of multiplications performed by the primitive in large finite fields. Classical symmetric algorithms are then inappropriate in this context and the new cryptographic protocols must be combined with symmetric primitives (encryption or hash function) with particular properties. While the number of designs defined over large fields, called "arithmetisation-oriented", is increasing significantly, few cryptanalysis works have been proposed. The first aim of this manuscript is then to contribute to fill this gap, and hence to better understand the specificities of these new objects. We also propose a new vision to design such primitives, covering both aspects of cryptology, the cryptography and the cryptanalysis
Capitoli di libri sul tema "Arithmetization-Oriented"
Bariant, Augustin, Aurélien Boeuf, Axel Lemoine, Irati Manterola Ayala, Morten Øygarden, Léo Perrin e Håvard Raddum. "The Algebraic FreeLunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives". In Lecture Notes in Computer Science, 139–73. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-68385-5_5.
Testo completoBouvier, Clémence, Pierre Briaud, Pyrros Chaidos, Léo Perrin, Robin Salen, Vesselin Velichkov e Danny Willems. "New Design Techniques for Efficient Arithmetization-Oriented Hash Functions: $$\texttt{Anemoi}$$ Permutations and $$\texttt{Jive}$$ Compression Mode". In Advances in Cryptology – CRYPTO 2023, 507–39. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38548-3_17.
Testo completoAtti di convegni sul tema "Arithmetization-Oriented"
Andreeva, Elena, Rishiraj Bhattacharyya, Arnab Roy e Stefano Trevisani. "On Efficient and Secure Compression Functions for Arithmetization-Oriented Hashing". In 2024 IEEE 37th Computer Security Foundations Symposium (CSF), 1–16. IEEE, 2024. http://dx.doi.org/10.1109/csf61375.2024.00045.
Testo completo