Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference22 articles.
1. Aly A., Ashur T., Ben-Sasson E., Dhooghe S., Szepieniec A.: Design of symmetric-key primitives for advanced cryptographic protocols. IACR Trans. Symm. Cryptol. 2020(3), 1–45 (2020).
2. Albrecht M.R., Cid C., Grassi L., Khovratovich D., Laftenegger R., Rechberger C., Schofnegger, M.: Algebraic cryptanalysis of STARK-friendly designs: Application to MARVELlous and MiMC. In: Galbraith S.D., Moriai S. (eds.) ASIACRYPT. Volume 11923 of LNCS. Springer, Heidelberg, pp. 319–397 (2019).
3. Albrecht M. R., Grassi L., Perrin L., Ramacher S., Rechberger C., Rotaru D., Roy A., Schofnegger M.: Feistel structures for MPC, and more. In: Kazue S., Steve S., Ryan Y. A. (eds.) ESORICS 2019, Part II
4. Albrecht M. R., Grassi L., Rechberger C., Roy A., Tyge T.: MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity. In: Cheon J. H., Takagi T. (eds) ASIACRYPT 2016, Part I, volume 10031 of LNCS. Springer, Heidelberg, pp. 191–219 (2016).
5. Aumasson J-.P., Meier W.: Zero-sum distinguishers for reduced Keccak-f and for the core functions of Luffa and Hamsi. Rump session of Cryptographic Hardware and Embedded Systems-CHES (2009).
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献