1. MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity;Cheon;Advances in Cryptology—ASIACRYPT 2016, Proceedings of the 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, 4–8 December 2016, Proceedings, Part I,2016
2. Feistel Structures for MPC, and More;Sako;Computer Security—ESORICS 2019, Proceedings of the 24th European Symposium on Research in Computer Security, Luxembourg, 23–27 September 2019, Proceedings, Part II,2019
3. On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy;Canteaut;Advances in Cryptology—EUROCRYPT 2020, Proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 10–14 May 2020, Proceedings, Part II,2020
4. Bailey, M., and Greenstadt, R. (2021). USENIX Security 2021, Proceedings of the 30th USENIX Security Symposium, 11–13 August 2021, Springer. USENIX Association.
5. Masta: An HE-Friendly Cipher Using Modular Arithmetic;Ha;IEEE Access,2020