The LowMC family of SPN block cipher proposed by Albrecht et al. was designed specifically for MPC-/FHE-/ZKP-friendly use cases. It is especially used as the underlying block cipher of PICNIC, one of the alternate third-round candidate digital signature algorithms for NIST post-quantum cryptography standardization. The security of PICNIC is highly related to the difficulty of recovering the secret key of LowMC from a given plaintext/ciphertext pair, which raises new challenges for security evaluation under extremely low data complexity.In this paper, we improve the attacks on LowMC under low data complexity, i.e. 1 or 2 chosen plaintext/ciphertext pairs. For the difference enumeration attack with 2 chosen plaintexts, we propose new algebrai...
In the summer of 2013 NSA released a new family of lightweight block ciphers called SIMON. However t...
The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and pr...
Recently, the Little Dragon Two and Poly-Dragon multivariate based public-key cryptosystems were pr...
The LowMC family of SPN block cipher proposed by Albrecht et al. was designed specifically for MPC-/...
The security of the post-quantum signature scheme Picnic is highly related to the difficulty of reco...
In this paper, we revisit the difference enumeration technique for LowMC and develop new algebraic t...
Arguably one of the main applications of the LowMC family ciphers is in the post-quantum signature s...
Cryptanalysis of the LowMC block cipher when the attacker has access to a single known plaintext/cip...
Picnic is a practical approach to digital signatures where the security is primarily based on the ex...
LowMC is a family of block ciphers designed for a low multiplicative complexity. The specification a...
Abstract. LowMC is a collection of block cipher families introduced at Eurocrypt 2015 by Albrecht et...
Abstract. LowMC is a family of block ciphers developed particularly for use in multi-party computati...
The design and analysis of lightweight block ciphers is gaining increasing popularity due to the gen...
Designing novel symmetric-key primitives for advanced protocols like secure multiparty computation (...
The contributions of this paper include the first linear hull and a revisit of the algebraic cryptan...
In the summer of 2013 NSA released a new family of lightweight block ciphers called SIMON. However t...
The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and pr...
Recently, the Little Dragon Two and Poly-Dragon multivariate based public-key cryptosystems were pr...
The LowMC family of SPN block cipher proposed by Albrecht et al. was designed specifically for MPC-/...
The security of the post-quantum signature scheme Picnic is highly related to the difficulty of reco...
In this paper, we revisit the difference enumeration technique for LowMC and develop new algebraic t...
Arguably one of the main applications of the LowMC family ciphers is in the post-quantum signature s...
Cryptanalysis of the LowMC block cipher when the attacker has access to a single known plaintext/cip...
Picnic is a practical approach to digital signatures where the security is primarily based on the ex...
LowMC is a family of block ciphers designed for a low multiplicative complexity. The specification a...
Abstract. LowMC is a collection of block cipher families introduced at Eurocrypt 2015 by Albrecht et...
Abstract. LowMC is a family of block ciphers developed particularly for use in multi-party computati...
The design and analysis of lightweight block ciphers is gaining increasing popularity due to the gen...
Designing novel symmetric-key primitives for advanced protocols like secure multiparty computation (...
The contributions of this paper include the first linear hull and a revisit of the algebraic cryptan...
In the summer of 2013 NSA released a new family of lightweight block ciphers called SIMON. However t...
The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and pr...
Recently, the Little Dragon Two and Poly-Dragon multivariate based public-key cryptosystems were pr...