MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity

M Albrecht, L Grassi, C Rechberger, A Roy… - … Conference on the …, 2016 - Springer
… We explore cryptographic primitives with low multiplicative complexity. This is … encryption
(FHE), and zero-knowledge proofs (ZK) where primitives from symmetric cryptography are …

Improved interpolation attacks on cryptographic primitives of low algebraic degree

C Li, B Preneel - … conference on selected areas in cryptography, 2019 - Springer
cryptographic primitives with low multiplicative complexity have … to be vital to improve the
efficiency of these protocols. The … of the MiMC designers who consider attacks with less than \(2^…

Feistel structures for MPC, and more

MR Albrecht, L Grassi, L Perrin, S Ramacher… - … –ESORICS 2019: 24th …, 2019 - Springer
… PQ signature schemes where MiMC was not competitive at all, … on the complexity of PRGs,
PRFs, and cryptographic hashes [8, … on the multiplicative complexity we refer to the [3, Sect. 6]. …

AMAZE: Accelerated MiMC Hardware Architecture for Zero-Knowledge Applications on the Edge

A Ahmed, N Sheybani, D Moreno, NB Njungle… - arXiv preprint arXiv …, 2024 - arxiv.org
MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity.
In International Conference on the Theory and Application of Cryptology and Information …

An algebraic attack on ciphers with low-degree round functions: application to full MiMC

M Eichlseder, L Grassi, R Lüftenegger… - Advances in Cryptology …, 2020 - Springer
… Algebraically simple PRFs, ciphers, or cryptographic hash … of rounds with a minimal security
margin for efficiency. For a … that benefit from a low multiplication count or algebraic simplicity […

On the field-based division property: applications to MiMC, Feistel MiMC and GMiMC

J Cui, K Hu, M Wang, P Wei - International Conference on the Theory and …, 2022 - Springer
… field-based operations, which can be efficiently modeled using the bit-… with lower data
complexities for \(d=5,9,17\). Our results for … Notice that we make no distinction between the secret …

Bounded Surjective Quadratic Functions over for MPC-/ZK-/FHE-Friendly Symmetric Primitives

L Grassi - Cryptology ePrint Archive, 2022 - eprint.iacr.org
… functions – are typically designed by iterating an efficiently implementable … multiplicative
complexity by instantiating it with the square map. We refer to this modified version of MiMC

[PDF][PDF] MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity

A Roy - iacr.org
… Sponge mode instantiated by MiMC permutation with a fixed key In the SNARK setting
we use MiMC-n/n It is possible to use MiMC-2n/n for large block size … Towards stream …

Collisions on feistel-mimc and univariate gmimc

X Bonnetain - 2019 - inria.hal.science
… and hash functions. In this note, we show that the block ciphers MiMC-2n/n (or FeistelMiMC) …
As there is no key in this construction, it is unclear how Theorem 1 could be used to attack …

Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

MR Albrecht, C Cid, L Grassi, D Khovratovich… - Advances in Cryptology …, 2019 - Springer
… representing the complexity of matrix multiplication and \(D_{\… – finite field inversion and
low-degree linearised polynomials … , which can in turn be efficiently solved using our three-step …