MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity
… We explore cryptographic primitives with low multiplicative complexity. This is … encryption
(FHE), and zero-knowledge proofs (ZK) where primitives from symmetric cryptography are …
(FHE), and zero-knowledge proofs (ZK) where primitives from symmetric cryptography are …
Improved interpolation attacks on cryptographic primitives of low algebraic degree
… cryptographic primitives with low multiplicative complexity have … to be vital to improve the
efficiency of these protocols. The … of the MiMC designers who consider attacks with less than \(2^…
efficiency of these protocols. The … of the MiMC designers who consider attacks with less than \(2^…
Feistel structures for MPC, and more
… PQ signature schemes where MiMC was not competitive at all, … on the complexity of PRGs,
PRFs, and cryptographic hashes [8, … on the multiplicative complexity we refer to the [3, Sect. 6]. …
PRFs, and cryptographic hashes [8, … on the multiplicative complexity we refer to the [3, Sect. 6]. …
AMAZE: Accelerated MiMC Hardware Architecture for Zero-Knowledge Applications on the Edge
A Ahmed, N Sheybani, D Moreno, NB Njungle… - arXiv preprint arXiv …, 2024 - arxiv.org
… MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity.
In International Conference on the Theory and Application of Cryptology and Information …
In International Conference on the Theory and Application of Cryptology and Information …
An algebraic attack on ciphers with low-degree round functions: application to full MiMC
M Eichlseder, L Grassi, R Lüftenegger… - Advances in Cryptology …, 2020 - Springer
… Algebraically simple PRFs, ciphers, or cryptographic hash … of rounds with a minimal security
margin for efficiency. For a … that benefit from a low multiplication count or algebraic simplicity […
margin for efficiency. For a … that benefit from a low multiplication count or algebraic simplicity […
On the field-based division property: applications to MiMC, Feistel MiMC and GMiMC
… field-based operations, which can be efficiently modeled using the bit-… with lower data
complexities for \(d=5,9,17\). Our results for … Notice that we make no distinction between the secret …
complexities for \(d=5,9,17\). Our results for … Notice that we make no distinction between the secret …
Bounded Surjective Quadratic Functions over for MPC-/ZK-/FHE-Friendly Symmetric Primitives
L Grassi - Cryptology ePrint Archive, 2022 - eprint.iacr.org
… functions – are typically designed by iterating an efficiently implementable … multiplicative
complexity by instantiating it with the square map. We refer to this modified version of MiMC …
complexity by instantiating it with the square map. We refer to this modified version of MiMC …
[PDF][PDF] MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
A Roy - iacr.org
… Sponge mode instantiated by MiMC permutation with a fixed key In the SNARK setting
we use MiMC-n/n It is possible to use MiMC-2n/n for large block size … Towards stream …
we use MiMC-n/n It is possible to use MiMC-2n/n for large block size … Towards stream …
Collisions on feistel-mimc and univariate gmimc
X Bonnetain - 2019 - inria.hal.science
… and hash functions. In this note, we show that the block ciphers MiMC-2n/n (or FeistelMiMC) …
As there is no key in this construction, it is unclear how Theorem 1 could be used to attack …
As there is no key in this construction, it is unclear how Theorem 1 could be used to attack …
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
… representing the complexity of matrix multiplication and \(D_{\… – finite field inversion and
low-degree linearised polynomials … , which can in turn be efficiently solved using our three-step …
low-degree linearised polynomials … , which can in turn be efficiently solved using our three-step …