The SPHINCS+ Signature Framework

DJ Bernstein, A Hülsing, S Kölbl… - Proceedings of the …, 2019 - dl.acm.org
We introduce SPHINCS+, a stateless hash-based signature framework. SPHINCS+ has
significant advantages over the state of the art in terms of speed, signature size, and …

Ciphers for MPC and FHE

MR Albrecht, C Rechberger, T Schneider… - Advances in Cryptology …, 2015 - Springer
Designing an efficient cipher was always a delicate balance between linear and non-linear
operations. This goes back to the design of DES, and in fact all the way back to the seminal …

[HTML][HTML] Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression

A Canteaut, S Carpov, C Fontaine, T Lepoint… - Journal of …, 2018 - Springer
In typical applications of homomorphic encryption, the first step consists for Alice of
encrypting some plaintext m under Bob's public key pk pk and of sending the ciphertext c …

Towards stream ciphers for efficient FHE with low-noise ciphertexts

P Méaux, A Journault, FX Standaert… - Advances in Cryptology …, 2016 - Springer
Symmetric ciphers purposed for Fully Homomorphic Encryption (FHE) have recently been
proposed for two main reasons. First, minimizing the implementation (time and memory) …

Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields

C Dobraunig, L Grassi, A Guinet, D Kuijsters - … International Conference on …, 2021 - Springer
Motivated by new applications such as secure Multi-Party Computation (MPC), Fully
Homomorphic Encryption (FHE), and Zero-Knowledge proofs (ZK), the need for symmetric …

Mobile private contact discovery at scale

D Kales, C Rechberger, T Schneider… - 28th USENIX Security …, 2019 - usenix.org
Mobile messengers like WhatsApp perform contact discovery by uploading the user's entire
address book to the service provider. This allows the service provider to determine which of …

On a generalization of substitution-permutation networks: The HADES design strategy

L Grassi, R Lüftenegger, C Rechberger… - Advances in Cryptology …, 2020 - Springer
Keyed and unkeyed cryptographic permutations often iterate simple round functions.
Substitution-permutation networks (SPNs) are an approach that is popular since the mid …

Private set intersection for unequal set sizes with mobile applications

Á Kiss, J Liu, T Schneider, N Asokan… - Privacy Enhancing …, 2017 - research.aalto.fi
Private set intersection (PSI) is a cryptographic technique that is applicable to many privacy-
sensitive scenarios. For decades, researchers have been focusing on improving its …

Rasta: a cipher with low ANDdepth and few ANDs per bit

C Dobraunig, M Eichlseder, L Grassi… - Advances in Cryptology …, 2018 - Springer
Recent developments in multi party computation (MPC) and fully homomorphic encryption
(FHE) promoted the design and analysis of symmetric cryptographic schemes that minimize …

: Noisy Ciphers for Approximate Homomorphic Encryption

J Ha, S Kim, BH Lee, J Lee, M Son - … on the Theory and Applications of …, 2022 - Springer
A transciphering framework converts a symmetric ciphertext into a homomorphic ciphertext
on the server-side, reducing computational and communication overload on the client-side …