The SPHINCS+ Signature Framework
We introduce SPHINCS+, a stateless hash-based signature framework. SPHINCS+ has
significant advantages over the state of the art in terms of speed, signature size, and …
significant advantages over the state of the art in terms of speed, signature size, and …
Ciphers for MPC and FHE
Designing an efficient cipher was always a delicate balance between linear and non-linear
operations. This goes back to the design of DES, and in fact all the way back to the seminal …
operations. This goes back to the design of DES, and in fact all the way back to the seminal …
[HTML][HTML] Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression
In typical applications of homomorphic encryption, the first step consists for Alice of
encrypting some plaintext m under Bob's public key pk pk and of sending the ciphertext c …
encrypting some plaintext m under Bob's public key pk pk and of sending the ciphertext c …
Towards stream ciphers for efficient FHE with low-noise ciphertexts
P Méaux, A Journault, FX Standaert… - Advances in Cryptology …, 2016 - Springer
Symmetric ciphers purposed for Fully Homomorphic Encryption (FHE) have recently been
proposed for two main reasons. First, minimizing the implementation (time and memory) …
proposed for two main reasons. First, minimizing the implementation (time and memory) …
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
Motivated by new applications such as secure Multi-Party Computation (MPC), Fully
Homomorphic Encryption (FHE), and Zero-Knowledge proofs (ZK), the need for symmetric …
Homomorphic Encryption (FHE), and Zero-Knowledge proofs (ZK), the need for symmetric …
Mobile private contact discovery at scale
Mobile messengers like WhatsApp perform contact discovery by uploading the user's entire
address book to the service provider. This allows the service provider to determine which of …
address book to the service provider. This allows the service provider to determine which of …
On a generalization of substitution-permutation networks: The HADES design strategy
L Grassi, R Lüftenegger, C Rechberger… - Advances in Cryptology …, 2020 - Springer
Keyed and unkeyed cryptographic permutations often iterate simple round functions.
Substitution-permutation networks (SPNs) are an approach that is popular since the mid …
Substitution-permutation networks (SPNs) are an approach that is popular since the mid …
Private set intersection for unequal set sizes with mobile applications
Private set intersection (PSI) is a cryptographic technique that is applicable to many privacy-
sensitive scenarios. For decades, researchers have been focusing on improving its …
sensitive scenarios. For decades, researchers have been focusing on improving its …
Rasta: a cipher with low ANDdepth and few ANDs per bit
Recent developments in multi party computation (MPC) and fully homomorphic encryption
(FHE) promoted the design and analysis of symmetric cryptographic schemes that minimize …
(FHE) promoted the design and analysis of symmetric cryptographic schemes that minimize …
: Noisy Ciphers for Approximate Homomorphic Encryption
A transciphering framework converts a symmetric ciphertext into a homomorphic ciphertext
on the server-side, reducing computational and communication overload on the client-side …
on the server-side, reducing computational and communication overload on the client-side …