|
[1]
|
Albrecht, M., Grassi, L., Rechberger, C., Roy, A. and Tiessen, T. (2016) MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. In: Cheon, J. and Takagi, T., Eds., Advances in Cryptology—ASIACRYPT 2016, Springer, 191-219. [Google Scholar] [CrossRef]
|
|
[2]
|
Albrecht, M.R., Grassi, L., Perrin, L., Ramacher, S., Rechberger, C., Rotaru, D., et al. (2019) Feistel Structures for MPC, and More. In: Sako, K., Schneider, S. and Ryan, P., Eds., Computer Security—ESORICS 2019, Springer, 151-171. [Google Scholar] [CrossRef]
|
|
[3]
|
Grassi, L., Lüftenegger, R., Rechberger, C., Rotaru, D. and Schofnegger, M. (2020) On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy. In: Canteaut, A. and Ishai, Y., Eds., Advances in Cryptology—EUROCRYPT 2020, Springer, 674-704. [Google Scholar] [CrossRef]
|
|
[4]
|
Aly, A., Ashur, T., Ben-Sasson, E., Dhooghe, S. and Szepieniec, A. (2020) Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols. IACR Transactions on Symmetric Cryptology, 2020, 1-45. [Google Scholar] [CrossRef]
|
|
[5]
|
Grassi, L., Khovratovich, D., Rechberger, C., Roy, A. and Schofnegger, M. (2021) Poseidon: A New Hash Function for Zero-Knowledge Proof Systems. Proceedings of the 30th USENIX Security Symposium (USENIX Security 21), 11-13 August 2021, 519-535. https://www.usenix.org/conference/usenixsecurity21/presentation/grassi
|
|
[6]
|
Ha, J., Kim, S., Choi, W., Lee, J., Moon, D., Yoon, H., et al. (2020) Masta: An He-Friendly Cipher Using Modular Arithmetic. IEEE Access, 8, 194741-194751. [Google Scholar] [CrossRef]
|
|
[7]
|
Dobraunig, C., Grassi, L., Guinet, A. and Kuijsters, D. (2021) Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields. In: Canteaut, A. and Standaert, F.X., Eds., Advances in Cryptology—EUROCRYPT 2021, Springer, 3-34. [Google Scholar] [CrossRef]
|
|
[8]
|
Grassi, L., Onofri, S., Pedicini, M. and Sozzi, L. (2022) Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes over Fnp. IACR Transactions on Symmetric Cryptology, 2022, 20-72. [Google Scholar] [CrossRef]
|
|
[9]
|
Wolfram, S. (1986) Cryptography with Cellular Automata. In: Williams, H.C., Ed., Advances in Cryptology—CRYPTO’85 Proceedings, Springer, 429-432. [Google Scholar] [CrossRef]
|
|
[10]
|
Daemen, J. (1995) Cipher and Hash Function Design: Strategies Based on Linear and Differential Cryptanalysis. Ph.D. Thesis, Katholieke Universiteit Leuven. https://cs.ru.nl/~joan/
|
|
[11]
|
Bertoni, G., Daemen, J., Peeters, M. and Van Assche, G. (2011) The Keccak Reference, Version 3.0. https://keccak.team/files/Keccak-reference-3.0.pdf
|
|
[12]
|
Bertoni, G., Daemen, J., Peeters, M. and Van Assche, G. (2013) Keccak. In: Johansson, T. and Nguyen, P.Q., Eds., Advances in Cryptology—EUROCRYPT 2013, Springer, 313-314. [Google Scholar] [CrossRef]
|
|
[13]
|
Lai, X. and Massey, J.L. (1991) A Proposal for a New Block Encryption Standard. In: Damgård, I.B., Ed., Advances in Cryptology—EUROCRYPT’90, Springer, 389-404. [Google Scholar] [CrossRef]
|