Lorenzo Grassi

Orcid: 0000-0003-1140-0520

Affiliations:
  • Technology University of Eindhoven, The Netherlands
  • Ruhr University Bochum, Germany (former)
  • Radboud University, Nijmegen, The Netherlands (former)
  • TU Graz, Austria (former)


According to our database1, Lorenzo Grassi authored at least 65 papers between 2015 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
On generalizations of the Lai-Massey scheme.
Des. Codes Cryptogr., October, 2025

Poseidon and Neptune: Gröbner Basis Cryptanalysis Exploiting Subspace Trails.
IACR Cryptol. ePrint Arch., 2025

Poseidon2b: A Binary Field Version of Poseidon2.
IACR Cryptol. ePrint Arch., 2025

Skyscraper: Fast Hashing on Big Primes.
IACR Cryptol. ePrint Arch., 2025

mid-pSquare: Leveraging the Strong Side-Channel Security of Prime-Field Masking in Software.
IACR Cryptol. ePrint Arch., 2025

2024
Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations.
IACR Trans. Symmetric Cryptol., 2024

Opening the Blackbox: Collision Attacks on Round-Reduced Tip5, Tip4, Tip4' and Monolith.
IACR Cryptol. ePrint Arch., 2024

Generalized Feistel Ciphers for Efficient Prime Field Masking - Full Version.
IACR Cryptol. ePrint Arch., 2024

Minimize the Randomness in Rasta-Like Designs: How Far Can We Go?
IACR Cryptol. ePrint Arch., 2024

Minimize the Randomness in Rasta-Like Designs: How Far Can We Go? - Application to Pasta.
Proceedings of the Selected Areas in Cryptography - SAC 2024, 2024

Generalized Feistel Ciphers for Efficient Prime Field Masking.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

General Practical Cryptanalysis of the Sum of Round-Reduced Block Ciphers and ZIP-AES.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Bounded Surjective Quadratic Functions over Fnp for MPC-/ZK-/FHE-Friendly Symmetric Primitives.
IACR Trans. Symmetric Cryptol., 2023

Invertible Quadratic Non-Linear Functions over 픽<sub>p<sup>n</sup></sub> via Multiple Local Maps.
IACR Cryptol. ePrint Arch., 2023

Hash Functions Monolith for ZK Applications: May the Speed of SHA-3 be With You.
IACR Cryptol. ePrint Arch., 2023

From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Coefficient Grouping for Complex Affine Layers.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Poseidon2: A Faster Version of the Poseidon Hash Function.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2023, 2023

Invertible Quadratic Non-linear Functions over $\mathbb {F}_p^n$ via Multiple Local Maps.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2023, 2023

2022
Differential Trail Search in Cryptographic Primitives with Big-Circle Chi: Application to Subterranean.
IACR Trans. Symmetric Cryptol., 2022

Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes over Fnp Application to Poseidon.
IACR Trans. Symmetric Cryptol., 2022

The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over Fnp Preimage Attack on Full Grendel.
IACR Trans. Symmetric Cryptol., 2022

Influence of the Linear Layer on the Algebraic Degree in SP-Networks.
IACR Trans. Symmetric Cryptol., 2022

A New Feistel Approach Meets Fluid-SPN: Griffin for Zero-Knowledge Applications.
IACR Cryptol. ePrint Arch., 2022

Weak Bijective Quadratic Functions over 픽<sub>p<sup>n</sup></sub>.
IACR Cryptol. ePrint Arch., 2022

On Generalizations of the Lai-Massey Scheme: the Birth of Amaryllises.
IACR Cryptol. ePrint Arch., 2022

Reinforced Concrete: A Fast Hash Function for Verifiable Computation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Security of Truncated Permutation Without Initial Value.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round AES.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer.
IACR Trans. Symmetric Cryptol., 2021

Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes over 픽<sub>p<sup>n</sup></sub>.
IACR Cryptol. ePrint Arch., 2021

The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over (F_p)^n.
IACR Cryptol. ePrint Arch., 2021

Pasta: A Case for Hybrid Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2021

Reinforced Concrete: Fast Hash Function for Zero Knowledge Proofs and Verifiable Computation.
IACR Cryptol. ePrint Arch., 2021

Poseidon: A New Hash Function for Zero-Knowledge Proof Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
Weak Linear Layers in Word-Oriented Partial SPN and HADES-Like Ciphers.
IACR Cryptol. ePrint Arch., 2020

Higher-Order Differentials of Ciphers with Low-Degree S-Boxes.
IACR Cryptol. ePrint Arch., 2020

Revisiting Gilbert's known-key distinguisher.
Des. Codes Cryptogr., 2020

Weak-Key Distinguishers for AES.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

Algebraic Key-Recovery Attacks on Reduced-Round Xoofff.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Weak-Key Subspace Trails and Applications to AES.
IACR Cryptol. ePrint Arch., 2019

Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems.
IACR Cryptol. ePrint Arch., 2019

Probabilistic Mixture Differential Cryptanalysis on Round-Reduced AES.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

Feistel Structures for MPC, and More.
Proceedings of the Computer Security - ESORICS 2019, 2019

Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Mixture Differential Cryptanalysis: a New Approach to Distinguishers and Attacks on round-reduced AES.
IACR Trans. Symmetric Cryptol., 2018

New Rigorous Analysis of Truncated Differentials for 5-round AES.
IACR Cryptol. ePrint Arch., 2018

Zero-Sum Partitions of PHOTON Permutations.
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018

MixColumns Properties and Attacks on (Round-Reduced) AES with a Single Secret S-Box.
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018

Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Quantum Algorithms for the k -xor Problem.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
New Limits for AES Known-Key Distinguishers.
IACR Cryptol. ePrint Arch., 2017

Mixture Differential Cryptanalysis: New Approaches for Distinguishers and Attacks on round-reduced AES.
IACR Cryptol. ePrint Arch., 2017

A New Structural-Differential Property of 5-Round AES.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

2016
Subspace Trail Cryptanalysis and its Applications to AES.
IACR Cryptol. ePrint Arch., 2016

Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

MPC-Friendly Symmetric Key Primitives.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Simulations of Optical Emissions for Attacking AES and Masked AES.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015


  Loading...