Lorenzo Grassi

Orcid: 0000-0003-1140-0520

Affiliations:
  • Ruhr University Bochum, Germany
  • Radboud University, Nijmegen, The Netherlands (former)
  • TU Graz, Austria (former)


According to our database1, Lorenzo Grassi authored at least 53 papers between 2016 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Bounded Surjective Quadratic Functions over Fnp for MPC-/ZK-/FHE-Friendly Symmetric Primitives.
IACR Trans. Symmetric Cryptol., 2023

Pasta: A Case for Hybrid Homomorphic Encryption.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Coefficient Grouping for Complex Affine Layers.
IACR Cryptol. ePrint Arch., 2023

Poseidon2: A Faster Version of the Poseidon Hash Function.
IACR Cryptol. ePrint Arch., 2023

Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato.
IACR Cryptol. ePrint Arch., 2023

Invertible Quadratic Non-Linear Functions over 픽<sub>p<sup>n</sup></sub> via Multiple Local Maps.
IACR Cryptol. ePrint Arch., 2023

Hash Functions Monolith for ZK Applications: May the Speed of SHA-3 be With You.
IACR Cryptol. ePrint Arch., 2023

Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Invertible Quadratic Non-linear Functions over $\mathbb {F}_p^n$ via Multiple Local Maps.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2023, 2023

2022
Differential Trail Search in Cryptographic Primitives with Big-Circle Chi: Application to Subterranean.
IACR Trans. Symmetric Cryptol., 2022

Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes over Fnp Application to Poseidon.
IACR Trans. Symmetric Cryptol., 2022

The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over Fnp Preimage Attack on Full Grendel.
IACR Trans. Symmetric Cryptol., 2022

Influence of the Linear Layer on the Algebraic Degree in SP-Networks.
IACR Trans. Symmetric Cryptol., 2022

Security of Truncated Permutation Without Initial Value.
IACR Cryptol. ePrint Arch., 2022

From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications.
IACR Cryptol. ePrint Arch., 2022

A New Feistel Approach Meets Fluid-SPN: Griffin for Zero-Knowledge Applications.
IACR Cryptol. ePrint Arch., 2022

Weak Bijective Quadratic Functions over 픽<sub>p<sup>n</sup></sub>.
IACR Cryptol. ePrint Arch., 2022

On Generalizations of the Lai-Massey Scheme: the Birth of Amaryllises.
IACR Cryptol. ePrint Arch., 2022

Reinforced Concrete: A Fast Hash Function for Verifiable Computation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round AES.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer.
IACR Trans. Symmetric Cryptol., 2021

Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes over 픽<sub>p<sup>n</sup></sub>.
IACR Cryptol. ePrint Arch., 2021

The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over (F_p)^n.
IACR Cryptol. ePrint Arch., 2021

Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields.
IACR Cryptol. ePrint Arch., 2021

Reinforced Concrete: Fast Hash Function for Zero Knowledge Proofs and Verifiable Computation.
IACR Cryptol. ePrint Arch., 2021

Poseidon: A New Hash Function for Zero-Knowledge Proof Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Weak Linear Layers in Word-Oriented Partial SPN and HADES-Like Ciphers.
IACR Cryptol. ePrint Arch., 2020

An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC.
IACR Cryptol. ePrint Arch., 2020

Algebraic Key-Recovery Attacks on Reduced-Round Xoofff.
IACR Cryptol. ePrint Arch., 2020

Higher-Order Differentials of Ciphers with Low-Degree S-Boxes.
IACR Cryptol. ePrint Arch., 2020

Revisiting Gilbert's known-key distinguisher.
Des. Codes Cryptogr., 2020

Weak-Key Distinguishers for AES.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

2019
Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box.
IACR Cryptol. ePrint Arch., 2019

Weak-Key Subspace Trails and Applications to AES.
IACR Cryptol. ePrint Arch., 2019

On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy.
IACR Cryptol. ePrint Arch., 2019

Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems.
IACR Cryptol. ePrint Arch., 2019

Feistel Structures for MPC, and More.
IACR Cryptol. ePrint Arch., 2019

Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC.
IACR Cryptol. ePrint Arch., 2019

Probabilistic Mixture Differential Cryptanalysis on Round-Reduced AES.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

2018
Mixture Differential Cryptanalysis: a New Approach to Distinguishers and Attacks on round-reduced AES.
IACR Trans. Symmetric Cryptol., 2018

Rasta: A cipher with low ANDdepth and few ANDs per bit.
IACR Cryptol. ePrint Arch., 2018

Simulations of Optical Emissions for Attacking AES and Masked AES.
IACR Cryptol. ePrint Arch., 2018

New Rigorous Analysis of Truncated Differentials for 5-round AES.
IACR Cryptol. ePrint Arch., 2018

Quantum Algorithms for the k -xor Problem.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Zero-Sum Partitions of PHOTON Permutations.
IACR Cryptol. ePrint Arch., 2017

A New Structural-Differential Property of 5-Round AES.
IACR Cryptol. ePrint Arch., 2017

New Limits for AES Known-Key Distinguishers.
IACR Cryptol. ePrint Arch., 2017

MixColumns Properties and Attacks on (round-reduced) AES with a Single Secret S-Box.
IACR Cryptol. ePrint Arch., 2017

Mixture Differential Cryptanalysis: New Approaches for Distinguishers and Attacks on round-reduced AES.
IACR Cryptol. ePrint Arch., 2017

2016
MPC-Friendly Symmetric Key Primitives.
IACR Cryptol. ePrint Arch., 2016

Subspace Trail Cryptanalysis and its Applications to AES.
IACR Cryptol. ePrint Arch., 2016

MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity.
IACR Cryptol. ePrint Arch., 2016

Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE.
IACR Cryptol. ePrint Arch., 2016


  Loading...