{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T11:07:57Z","timestamp":1775732877098,"version":"3.50.1"},"publisher-location":"Cham","reference-count":65,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032226976","type":"print"},{"value":"9783032226983","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-22698-3_6","type":"book-chapter","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T10:24:49Z","timestamp":1775730289000},"page":"178-203","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["PETCHA: Post-quantum Efficient Transciphering with\u00a0ChaCha"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5110-6639","authenticated-orcid":false,"given":"Antonio","family":"Guimar\u00e3es","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6827-2810","authenticated-orcid":false,"given":"Gabriela M.","family":"Jacob","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1303-3760","authenticated-orcid":false,"given":"Hilder V. L.","family":"Pereira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,10]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","unstructured":"Al\u00a0Badawi, A., et al.: OpenFHE: open-source fully homomorphic encryption library. In: Proceedings of the 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, pp. 53\u201363. WAHC\u201922, New York, NY, USA. Association for Computing Machinery (2022). https:\/\/doi.org\/10.1145\/3560827.3563379","DOI":"10.1145\/3560827.3563379"},{"issue":"3","key":"6_CR2","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1515\/jmc-2015-0016","volume":"9","author":"MR Albrecht","year":"2015","unstructured":"Albrecht, M.R., Player, R., Scott, S.: On the concrete hardness of learning with errors. J. Math. Cryptol. 9(3), 169\u2013203 (2015). https:\/\/doi.org\/10.1515\/jmc-2015-0016","journal-title":"J. Math. Cryptol."},{"key":"6_CR3","doi-asserted-by":"publisher","unstructured":"Albrecht, M.R., Rechberger, C., Schneider, T., Tiessen, T., Zohner, M.: Ciphers for MPC and FHE. In: Oswald, E., Fischlin, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02015, Part\u00a0I. LNCS, vol.\u00a09056, pp. 430\u2013454. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46800-5_17","DOI":"10.1007\/978-3-662-46800-5_17"},{"key":"6_CR4","doi-asserted-by":"publisher","unstructured":"Aranha, D.F., Guimar\u00e3es, A., Hoffmann, C., M\u00e9aux, P.: Secure and efficient transciphering for FHE-based MPC. IACR Trans. Cryptographic Hardware Embedded Syst. 2025(3), 745\u2013780 (2025). https:\/\/doi.org\/10.46586\/tches.v2025.i3.745-780","DOI":"10.46586\/tches.v2025.i3.745-780"},{"key":"6_CR5","unstructured":"Aumasson, J.P.: Too much crypto. Cryptology ePrint Archive, Report 2019\/1492 (2019), https:\/\/eprint.iacr.org\/2019\/1492"},{"key":"6_CR6","doi-asserted-by":"publisher","unstructured":"Aumasson, J.P., Fischer, S., Khazaei, S., Meier, W., Rechberger, C.: New features of Latin dances: analysis of Salsa, ChaCha, and Rumba. In: Nyberg, K. (ed.) FSE\u00a02008. LNCS, vol.\u00a05086, pp. 470\u2013488. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-71039-4_30","DOI":"10.1007\/978-3-540-71039-4_30"},{"key":"6_CR7","doi-asserted-by":"publisher","unstructured":"Balenbois, T., Orfila, J.B., Smart, N.: Trivial transciphering with trivium and TFHE. In: Proceedings of the 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. WAHC \u201923, New York, NY, USA, pp. 69\u201378. Association for Computing Machinery (2023). https:\/\/doi.org\/10.1145\/3605759.3625255","DOI":"10.1145\/3605759.3625255"},{"key":"6_CR8","doi-asserted-by":"publisher","unstructured":"Baudrin, J., et al.: Transistor: a TFHE-friendly stream cipher. In: Kalai, Y.T., Kamara, S.F. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02025, Part\u00a0V. LNCS, vol. 16004, pp. 530\u2013565. Springer, Cham (2025). https:\/\/doi.org\/10.1007\/978-3-032-01901-1_17","DOI":"10.1007\/978-3-032-01901-1_17"},{"key":"6_CR9","doi-asserted-by":"publisher","unstructured":"Bela\u00efd, S., Bon, N., Boudguiga, A., Sirdey, R., Trama, D., Ye, N.: Further improvements in AES execution over TFHE. IACR Commun. Cryptol. (CiC) 2(1), 39 (2025). https:\/\/doi.org\/10.62056\/ahmp-4tw9","DOI":"10.62056\/ahmp-4tw9"},{"key":"6_CR10","unstructured":"Bernstein, D.J.: ChaCha, a variant of Salsa20. Workshop Record of SASC 2008: The State of the Art of Stream Ciphers (2008). https:\/\/cr.yp.to\/chacha\/chacha-20080128.pdf"},{"key":"6_CR11","doi-asserted-by":"publisher","unstructured":"Bernstein, D.J.: The Salsa20 family of stream ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs, LNCS, vol.\u00a04986, pp. 84\u201397. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-68351-3_7","DOI":"10.1007\/978-3-540-68351-3_7"},{"key":"6_CR12","doi-asserted-by":"publisher","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: Keccak. In: Advances in Cryptology - EUROCRYPT 2013. LNCS, vol.\u00a07881, pp. 313\u2013314. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38348-9_19, https:\/\/www.iacr.org\/archive\/eurocrypt2013\/78810311\/78810311.pdf, invited paper","DOI":"10.1007\/978-3-642-38348-9_19"},{"key":"6_CR13","doi-asserted-by":"publisher","unstructured":"Bon, N., Pointcheval, D., Rivain, M.: Optimized homomorphic evaluation of Boolean functions. IACR Trans. Cryptographic Hardware Embedded Syst. 2024(3), 302\u2013341 (2024). https:\/\/doi.org\/10.46586\/tches.v2024.i3.302-341","DOI":"10.46586\/tches.v2024.i3.302-341"},{"key":"6_CR14","doi-asserted-by":"publisher","unstructured":"Bonte, C., Iliashenko, I., Park, J., Pereira, H.V.L., Smart, N.P.: FINAL: faster FHE instantiated with NTRU and LWE. In: Agrawal, S., Lin, D. (eds.) ASIACRYPT\u00a02022, Part\u00a0II. LNCS, vol. 13792, pp. 188\u2013215. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-22966-4_7","DOI":"10.1007\/978-3-031-22966-4_7"},{"key":"6_CR15","unstructured":"Bonte, C., Nicolas, G., Smart, N.P.: Complex elections via threshold (fully) homomorphic encryption. Cryptology ePrint Archive, Paper 2025\/1482 (2025). https:\/\/eprint.iacr.org\/2025\/1482"},{"key":"6_CR16","unstructured":"Boura, C., Gama, N., Georgieva, M., Jetchev, D.: Simulating homomorphic evaluation of deep learning predictions. Cryptology ePrint Archive, Report 2019\/591 (2019). https:\/\/eprint.iacr.org\/2019\/591"},{"key":"6_CR17","doi-asserted-by":"publisher","unstructured":"Bourse, F., Sanders, O., Traor\u00e9, J.: Improved secure integer comparison via homomorphic encryption. In: Jarecki, S. (ed.) CT-RSA\u00a02020. LNCS, vol. 12006, pp. 391\u2013416. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-40186-3_17","DOI":"10.1007\/978-3-030-40186-3_17"},{"key":"6_CR18","doi-asserted-by":"publisher","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. In: Goldwasser, S. (ed.) ITCS 2012: 3rd Innovations in Theoretical Computer Science, Cambridge, MA, USA, pp. 309\u2013325. Association for Computing Machinery (2012). https:\/\/doi.org\/10.1145\/2090236.2090262","DOI":"10.1145\/2090236.2090262"},{"key":"6_CR19","doi-asserted-by":"publisher","unstructured":"Canteaut, A., et al.: Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression. In: Peyrin, T. (ed.) FSE\u00a02016. LNCS, vol.\u00a09783, pp. 313\u2013333. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-52993-5_16","DOI":"10.1007\/978-3-662-52993-5_16"},{"key":"6_CR20","doi-asserted-by":"publisher","unstructured":"Carpov, S., Izabach\u00e8ne, M., Mollimard, V.: New techniques for multi-value input homomorphic evaluation and applications. In: Matsui, M. (ed.) CT-RSA\u00a02019. LNCS, vol. 11405, pp. 106\u2013126. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-12612-4_6","DOI":"10.1007\/978-3-030-12612-4_6"},{"key":"6_CR21","doi-asserted-by":"publisher","unstructured":"Chacal, N., Guimar\u00e3es, A., Martinelli, A., M\u00e9aux, P., Poussier, R.: Nostalgia cipher: can filtered LFSRs be secure again? An application to hybrid homomorphic encryption with Sub-50 ms Latency. IACR Trans. Symmetric Cryptol. 2025(4), 1\u201330 (Dec 2025). https:\/\/doi.org\/10.46586\/tosc.v2025.i4.1-30, https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/12609","DOI":"10.46586\/tosc.v2025.i4.1-30"},{"key":"6_CR22","doi-asserted-by":"publisher","unstructured":"Chen, H., Dai, W., Kim, M., Song, Y.: Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference. In: Cavallaro, L., Kinder, J., Wang, X., Katz, J. (eds.) ACM CCS 2019: 26th Conference on Computer and Communications Security, London, UK, pp. 395\u2013412. ACM Press (2019). https:\/\/doi.org\/10.1145\/3319535.3363207","DOI":"10.1145\/3319535.3363207"},{"key":"6_CR23","doi-asserted-by":"publisher","unstructured":"Cheon, J.H., Choe, H., Passel\u00e8gue, A., Stehl\u00e9, D., Suvanto, E.: Attacks against the IND-CPA$$^{\\text{D}}$$ security of exact FHE schemes. In: Luo, B., Liao, X., Xu, J., Kirda, E., Lie, D. (eds.) ACM CCS 2024: 31st Conference on Computer and Communications Security, Salt Lake City, UT, USA, pp. 2505\u20132519. ACM Press (2024). https:\/\/doi.org\/10.1145\/3658644.3690341","DOI":"10.1145\/3658644.3690341"},{"key":"6_CR24","doi-asserted-by":"publisher","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds. In: Cheon, J.H., Takagi, T. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02016, Part\u00a0I. LNCS, vol. 10031, pp. 3\u201333. Springer Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53887-6_1","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"6_CR25","doi-asserted-by":"publisher","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: TFHE: Fast fully homomorphic encryption over the torus. J. Cryptol. 33(1), 34\u201391 (2020). https:\/\/doi.org\/10.1007\/s00145-019-09319-x","DOI":"10.1007\/s00145-019-09319-x"},{"key":"6_CR26","doi-asserted-by":"publisher","unstructured":"Chillotti, I., Ligier, D., Orfila, J.B., Tap, S.: Improved programmable bootstrapping with larger precision and efficient arithmetic circuits for TFHE. In: Tibouchi, M., Wang, H. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02021, Part\u00a0III. LNCS, vol. 13092, pp. 670\u2013699. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92078-4_23","DOI":"10.1007\/978-3-030-92078-4_23"},{"key":"6_CR27","doi-asserted-by":"publisher","unstructured":"Cho, M., Chung, W., Ha, J., Lee, J., Oh, E.G., Son, M.: FRAST: TFHE-friendly cipher based on random S-boxes. IACR Trans. Symmetric Cryptol. 2024(3), 1\u201343 (2024). https:\/\/doi.org\/10.46586\/tosc.v2024.i3.1-43","DOI":"10.46586\/tosc.v2024.i3.1-43"},{"key":"6_CR28","doi-asserted-by":"publisher","unstructured":"Cong, K., Das, D., Park, J., Pereira, H.V.: Sortinghat: Efficient private decision tree evaluation via homomorphic encryption and transciphering. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. CCS \u201922, New York, NY, USA, pp. 563\u2013577. Association for Computing Machinery (2022). https:\/\/doi.org\/10.1145\/3548606.3560702","DOI":"10.1145\/3548606.3560702"},{"key":"6_CR29","doi-asserted-by":"publisher","unstructured":"Cosseron, O., Hoffmann, C., M\u00e9aux, P., Standaert, F.X.: Towards case-optimized hybrid homomorphic encryption - featuring the Elisabeth stream cipher. In: Agrawal, S., Lin, D. (eds.) ASIACRYPT\u00a02022, Part\u00a0III. LNCS, vol. 13793, pp. 32\u201367. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-22969-5_2","DOI":"10.1007\/978-3-031-22969-5_2"},{"key":"6_CR30","doi-asserted-by":"publisher","unstructured":"Dobraunig, C., et al.: Rasta: a cipher with low ANDdepth and few ANDs per bit. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO\u00a02018, Part\u00a0I. LNCS, vol. 10991, pp. 662\u2013692. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96884-1_22","DOI":"10.1007\/978-3-319-96884-1_22"},{"key":"6_CR31","doi-asserted-by":"publisher","unstructured":"Dobraunig, C., Grassi, L., Helminger, L., Rechberger, C., Schofnegger, M., Walch, R.: Pasta: a case for hybrid homomorphic encryption. IACR Trans. Cryptographic Hardware Embedded Syst. 2023(3), 30\u201373 (2023). https:\/\/doi.org\/10.46586\/tches.v2023.i3.30-73","DOI":"10.46586\/tches.v2023.i3.30-73"},{"key":"6_CR32","doi-asserted-by":"publisher","unstructured":"Ducas, L., Micciancio, D.: FHEW: bootstrapping homomorphic encryption in less than a second. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT\u00a02015, Part\u00a0I. LNCS, vol.\u00a09056, pp. 617\u2013640. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46800-5_24","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"6_CR33","doi-asserted-by":"publisher","unstructured":"Fl\u00f3rez-Guti\u00e9rrez, A., Todo, Y.: Improved cryptanalysis of ChaCha: beating PNBs with bit puncturing. In: Fehr, S., Fouque, P.A. (eds.) EUROCRYPT\u00a02025, Part\u00a0I. LNCS, vol. 15601, pp. 427\u2013457. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-91107-1_15","DOI":"10.1007\/978-3-031-91107-1_15"},{"key":"6_CR34","doi-asserted-by":"publisher","unstructured":"Gao, Y., Wang, J., Hu, H., He, B.: Attacking ECDSA with nonce leakage by lattice sieving: bridging the gap with Fourier analysis-based attacks. In: Chung, K.M., Sasaki, Y. (eds.) ASIACRYPT\u00a02024, Part\u00a0VIII. LNCS, vol. 15491, pp. 3\u201334. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-96-0944-4_1","DOI":"10.1007\/978-981-96-0944-4_1"},{"key":"6_CR35","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis, Stanford University (2009). crypto.stanford.edu\/craig"},{"key":"6_CR36","doi-asserted-by":"publisher","unstructured":"Gentry, C., Halevi, S., Smart, N.P.: Homomorphic evaluation of the AES circuit. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO\u00a02012. LNCS, vol.\u00a07417, pp. 850\u2013867. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_49","DOI":"10.1007\/978-3-642-32009-5_49"},{"key":"6_CR37","doi-asserted-by":"publisher","unstructured":"Ghafoori, N., Miyaji, A.: Higher-order differential-linear cryptanalysis of ChaCha stream cipher. IEEE Access 12, 13386\u201313399 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3356868","DOI":"10.1109\/ACCESS.2024.3356868"},{"key":"6_CR38","doi-asserted-by":"publisher","unstructured":"Gilbert, H., Boissier, R.H., Jean, J., Reinhard, J.R.: Cryptanalysis of Elisabeth-4. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT\u00a02023, Part\u00a0III. LNCS, vol. 14440, pp. 256\u2013284. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-8727-6_9","DOI":"10.1007\/978-981-99-8727-6_9"},{"key":"6_CR39","doi-asserted-by":"publisher","unstructured":"Grassi, L., Ayala, I.M., Hovd, M.N., \u00d8ygarden, M., Raddum, H., Wang, Q.: Cryptanalysis of symmetric primitives over rings and a key recovery attack on rubato. In: Handschuh, H., Lysyanskaya, A. (eds.) CRYPTO\u00a02023, Part\u00a0III. LNCS, vol. 14083, pp. 305\u2013339. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-38548-3_11","DOI":"10.1007\/978-3-031-38548-3_11"},{"key":"6_CR40","doi-asserted-by":"publisher","unstructured":"Guimar\u00e3es, A., Borin, E., Aranha, D.F.: Revisiting the functional bootstrap in TFHE. IACR Trans. Cryptographic Hardware Embedded Syst. 2021(2), 229\u2013253 (2021). https:\/\/doi.org\/10.46586\/tches.v2021.i2.229-253, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8793","DOI":"10.46586\/tches.v2021.i2.229-253"},{"key":"6_CR41","doi-asserted-by":"publisher","unstructured":"Guimar\u00e3es, A., Borin, E., Aranha, D.F.: MOSFHET: optimized software for FHE over the Torus. J. Cryptographic Eng. (2024). https:\/\/doi.org\/10.1007\/s13389-024-00359-z","DOI":"10.1007\/s13389-024-00359-z"},{"key":"6_CR42","doi-asserted-by":"publisher","unstructured":"Ha, J., et al.: Masta: an he-friendly cipher using modular arithmetic. IEEE Access 8, 194741\u2013194751 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3033564","DOI":"10.1109\/ACCESS.2020.3033564"},{"key":"6_CR43","doi-asserted-by":"publisher","unstructured":"Ha, J., Kim, S., Lee, B., Lee, J., Son, M.: Rubato: noisy ciphers for approximate homomorphic encryption. In: Dunkelman, O., Dziembowski, S. (eds.) EUROCRYPT\u00a02022, Part\u00a0I. LNCS, vol. 13275, pp. 581\u2013610. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-06944-4_20","DOI":"10.1007\/978-3-031-06944-4_20"},{"key":"6_CR44","doi-asserted-by":"publisher","unstructured":"Hebborn, P., Leander, G.: Dasta \u2013 alternative linear layer for Rasta. IACR Transactions on Symmetric Cryptology 2020(3), 46\u201386 (2020). https:\/\/doi.org\/10.13154\/tosc.v2020.i3.46-86","DOI":"10.13154\/tosc.v2020.i3.46-86"},{"key":"6_CR45","doi-asserted-by":"publisher","unstructured":"Hoffmann, C., M\u00e9aux, P., Standaert, F.X.: The patching landscape of elisabeth-4 and the mixed filter permutator paradigm. In: Chattopadhyay, A., Bhasin, S., Picek, S., Rebeiro, C. (eds.) INDOCRYPT\u00a02023, Part\u00a0I. LNCS, vol. 14459, pp. 134\u2013156. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-56232-7_7","DOI":"10.1007\/978-3-031-56232-7_7"},{"key":"6_CR46","doi-asserted-by":"publisher","unstructured":"Liu, F., Anand, R., Wang, L., Meier, W., Isobe, T.: Coefficient grouping: Breaking chaghri and more. In: Hazay, C., Stam, M. (eds.) EUROCRYPT\u00a02023, Part\u00a0IV. LNCS, vol. 14007, pp. 287\u2013317. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30634-1_10","DOI":"10.1007\/978-3-031-30634-1_10"},{"key":"6_CR47","doi-asserted-by":"publisher","unstructured":"Liu, F., Isobe, T., Meier, W.: Cryptanalysis of full LowMC and LowMC-M with algebraic techniques. In: Malkin, T., Peikert, C. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02021, Part\u00a0III. LNCS, vol. 12827, pp. 368\u2013401. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-84252-9_13","DOI":"10.1007\/978-3-030-84252-9_13"},{"key":"6_CR48","doi-asserted-by":"publisher","unstructured":"Liu, F., Meier, W., Sarkar, S., Isobe, T.: New low-memory algebraic attacks on LowMC in the Picnic setting. IACR Transactions on Symmetric Cryptology 2022(3), 102\u2013122 (2022). https:\/\/doi.org\/10.46586\/tosc.v2022.i3.102-122","DOI":"10.46586\/tosc.v2022.i3.102-122"},{"key":"6_CR49","doi-asserted-by":"publisher","unstructured":"Liu, F., Sarkar, S., Meier, W., Isobe, T.: Algebraic attacks on RASTA and DASTA using low-degree equations. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT\u00a02021, Part\u00a0I. LNCS, vol. 13090, pp. 214\u2013240. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92062-3_8","DOI":"10.1007\/978-3-030-92062-3_8"},{"key":"6_CR50","doi-asserted-by":"publisher","unstructured":"M\u00e9aux, P., Carlet, C., Journault, A., Standaert, F.X.: Improved filter permutators for efficient FHE: better instances and implementations. In: Hao, F., Ruj, S., Sen Gupta, S. (eds.) Progress in Cryptology - INDOCRYPT\u00a02019. LNCS, vol. 11898, pp. 68\u201391. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-35423-7_4","DOI":"10.1007\/978-3-030-35423-7_4"},{"key":"6_CR51","doi-asserted-by":"publisher","unstructured":"M\u00e9aux, P., Journault, A., Standaert, F.X., Carlet, C.: Towards stream ciphers for efficient FHE with low-noise ciphertexts. In: Fischlin, M., Coron, J.S. (eds.) EUROCRYPT\u00a02016, Part\u00a0I. LNCS, vol.\u00a09665, pp. 311\u2013343. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49890-3_13","DOI":"10.1007\/978-3-662-49890-3_13"},{"key":"6_CR52","doi-asserted-by":"publisher","unstructured":"M\u00e9aux, P., Park, J., Pereira, H.V.L.: Towards practical transciphering for FHE with setup independent of the plaintext space. IACR Commun. Cryptol. (CiC) 1(1), 20 (2024). https:\/\/doi.org\/10.62056\/anxrxrxqi","DOI":"10.62056\/anxrxrxqi"},{"key":"6_CR53","doi-asserted-by":"publisher","unstructured":"Mella, S., Susella, R.: On the homomorphic computation of symmetric cryptographic primitives. In: Stam, M. (ed.) IMACC 2013. LNCS, vol.\u00a08308, pp. 28\u201344. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-45239-0_3","DOI":"10.1007\/978-3-642-45239-0_3"},{"key":"6_CR54","doi-asserted-by":"publisher","unstructured":"Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop. CCSW \u201911, New York, NY, USA, pp. 113\u2013124. Association for Computing Machinery (2011). https:\/\/doi.org\/10.1145\/2046660.2046682, https:\/\/doi.org\/10.1145\/2046660.2046682","DOI":"10.1145\/2046660.2046682"},{"key":"6_CR55","unstructured":"National Institute of Standards and Technology: Secure hash standard (shs). Technical report FIPS PUB 180-4, U.S. Department of Commerce, Gaithersburg, MD (2015). https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.180-4.pdf. Accessed 11 Jul 2025"},{"key":"6_CR56","doi-asserted-by":"publisher","unstructured":"Nir, Y., Langley, A.: ChaCha20 and Poly1305 for IETF Protocols. RFC 7539 (2015). https:\/\/doi.org\/10.17487\/RFC7539. https:\/\/www.rfc-editor.org\/info\/rfc7539","DOI":"10.17487\/RFC7539"},{"key":"6_CR57","doi-asserted-by":"publisher","unstructured":"Niu, C., et al.: SoK: FHE-friendly symmetric ciphers and transciphering. IACR Trans. Cryptographic Hardware Embedded Syst. 2025(3), 583\u2013613 (2025). https:\/\/doi.org\/10.46586\/tches.v2025.i3.583-613, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/12228","DOI":"10.46586\/tches.v2025.i3.583-613"},{"key":"6_CR58","doi-asserted-by":"publisher","unstructured":"Pereira, H.V.L.: Bootstrapping fully homomorphic encryption over the integers in less than one second. In: Garay, J. (ed.) PKC\u00a02021, Part\u00a0I. LNCS, vol. 12710, pp. 331\u2013359. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75245-3_13","DOI":"10.1007\/978-3-030-75245-3_13"},{"key":"6_CR59","doi-asserted-by":"publisher","unstructured":"Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446 (2018). https:\/\/doi.org\/10.17487\/RFC8446, https:\/\/www.rfc-editor.org\/info\/rfc8446","DOI":"10.17487\/RFC8446"},{"key":"6_CR60","unstructured":"Thakur, I., Karmakar, A., Li, C., Preneel, B.: A survey on transciphering and symmetric ciphers for homomorphic encryption. Cryptology ePrint Archive, Report 2025\/093 (2025). https:\/\/eprint.iacr.org\/2025\/093"},{"key":"6_CR61","doi-asserted-by":"publisher","unstructured":"Wei, B., Lu, X., Wang, R., Liu, K., Li, Z., Wang, K.: Thunderbird: efficient homomorphic evaluation of symmetric ciphers in 3GPP by combining two modes of TFHE. IACR Trans. Cryptographic Hardware Embedded Syst. 2024(3), 530\u2013573 (2024). https:\/\/doi.org\/10.46586\/tches.v2024.i3.530-573","DOI":"10.46586\/tches.v2024.i3.530-573"},{"key":"6_CR62","doi-asserted-by":"publisher","unstructured":"Wei, B., Wang, R., Li, Z., Liu, Q., Lu, X.: Fregata: faster homomorphic evaluation of AES via TFHE. In: Athanasopoulos, E., Mennink, B. (eds.) ISC\u00a02023. LNCS, vol. 14411, pp. 392\u2013412. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-49187-0_20","DOI":"10.1007\/978-3-031-49187-0_20"},{"key":"6_CR63","unstructured":"Zama: TFHE-rs: A Pure Rust Implementation of the TFHE Scheme for Boolean and Integer Arithmetics Over Encrypted Data (2022). https:\/\/github.com\/zama-ai\/tfhe-rs"},{"key":"6_CR64","unstructured":"Zhang, C., Li, S., Xia, J., Wang, W., Yan, F., Liu, Y.: BatchCrypt: efficient homomorphic encryption for Cross-Silo federated learning. In: 2020 USENIX Annual Technical Conference (USENIX ATC 20), pp. 493\u2013506. USENIX Association (2020). https:\/\/www.usenix.org\/conference\/atc20\/presentation\/zhang-chengliang"},{"key":"6_CR65","doi-asserted-by":"crossref","unstructured":"Zuber, M., Sirdey, R.: Efficient homomorphic evaluation of k-NN classifiers. In: Proceedings on Privacy Enhancing Technologies 2021, pp. 111\u2013129 (2021)","DOI":"10.2478\/popets-2021-0020"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-22698-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T10:24:55Z","timestamp":1775730295000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-22698-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032226976","9783032226983"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-22698-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"10 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PQCrypto","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Post-Quantum Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint-Malo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2026","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2026","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 April 2026","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pqcrypto2026","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}