{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T04:01:05Z","timestamp":1751774465135,"version":"3.41.0"},"reference-count":39,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2025,7,1]]},"DOI":"10.1587\/transfun.2024eap1117","type":"journal-article","created":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T22:12:26Z","timestamp":1737411146000},"page":"949-963","source":"Crossref","is-referenced-by-count":0,"title":["Improved Upper Bound of Algebraic Degrees for Some Arithmetization-Oriented Ciphers"],"prefix":"10.1587","volume":"E108.A","author":[{"given":"Jianqiang","family":"NI","sequence":"first","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, School of Cryptology, Software Engineering Institute, East China Normal University"}]},{"given":"Gaoli","family":"WANG","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, School of Cryptology, Software Engineering Institute, East China Normal University"}]},{"given":"Yingxin","family":"LI","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, School of Cryptology, Software Engineering Institute, East China Normal University"}]},{"given":"Siwei","family":"SUN","sequence":"additional","affiliation":[{"name":"School of Cryptology, University of Chinese Academy of Sciences"},{"name":"State Key Laboratory of Cryptology"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] M.R. Albrecht, L. Grassi, C. Rechberger, A. Roy, and T. Tiessen, \u201cMiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity,\u201d Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, Dec. 2016, Proceedings, Part I, J.H. Cheon and T. Takagi, eds., Lecture Notes in Computer Science, vol.10031, pp.191-219, 2016. 10.1007\/978-3-662-53887-6_7","DOI":"10.1007\/978-3-662-53887-6_7"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] M.R. Albrecht, C. Cid, L. Grassi, D. Khovratovich, R. L\u00fcftenegger, C. Rechberger, and M. Schofnegger, \u201cAlgebraic cryptanalysis of STARK-friendly designs: Application to MARVELlous and MiMC,\u201d Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, Dec. 2019, Proceedings, Part III, S.D. Galbraith and S. Moriai, eds., Lecture Notes in Computer Science, vol.11923, pp.371-397, Springer, 2019. 10.1007\/978-3-030-34618-8_13","DOI":"10.1007\/978-3-030-34618-8_13"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] A. Aly, T. Ashur, E. Ben-Sasson, S. Dhooghe, and A. Szepieniec, \u201cDesign of symmetric-key primitives for advanced cryptographic protocols,\u201d IACR Trans. Symmetric Cryptol., vol.2020, no.3, pp.1-45, 2020. 10.46586\/tosc.v2020.i3.1-45","DOI":"10.46586\/tosc.v2020.i3.1-45"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] C. Dobraunig, L. Grassi, A. Guinet, and D. Kuijsters, \u201cCiminion: Symmetric encryption based on Toffoli-gates over large finite fields,\u201d Advances in Cryptology - EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, Oct. 2021, Proceedings, Part II, A. Canteaut and F. Standaert, eds., Lecture Notes in Computer Science, vol.12697, pp.3-34, Springer, 2021. 10.1007\/978-3-030-77886-6_1","DOI":"10.1007\/978-3-030-77886-6_1"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] L. Grassi, D. Khovratovich, R. L\u00fcftenegger, C. Rechberger, M. Schofnegger, and R. Walch, \u201cReinforced concrete: A fast hash function for verifiable computation,\u201d Proc. 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, Nov. 2022, H. Yin, A. Stavrou, C. Cremers, and E. Shi, eds., pp.1323-1335, ACM, 2022. 10.1145\/3548606.3560686","DOI":"10.1145\/3548606.3560686"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] T. Ashur, M. Mahzoun, and D. Toprakhisar, \u201cChaghri\u2006\u2014\u2006A FHE-friendly Block Cipher,\u201d Proc. 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, Nov. 2022, H. Yin, A. Stavrou, C. Cremers, and E. Shi, eds., pp.139-150, ACM, 2022. 10.1145\/3548606.3559364","DOI":"10.1145\/3548606.3559364"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] C. Bouvier, P. Briaud, P. Chaidos, L. Perrin, R. Salen, V. Velichkov, and D. Willems, \u201cNew design techniques for efficient arithmetization-oriented hash functions: Anemoi permutations and Jive compression mode,\u201d Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, Aug. 2023, Proceedings, Part III, H. Handschuh and A. Lysyanskaya, eds., Lecture Notes in Computer Science, vol.14083, pp.507-539, Springer, 2023. 10.1007\/978-3-031-38548-3_17","DOI":"10.1007\/978-3-031-38548-3_17"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] L. Grassi, S. Onofri, M. Pedicini, and L. Sozzi, \u201cInvertible quadratic non-linear layers for MPC-\/FHE-\/ZK-friendly schemes over Fnp: Application to poseidon,\u201d IACR Trans. Symmetric Cryptol., vol.2022, no.3, pp.20-72, 2022. 10.46586\/tosc.v2022.i3.20-72","DOI":"10.46586\/tosc.v2022.i3.20-72"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] L. Grassi, M. \u00d8ygarden, M. Schofnegger, and R. Walch, \u201cFrom farfalle to Megafono via Ciminion: The PRF hydra for MPC applications,\u201d Advances in Cryptology - EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 2023, Proceedings, Part IV, C. Hazay and M. Stam, eds., Lecture Notes in Computer Science, vol.14007, pp.255-286, Springer, 2023. 10.1007\/978-3-031-30634-1_9","DOI":"10.1007\/978-3-031-30634-1_9"},{"key":"10","unstructured":"[10] T. Ashur and S. Dhooghe, \u201cMARVELlous: A STARK-friendly family of cryptographic primitives,\u201d Cryptology ePrint Archive, Paper 2018\/1098, 2018. https:\/\/eprint.iacr.org\/2018\/1098"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] M.R. Albrecht, L. Grassi, L. Perrin, S. Ramacher, C. Rechberger, D. Rotaru, A. Roy, and M. Schofnegger, \u201cFeistel structures for MPC, and more,\u201d Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, Sept. 2019, Proceedings, Part II, K. Sako, S.A. Schneider, and P.Y.A. Ryan, eds., Lecture Notes in Computer Science, vol.11736, pp.151-171, Springer, 2019. 10.1007\/978-3-030-29962-0_8","DOI":"10.1007\/978-3-030-29962-0_8"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] L. Grassi, R. L\u00fcftenegger, C. Rechberger, D. Rotaru, and M. Schofnegger, \u201cOn a generalization of substitution-permutation networks: The HADES design strategy,\u201d Advances in Cryptology - EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 2020, Proceedings, Part II, A. Canteaut and Y. Ishai, eds., Lecture Notes in Computer Science, vol.12106, pp.674-704, Springer, 2020. 10.1007\/978-3-030-45724-2_23","DOI":"10.1007\/978-3-030-45724-2_23"},{"key":"13","unstructured":"[13] L. Grassi, D. Khovratovich, C. Rechberger, A. Roy, and M. Schofnegger, \u201cPoseidon: A new hash function for zero-knowledge proof systems,\u201d 30th USENIX Security Symposium, USENIX Security 2021, pp.519-535, Aug. 2021."},{"key":"14","unstructured":"[14] E. Biham and A. Shamir, \u201cDifferential cryptanalysis of DES-like cryptosystems,\u201d Advances in Cryptology - CRYPTO\u201990, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, Aug. 1990, Proceedings, A. Menezes and S.A. Vanstone, eds., Lecture Notes in Computer Science, vol.537, pp.2-21, Springer, 1990. 10.1007\/3-540-38424-3_1"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] M. Matsui, \u201cLinear cryptanalysis method for DES cipher,\u201d Advances in Cryptology - EUROCRYPT\u201993, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 1993, Proceedings, T. Helleseth, ed., Lecture Notes in Computer Science, vol.765, pp.386-397, Springer, 1993. 10.1007\/3-540-48285-7_33","DOI":"10.1007\/3-540-48285-7_33"},{"key":"16","unstructured":"[17] L.R. Knudsen, \u201cTruncated and higher order differentials,\u201d Fast Software Encryption: Second International Workshop, Leuven, Belgium, Dec. 1994, Proceedings, B. Preneel, ed., Lecture Notes in Computer Science, vol.1008, pp.196-211, Springer, 1994. 10.1007\/3-540-60590-8_16"},{"key":"17","doi-asserted-by":"publisher","unstructured":"[18] T. Jakobsen and L.R. Knudsen, \u201cThe interpolation attack on block ciphers,\u201d Fast Software Encryption, 4th International Workshop, FSE\u201997, Haifa, Israel, Jan. 1997, Proceedings, E. Biham, ed., Lecture Notes in Computer Science, vol.1267, pp.28-40, Springer, 1997. 10.1007\/BFb0052332","DOI":"10.1007\/BFb0052332"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[19] M. Eichlseder, L. Grassi, R. L\u00fcftenegger, M. \u00d8ygarden, C. Rechberger, M. Schofnegger, and Q. Wang, \u201cAn algebraic attack on ciphers with low-degree round functions: Application to full MiMC,\u201d Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, Dec. 2020, Proceedings, Part I, S. Moriai and H. Wang, eds., Lecture Notes in Computer Science, vol.12491, pp.477-506, Springer, 2020. 10.1007\/978-3-030-64837-4_16","DOI":"10.1007\/978-3-030-64837-4_16"},{"key":"19","doi-asserted-by":"publisher","unstructured":"[20] C. Cid, L. Grassi, A. Gunsing, R. L\u00fcftenegger, C. Rechberger, and M. Schofnegger, \u201cInfluence of the linear layer on the algebraic degree in SP-networks,\u201d IACR Trans. Symmetric Cryptol., vol.2022, no.1, pp.110-137, 2022. 10.46586\/tosc.v2022.i1.110-137","DOI":"10.46586\/tosc.v2022.i1.110-137"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[21] C. Bouvier, A. Canteaut, and L. Perrin, \u201cOn the algebraic degree of iterated power functions,\u201d Des. Codes Cryptogr., vol.91, no.3, pp.997-1033, 2023. 10.1007\/s10623-022-01136-x","DOI":"10.1007\/s10623-022-01136-x"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[22] J. Cui, K. Hu, M. Wang, and P. Wei, \u201cOn the field-based division property: Applications to MiMC, feistel MiMC and GMiMC,\u201d Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, Dec. 2022, Proceedings, Part III, S. Agrawal and D. Lin, eds., Lecture Notes in Computer Science, vol.13793, pp.241-270, Springer, 2022. 10.1007\/978-3-031-22969-5_9","DOI":"10.1007\/978-3-031-22969-5_9"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[23] K. Hu, S. Sun, M. Wang, and Q. Wang, \u201cAn algebraic formulation of the division property: Revisiting degree evaluations, cube attacks, and key-independent sums,\u201d Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, Dec. 2020, Proceedings, Part I, S. Moriai and H. Wang, eds., Lecture Notes in Computer Science, vol.12491, pp.446-476, Springer, 2020. 10.1007\/978-3-030-64837-4_15","DOI":"10.1007\/978-3-030-64837-4_15"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[24] T. Beyne, A. Canteaut, I. Dinur, M. Eichlseder, G. Leander, G. Leurent, M. Naya-Plasencia, L. Perrin, Y. Sasaki, Y. Todo, and F. Wiemer, \u201cOut of oddity\u2006\u2014\u2006New cryptanalytic techniques against symmetric primitives optimized for integrity proof systems,\u201d Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, Aug. 2020, Proceedings, Part III, D. Micciancio and T. Ristenpart, eds., Lecture Notes in Computer Science, vol.12172, pp.299-328, Springer, 2020. 10.1007\/978-3-030-56877-1_11","DOI":"10.1007\/978-3-030-56877-1_11"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[25] F. Liu, R. Anand, L. Wang, W. Meier, and T. Isobe, \u201cCoefficient grouping: Breaking Chaghri and More,\u201d Advances in Cryptology - EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 2023, Proceedings, Part IV, C. Hazay and M. Stam, eds., Lecture Notes in Computer Science, vol.14007, pp.287-317, Springer, 2023. 10.1007\/978-3-031-30634-1_10","DOI":"10.1007\/978-3-031-30634-1_10"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[26] F. Liu, L. Grassi, C. Bouvier, W. Meier, and T. Isobe, \u201cCoefficient grouping for complex affine layers,\u201d Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, Aug. 2023, Proceedings, Part III, H. Handschuh and A. Lysyanskaya, eds., Lecture Notes in Computer Science, vol.14083, pp.540-572, Springer, 2023. 10.1007\/978-3-031-38548-3_18","DOI":"10.1007\/978-3-031-38548-3_18"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[27] C. Sinz, \u201cTowards an optimal CNF encoding of Boolean cardinality constraints,\u201d Principles and Practice of Constraint Programming - CP 2005, 11th International Conference, CP 2005, Sitges, Spain, Oct. 2005, Proceedings, P. van Beek, eds., Lecture Notes in Computer Science, vol.3709, pp.827-831, Springer, 2005. 10.1007\/11564751_73","DOI":"10.1007\/11564751_73"},{"key":"27","unstructured":"[28] A. Biere, K. Fazekas, M. Fleury, and M. Heisinger, \u201cCaDiCaL, Kissat, Paracooba, plingeling and treengeling entering the SAT Competition 2020,\u201d Proc. SAT Competition 2020 - Solver and Benchmark Descriptions, vol.B-2020-1, pp.51-53, University of Helsinki, 2020."},{"key":"28","doi-asserted-by":"crossref","unstructured":"[29] L. Zhang, M. Liu, S. Li, and D. Lin, \u201cCryptanalysis of Ciminion,\u201d Information Security and Cryptology - 18th International Conference, Inscrypt 2022, Beijing, China, Dec. 2022, Revised Selected Papers, Y. Deng and M. Yung, eds., Lecture Notes in Computer Science, vol.13837, pp.234-251, Springer, 2022. 10.1007\/978-3-031-26553-2_12","DOI":"10.1007\/978-3-031-26553-2_12"},{"key":"29","doi-asserted-by":"publisher","unstructured":"[30] C. Carlet, P. Charpin, and V.A. Zinoviev, \u201cCodes, bent functions and permutations suitable for DES-like cryptosystems,\u201d Des. Codes Cryptogr., vol.15, no.2, pp.125-156, 1998. 10.1023\/a:1008344232130","DOI":"10.1023\/A:1008344232130"},{"key":"30","doi-asserted-by":"crossref","unstructured":"[31] Y. Hao, G. Leander, W. Meier, Y. Todo, and Q. Wang, \u201cModeling for three-subset division property without unknown subset\u2006\u2014\u2006Improved cube attacks against trivium and grain-128AEAD,\u201d Advances in Cryptology - EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 2020, Proceedings, Part I, A. Canteaut and Y. Ishai, eds., Lecture Notes in Computer Science, vol.12105, pp.466-495, Springer, 2020. 10.1007\/978-3-030-45721-1_17","DOI":"10.1007\/978-3-030-45721-1_17"},{"key":"31","doi-asserted-by":"publisher","unstructured":"[32] H. Hadipour and M. Eichlseder, \u201cIntegral cryptanalysis of WARP based on monomial prediction,\u201d IACR Trans. Symmetric Cryptol., vol.2022, no.2, pp.92-112, 2022. 10.46586\/tosc.v2022.i2.92-112","DOI":"10.46586\/tosc.v2022.i2.92-112"},{"key":"32","doi-asserted-by":"publisher","unstructured":"[33] L. Sun, W. Wang, and M. Wang, \u201cMore accurate differential properties of LED64 and Midori64,\u201d IACR Trans. Symmetric Cryptol., vol.2018, no.3, pp.93-123, 2018. 10.46586\/tosc.v2018.i3.93-123","DOI":"10.46586\/tosc.v2018.i3.93-123"},{"key":"33","unstructured":"[34] Gurobi Optimization, LLC, \u201cGurobi Optimizer Reference Manual,\u201d 2023."},{"key":"34","doi-asserted-by":"crossref","unstructured":"[35] M. Soos, K. Nohl, and C. Castelluccia, \u201cExtending SAT solvers to cryptographic problems,\u201d International Conference on Theory and Applications of Satisfiability Testing, pp.244-257, Springer, 2009. 10.1007\/978-3-642-02777-2_24","DOI":"10.1007\/978-3-642-02777-2_24"},{"key":"35","unstructured":"[36] G. Bertoni, J. Daemen, M. Peeters, and G.V. Assche, \u201cThe Keccak SHA-3 submission,\u201d NIST (Round 3), vol.6, no.7, p.16, 2011."},{"key":"36","unstructured":"[37] M.J. Dworkin, \u201cSHA-3 standard: Permutation-based hash and extendable-output functions,\u201d 2015."},{"key":"37","doi-asserted-by":"crossref","unstructured":"[38] G. Bertoni, J. Daemen, M. Peeters, and G. Van Assche, \u201cOn the indifferentiability of the sponge construction,\u201d Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.181-197, Springer, 2008. 10.1007\/978-3-540-78967-3_11","DOI":"10.1007\/978-3-540-78967-3_11"},{"key":"38","doi-asserted-by":"crossref","unstructured":"[39] Y. Li, F. Liu, and G. Wang, \u201cNew records in collision attacks on SHA-2,\u201d Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 2024, Proceedings, Part I, M. Joye and G. Leander, eds., Lecture Notes in Computer Science, vol.14651, pp.158-186, Springer, 2024. 10.1007\/978-3-031-58716-0_6","DOI":"10.1007\/978-3-031-58716-0_6"},{"key":"39","doi-asserted-by":"publisher","unstructured":"[40] Y. Li, F. Liu, and G. Wang, \u201cAutomating collision attacks on RIPEMD-160,\u201d IACR Trans. Symmetric Cryptol., vol.2023, no.4, pp.112-142, 2023. 10.46586\/tosc.v2023.i4.112-142","DOI":"10.46586\/tosc.v2023.i4.112-142"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E108.A\/7\/E108.A_2024EAP1117\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T03:35:10Z","timestamp":1751686510000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E108.A\/7\/E108.A_2024EAP1117\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,1]]},"references-count":39,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2024eap1117","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"type":"print","value":"0916-8508"},{"type":"electronic","value":"1745-1337"}],"subject":[],"published":{"date-parts":[[2025,7,1]]},"article-number":"2024EAP1117"}}