Fractal: Post-quantum and Transparent Recursive Proofs from Holography

A Chiesa, D Ojha, N Spooner - … on the Theory and Applications of …, 2020 - Springer
We present a new methodology to efficiently realize recursive composition of succinct non-
interactive arguments of knowledge (SNARKs). Prior to this work, the only known …

Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications

L Grassi, Y Hao, C Rechberger, M Schofnegger… - Annual International …, 2023 - Springer
Zero-knowledge (ZK) applications form a large group of use cases in modern cryptography,
and recently gained in popularity due to novel proof systems. For many of these …

New design techniques for efficient arithmetization-oriented hash functions: anemoi permutations and jive compression mode

C Bouvier, P Briaud, P Chaidos, L Perrin… - Annual International …, 2023 - Springer
Advanced cryptographic protocols such as Zero-knowledge (ZK) proofs of knowledge,
widely used in cryptocurrency applications such as Zcash, Monero, Filecoin, Tezos, Topos …

Poseidon2: A Faster Version of the Poseidon Hash Function

L Grassi, D Khovratovich, M Schofnegger - International Conference on …, 2023 - Springer
Zero-knowledge proof systems for computational integrity have seen a rise in popularity in
the last couple of years. One of the results of this development is the ongoing effort in …

Optimizing implementations of linear layers

Z **ang, X Zeng, D Lin, Z Bao, S Zhang - IACR Transactions on …, 2020 - dr.ntu.edu.sg
In this paper, we propose a new heuristic algorithm to search efficient implementations (in
terms of Xor count) of linear layers used in symmetric-key cryptography. It is observed that …

Saturnin: a suite of lightweight symmetric algorithms for post-quantum security

A Canteaut, S Duval, G Leurent, M Naya-Plasencia… - 2019 - inria.hal.science
The cryptographic algorithms needed to ensure the security of our communications have a
cost. For devices with little computing power, whose number is expected to grow significantly …

Spook: Sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher

D Bellizia, F Berti, O Bronchain, G Cassiers… - IACR Transactions on …, 2020 - inria.hal.science
This paper defines Spook: a sponge-based authenticated encryption with associated data
algorithm. It is primarily designed to provide security against side-channel attacks at a low …

Horst meets fluid-SPN: griffin for zero-knowledge applications

L Grassi, Y Hao, C Rechberger… - Cryptology ePrint …, 2022 - eprint.iacr.org
Zero-knowledge (ZK) applications form a large group of use cases in modern cryptography,
and recently gained in popularity due to novel proof systems. For many of these …

Constructing low-latency involutory MDS matrices with lightweight circuits

S Li, S Sun, C Li, Z Wei, L Hu - IACR Transactions on Symmetric …, 2019 - tosc.iacr.org
MDS matrices are important building blocks providing diffusion functionality for the design of
many symmetric-key primitives. In recent years, continuous efforts are made on the …

Improved heuristics for short linear programs

QQ Tan, T Peyrin - IACR Transactions on Cryptographic Hardware …, 2020 - tches.iacr.org
In this article, we propose new heuristics for minimising the amount of XOR gates required to
compute a system of linear equations in GF (2). We first revisit the well known Boyar-Peralta …