Fractal: Post-quantum and Transparent Recursive Proofs from Holography
We present a new methodology to efficiently realize recursive composition of succinct non-
interactive arguments of knowledge (SNARKs). Prior to this work, the only known …
interactive arguments of knowledge (SNARKs). Prior to this work, the only known …
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
Zero-knowledge (ZK) applications form a large group of use cases in modern cryptography,
and recently gained in popularity due to novel proof systems. For many of these …
and recently gained in popularity due to novel proof systems. For many of these …
New design techniques for efficient arithmetization-oriented hash functions: anemoi permutations and jive compression mode
Advanced cryptographic protocols such as Zero-knowledge (ZK) proofs of knowledge,
widely used in cryptocurrency applications such as Zcash, Monero, Filecoin, Tezos, Topos …
widely used in cryptocurrency applications such as Zcash, Monero, Filecoin, Tezos, Topos …
Poseidon2: A Faster Version of the Poseidon Hash Function
Zero-knowledge proof systems for computational integrity have seen a rise in popularity in
the last couple of years. One of the results of this development is the ongoing effort in …
the last couple of years. One of the results of this development is the ongoing effort in …
Optimizing implementations of linear layers
In this paper, we propose a new heuristic algorithm to search efficient implementations (in
terms of Xor count) of linear layers used in symmetric-key cryptography. It is observed that …
terms of Xor count) of linear layers used in symmetric-key cryptography. It is observed that …
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security
The cryptographic algorithms needed to ensure the security of our communications have a
cost. For devices with little computing power, whose number is expected to grow significantly …
cost. For devices with little computing power, whose number is expected to grow significantly …
Spook: Sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher
This paper defines Spook: a sponge-based authenticated encryption with associated data
algorithm. It is primarily designed to provide security against side-channel attacks at a low …
algorithm. It is primarily designed to provide security against side-channel attacks at a low …
Horst meets fluid-SPN: griffin for zero-knowledge applications
Zero-knowledge (ZK) applications form a large group of use cases in modern cryptography,
and recently gained in popularity due to novel proof systems. For many of these …
and recently gained in popularity due to novel proof systems. For many of these …
Constructing low-latency involutory MDS matrices with lightweight circuits
MDS matrices are important building blocks providing diffusion functionality for the design of
many symmetric-key primitives. In recent years, continuous efforts are made on the …
many symmetric-key primitives. In recent years, continuous efforts are made on the …
Improved heuristics for short linear programs
In this article, we propose new heuristics for minimising the amount of XOR gates required to
compute a system of linear equations in GF (2). We first revisit the well known Boyar-Peralta …
compute a system of linear equations in GF (2). We first revisit the well known Boyar-Peralta …