Poseidon: A new hash function for {Zero-Knowledge} proof systems
The area of practical computational integrity proof systems, like SNARKs, STARKs,
Bulletproofs, is seeing a very dynamic development with several constructions having …
Bulletproofs, is seeing a very dynamic development with several constructions having …
[PDF][PDF] Status report on the second round of the NIST lightweight cryptography standardization process
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more Authenticated Encryption with Associated …
standardization process to select one or more Authenticated Encryption with Associated …
An algebraic attack on ciphers with low-degree round functions: application to full MiMC
Algebraically simple PRFs, ciphers, or cryptographic hash functions are becoming
increasingly popular, for example due to their attractive properties for MPC and new proof …
increasingly popular, for example due to their attractive properties for MPC and new proof …
Cryptanalysis of full LowMC and LowMC-M with algebraic techniques
In this paper, we revisit the difference enumeration technique for LowMC and develop new
algebraic techniques to achieve efficient key-recovery attacks. In the original difference …
algebraic techniques to achieve efficient key-recovery attacks. In the original difference …
Too much crypto
JP Aumasson - Cryptology EPrint Archive, 2019 - eprint.iacr.org
We show that many symmetric cryptography primitives would not be less safe with
significantly fewer rounds. To support this claim, we review the cryptanalysis progress in the …
significantly fewer rounds. To support this claim, we review the cryptanalysis progress in the …
[HTML][HTML] From Collatz Conjecture to chaos and hash function
The non-linear property of Chaos is a promising approach to information security, and many
accomplishments have been made by combining Chaos with several sub-security domains …
accomplishments have been made by combining Chaos with several sub-security domains …
A novel hash function based on a chaotic sponge and DNA sequence
Many chaos-based hash functions have convoluted designs that are not based on proper
design principles, complicating the verification of security claims. We address this problem …
design principles, complicating the verification of security claims. We address this problem …
Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA
In sensitive communications, the cryptographic hash function plays a crucial role, including
in the military, healthcare, and banking, ensuring secure transmission by verifying data …
in the military, healthcare, and banking, ensuring secure transmission by verifying data …
Monolith: Circuit-friendly hash functions with new nonlinear layers for fast and constant-time implementations
Hash functions are a crucial component in incrementally verifiable computation (IVC)
protocols and applications. Among those, recursive SNARKs and folding schemes require …
protocols and applications. Among those, recursive SNARKs and folding schemes require …
Algebraic attacks on round-reduced Keccak
Since Keccak was selected as the SHA-3 standard, both its hash mode and keyed mode
have attracted lots of third-party cryptanalysis. Especially in recent years, there is progress in …
have attracted lots of third-party cryptanalysis. Especially in recent years, there is progress in …