Poseidon: A new hash function for {Zero-Knowledge} proof systems

L Grassi, D Khovratovich, C Rechberger… - 30th USENIX Security …, 2021 - usenix.org
The area of practical computational integrity proof systems, like SNARKs, STARKs,
Bulletproofs, is seeing a very dynamic development with several constructions having …

[PDF][PDF] Status report on the second round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, C Calik… - 2021 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more Authenticated Encryption with Associated …

An algebraic attack on ciphers with low-degree round functions: application to full MiMC

M Eichlseder, L Grassi, R Lüftenegger… - Advances in Cryptology …, 2020 - Springer
Algebraically simple PRFs, ciphers, or cryptographic hash functions are becoming
increasingly popular, for example due to their attractive properties for MPC and new proof …

Cryptanalysis of full LowMC and LowMC-M with algebraic techniques

F Liu, T Isobe, W Meier - Advances in Cryptology–CRYPTO 2021: 41st …, 2021 - Springer
In this paper, we revisit the difference enumeration technique for LowMC and develop new
algebraic techniques to achieve efficient key-recovery attacks. In the original difference …

Too much crypto

JP Aumasson - Cryptology EPrint Archive, 2019 - eprint.iacr.org
We show that many symmetric cryptography primitives would not be less safe with
significantly fewer rounds. To support this claim, we review the cryptanalysis progress in the …

[HTML][HTML] From Collatz Conjecture to chaos and hash function

M Rasool, SB Belhaouari - Chaos, Solitons & Fractals, 2023 - Elsevier
The non-linear property of Chaos is a promising approach to information security, and many
accomplishments have been made by combining Chaos with several sub-security domains …

A novel hash function based on a chaotic sponge and DNA sequence

M Alawida, A Samsudin, N Alajarmeh, JS Teh… - IEEE …, 2021 - ieeexplore.ieee.org
Many chaos-based hash functions have convoluted designs that are not based on proper
design principles, complicating the verification of security claims. We address this problem …

Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA

A Sideris, T Sanida, M Dasygenis - Journal of Cryptographic Engineering, 2024 - Springer
In sensitive communications, the cryptographic hash function plays a crucial role, including
in the military, healthcare, and banking, ensuring secure transmission by verifying data …

Monolith: Circuit-friendly hash functions with new nonlinear layers for fast and constant-time implementations

L Grassi, D Khovratovich… - IACR …, 2024 - ojs.ub.ruhr-uni-bochum.de
Hash functions are a crucial component in incrementally verifiable computation (IVC)
protocols and applications. Among those, recursive SNARKs and folding schemes require …

Algebraic attacks on round-reduced Keccak

F Liu, T Isobe, W Meier, Z Yang - … , ACISP 2021, Virtual Event, December 1 …, 2021 - Springer
Since Keccak was selected as the SHA-3 standard, both its hash mode and keyed mode
have attracted lots of third-party cryptanalysis. Especially in recent years, there is progress in …