Poseidon: A new hash function for {Zero-Knowledge} proof systems

L Grassi, D Khovratovich, C Rechberger… - 30th USENIX Security …, 2021 - usenix.org
The area of practical computational integrity proof systems, like SNARKs, STARKs,
Bulletproofs, is seeing a very dynamic development with several constructions having …

[PDF][PDF] Status report on the second round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, C Calik… - 2021 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more Authenticated Encryption with Associated …

An algebraic attack on ciphers with low-degree round functions: application to full MiMC

M Eichlseder, L Grassi, R Lüftenegger… - Advances in Cryptology …, 2020 - Springer
Algebraically simple PRFs, ciphers, or cryptographic hash functions are becoming
increasingly popular, for example due to their attractive properties for MPC and new proof …

Cryptanalysis of full LowMC and LowMC-M with algebraic techniques

F Liu, T Isobe, W Meier - Advances in Cryptology–CRYPTO 2021: 41st …, 2021 - Springer
In this paper, we revisit the difference enumeration technique for LowMC and develop new
algebraic techniques to achieve efficient key-recovery attacks. In the original difference …

[หนังสือ][B] Status report on the final round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, LE Bassham… - 2023 - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more schemes that provide Authenticated …

Too much crypto

JP Aumasson - Cryptology EPrint Archive, 2019 - eprint.iacr.org
We show that many symmetric cryptography primitives would not be less safe with
significantly fewer rounds. To support this claim, we review the cryptanalysis progress in the …

A novel hash function based on a chaotic sponge and DNA sequence

M Alawida, A Samsudin, N Alajarmeh, JS Teh… - IEEE …, 2021 - ieeexplore.ieee.org
Many chaos-based hash functions have convoluted designs that are not based on proper
design principles, complicating the verification of security claims. We address this problem …

Exploring SAT for cryptanalysis:(quantum) collision attacks against 6-round SHA-3

J Guo, G Liu, L Song, Y Tu - International Conference on the Theory and …, 2022 - Springer
In this work, we focus on collision attacks against instances of SHA-3 hash family in both
classical and quantum settings. Since the 5-round collision attacks on SHA3-256 and other …

Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA

A Sideris, T Sanida, M Dasygenis - Journal of Cryptographic Engineering, 2024 - Springer
In sensitive communications, the cryptographic hash function plays a crucial role, including
in the military, healthcare, and banking, ensuring secure transmission by verifying data …

[HTML][HTML] From Collatz Conjecture to chaos and hash function

M Rasool, SB Belhaouari - Chaos, Solitons & Fractals, 2023 - Elsevier
The non-linear property of Chaos is a promising approach to information security, and many
accomplishments have been made by combining Chaos with several sub-security domains …