Troika: a ternary cryptographic hash function
From MaRDI portal
Publication:2285779
DOI10.1007/S10623-019-00673-2zbMATH Open1469.94104OpenAlexW2971081319WikidataQ127311275 ScholiaQ127311275MaRDI QIDQ2285779FDOQ2285779
Authors: Stefan Kölbl, Elmar Tischhauser, Patrick Derbez, Andrey Bogdanov
Publication date: 9 January 2020
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-019-00673-2
Recommendations
Cites Work
- Piccolo: An Ultra-Lightweight Blockcipher
- Keccak
- A New Family of Ternary Almost Perfect Nonlinear Mappings
- Title not available (Why is that?)
- Title not available (Why is that?)
- PRESENT: An Ultra-Lightweight Block Cipher
- Title not available (Why is that?)
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- On the Indifferentiability of the Sponge Construction
- Differential cryptanalysis of DES-like cryptosystems
- Title not available (Why is that?)
- Optimal ternary quasi-cyclic codes
- Optimal ternary linear codes
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- Title not available (Why is that?)
- Ternary self-orthogonal codes of dual distance three and ternary quantum codes of distance three
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- Sponge-based pseudo-random number generators
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- Proving resistance against invariant attacks: how to choose the round constants
- Nonlinear Invariant Attack
- Three-weight ternary linear codes from a family of cyclic difference sets
- Pseudorandom Permutation Families over Abelian Groups
- Linear frameworks for block ciphers
Cited In (4)
Uses Software
This page was built for publication: Troika: a ternary cryptographic hash function
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2285779)