The PHOTON Family of Lightweight Hash Functions

From MaRDI portal
Publication:5199193

DOI10.1007/978-3-642-22792-9_13zbMath1287.94069OpenAlexW35428663MaRDI QIDQ5199193

Axel Poschmann, Jian Guo, Thomas Peyrin

Publication date: 12 August 2011

Published in: Advances in Cryptology – CRYPTO 2011 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-22792-9_13




Related Items (62)

Provable one-XOR matrices for construction of 4 × 4 hardware-oriented MDS diffusion layersConstruction of higher-level MDS matrices in nested SPNsInvolutory-multiple-lightweight MDS matrices based on Cauchy-type matricesDuplexing the Sponge: Single-Pass Authenticated Encryption and Other ApplicationsOn the resilience of Even-Mansour to invariant permutationsBBB Secure Nonce Based MAC Using Public PermutationsApplications of design theory for the constructions of MDS matrices for lightweight cryptographyQuark: a lightweight hashLHash: A Lightweight Hash FunctionOptimizing Online Permutation-Based AE Schemes for Lightweight ApplicationsConstruction of MDS matrices combining the Feistel, Misty and Lai-Massey schemes\(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryptionA greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysisA new matrix form to generate all \(3\times 3\) involutory MDS matrices over \(\mathbb{F}_{2^m}\)Out of Non-linearity: Search Impossible Differentials by the Bitwise Characteristic MatrixALE: AES-Based Lightweight Authenticated EncryptionCUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to MaskCodes over $\mathcal{L}(GF(2)^m,GF(2)^m)$, MDS Diffusion Matrices and Cryptographic Applications\(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutationsHigher-Order Glitch Resistant Implementation of the PRESENT S-BoxSecurity analysis of Even-Mansour structure hash functionsCryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applicationsIntroducing a new connection between the entries of MDS matrices constructed by generalized Cauchy matrices in \(GF(2^q)\)Construction of recursive MDS matrices using DLS matricesTight preimage resistance of the sponge constructionLight but tight: lightweight composition of serialized S-boxes with diffusion layers for strong ciphersOn construction of lightweight MDS matricesA modular approach to the security analysis of two-permutation constructionsBBB security for 5-round even-Mansour-based key-alternating Feistel ciphersAnalyzing masked ciphers against transition and coupling effectsFour by four MDS matrices with the fewest XOR gates based on wordsHold your breath, PRIMATEs are lightweightTwin column parity mixers and Gaston. A new mixing layer and permutationCryptanalysis of masked ciphers: a not so random ideaImpossible Differentials of SPN CiphersObstacle Numbers of Planar GraphsCryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modesOn circulant involutory MDS matricesAlmost involutory recursive MDS diffusion layersImproved cryptanalysis of AES-like permutationsRecursive MDS matrices over finite commutative ringsNew Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message LengthLightweight MDS Generalized Circulant MatricesOn the Construction of Lightweight Circulant Involutory MDS MatricesSOME METHODS FOR CONSTRUCTING MDS-MATRICES OVER FINITE FIELDsLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitivesOn the direct construction of recursive MDS matricesTowards a general construction of recursive MDS diffusion layersStatistical integral distinguisher with multi-structure and its application on AES-like ciphersAnalyzing Permutations for AES-like Ciphers: Understanding ShiftRowsConstruction of MDS matrices from generalized Feistel structuresConstruction of lightweight involutory MDS matricesDistinguisher on full-round compression function of GOST RПолное описание одного класса MDS-матриц над конечным полем характеристики 2On some properties of an XSL-networkWide Trail Design Strategy for Binary MixColumnsBeyond conventional security in sponge-based authenticated encryption modesLightweight Multiplication in $$GF(2^n)$$ with Applications to MDS MatricesOn the construction of \(4 \times 4\) lightweight involutory MDS matrices over \(\mathbb{F}_{2^8}\)Multi-user BBB security of public permutations based MACAnalyzing the provable security bounds of GIFT-COFB and Photon-BeetleEfficient recursive diffusion layers for block ciphers and hash functions


Uses Software



This page was built for publication: The PHOTON Family of Lightweight Hash Functions