On the Indifferentiability of the Sponge Construction
From MaRDI portal
Publication:5458592
Recommendations
- Quantum indistinguishability of random sponges
- On the indifferentiability of Fugue and Luffa
- Security of truncated permutation without initial value
- How to build an ideal cipher: the indifferentiability of the Feistel construction
- Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6
Cited in
(only showing first 100 items - show all)- New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions
- Optimizing Online Permutation-Based AE Schemes for Lightweight Applications
- A robust and sponge-like PRNG with improved efficiency
- Hold your breath, PRIMATEs are lightweight
- New second preimage attacks on dithered hash functions with low memory complexity
- Tight preimage resistance of the sponge construction
- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
- Indifferentiability of confusion-diffusion networks
- An observation on NORX, BLAKE2, and ChaCha
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- Static-memory-hard functions, and modeling the cost of space vs. time
- Query-complexity amplification for random oracles
- Signcryption schemes with insider security in an ideal permutation model
- A modular approach to the incompressibility of block-cipher-based AEADs
- Security of truncated permutation without initial value
- The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC
- ALE: AES-based lightweight authenticated encryption
- Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives
- Optimal security for keyed hash functions: avoiding time-space tradeoffs for finding collisions
- Quark: a lightweight hash
- On the resilience of Even-Mansour to invariant permutations
- Analysis of NORX: investigating differential and rotational properties
- \textsc{scope}: on the side channel vulnerability of releasing unverified plaintexts
- Generic security of the SAFE API and its applications
- The indifferentiability of the duplex and its practical applications
- How to build an ideal cipher: the indifferentiability of the Feistel construction
- Sponge based CCA2 secure asymmetric encryption for arbitrary length message
- Security of permutation-based compression function {\textsf{lp}}231
- Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques
- Cryptanalysis of Tweaked Versions of SMASH and Reparation
- The NIST SHA-3 Competition: A Perspective on the Final Year
- Executing and proving over dirty ledgers
- Towards Understanding the Known-Key Security of Block Ciphers
- Optimizing a password hashing function with hardware-accelerated symmetric encryption
- Slide Attacks on a Class of Hash Functions
- Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff
- On time-space lower bounds for finding short collisions in sponge hash functions
- Crooked indifferentiability of enveloped XOR revisited
- Panther: a sponge based lightweight authenticated encryption scheme
- Classical proofs for the quantum collapsing property of classical hash functions
- Breaking \textsc{Panther}
- XPX: generalized tweakable Even-Mansour with improved security guarantees
- Simpira v2: a family of efficient permutations using the AES round function
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier
- New bounds for keyed sponges with extendable output: independence between capacity and message length
- LWDSA: light-weight digital signature algorithm for wireless sensor networks
- Linear structures: applications to cryptanalysis of round-reduced \textsc{Keccak}
- A measure of dependence for cryptographic primitives relative to ideal functions
- Algebraic-differential attacks on a family of arithmetization-oriented symmetric ciphers
- Exact security analysis of ASCON
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- Building indifferentiable compression functions from the PGV compression functions
- Beyond conventional security in sponge-based authenticated encryption modes
- Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour
- Algebraic Attacks on Round-Reduced Keccak
- \textsf{ISAP+}: \textsf{ISAP} with fast authentication
- Towards compressed permutation oracles
- Bash-f: another LRX sponge function
- Troika: a ternary cryptographic hash function
- Public-seed pseudorandom permutations
- An analysis of the blockcipher-based hash functions from PGV
- Whirlwind: a new cryptographic hash function
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method
- Sequential indifferentiability of confusion-diffusion networks
- Indifferentiability of 8-Round Feistel Networks
- How to incorporate associated data in sponge-based authenticated encryption
- \textsc{Poseidon}2: a faster version of the \textsc{Poseidon} hash function
- \texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications
- On the security of keyed hashing based on public permutations
- A sponge-based PRF with good multi-user security
- Differential analysis of the ternary hash function Troika
- From Indifferentiability to Constructive Cryptography (and Back)
- Double-block-length hash function for minimum memory size
- Forgery Attacks on Round-Reduced ICEPOLE-128
- On the indifferentiability of Fugue and Luffa
- The Oribatida v1.3 family of lightweight authenticated encryption schemes
- Security of the Poseidon hash function against non-binary differential and linear attacks
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
- Designing full-rate \textsf{Sponge} based AEAD modes
- Improved domain extender for the ideal cipher
- On the possibility of a backdoor in the Micali-Schnorr generator
- Preimage resistance of \(\mathsf{LP}mkr\) with \(r=m-1\)
- Compact privacy protocols from post-quantum and timed classical assumptions
- Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}
- Mind the composition: birthday bound attacks on EWCDMD and SoKAC21
- Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)
- Compactness of hashing modes and efficiency beyond Merkle tree
- Leakage resilient value comparison with application to message authentication
- From Farfalle to \textsc{Megafono} via Ciminion: the PRF \textsc{Hydra} for MPC applications
- Generic attack on duplex-based AEAD modes using random function statistics
- Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls
- Practical Analysis of Reduced-Round Keccak
- Generalized Feistel ciphers for efficient prime field masking
- Propagation properties of a non-linear mapping based on squaring in odd characteristic
- Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance
- A review of quantum and hybrid quantum/classical blockchain protocols
- Algebraic key-recovery attacks on reduced-round Xoofff
This page was built for publication: On the Indifferentiability of the Sponge Construction
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458592)