\texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications
From MaRDI portal
Publication:6186772
DOI10.1007/978-3-031-38548-3_19MaRDI QIDQ6186772FDOQ6186772
Authors: Lorenzo Grassi, Yonglin Hao, Christian Rechberger, Markus Schofnegger, Roman Walch, Qingju Wang
Publication date: 2 February 2024
Published in: Advances in Cryptology – CRYPTO 2023 (Search for Journal in Brave)
Recommendations
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- Feistel structures for MPC, and more
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- Security of the Poseidon hash function against non-binary differential and linear attacks
- Spartan: efficient and general-purpose zkSNARKs without trusted setup
Cites Work
- Reverse-engineering the S-Bbox of Streebog, Kuznyechik and Stribobr1
- An algorithm for finding the basis elements of the residue class ring of a zero dimensional polynomial ideal
- Title not available (Why is that?)
- Higher-order differential properties of Keccak and Luffa
- The Random Oracle Model and the Ideal Cipher Model Are Equivalent
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- On the Indifferentiability of the Sponge Construction
- Title not available (Why is that?)
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Rebound attack on the full Lane compression function
- Title not available (Why is that?)
- Title not available (Why is that?)
- The Wide Trail Design Strategy
- Rebound distinguishers: results on the full Whirlpool compression function
- The interpolation attack on block ciphers
- On generalized Feistel networks
- On permutation polynomials over finite fields
- On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses
- Title not available (Why is that?)
- About Feistel schemes with six (or more) rounds
- Title not available (Why is that?)
- Selected Areas in Cryptography
- Aurora: transparent succinct arguments for R1CS
- Scalable zero knowledge with no trusted setup
- Indifferentiability of 8-Round Feistel Networks
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- Feistel structures for MPC, and more
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- On the size of pairing-based non-interactive arguments
- Title not available (Why is that?)
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- On a generalization of substitution-permutation networks: the HADES design strategy
- Ligero: lightweight sublinear arguments without a trusted setup
Cited In (2)
This page was built for publication: \texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6186772)