Poseidon: A new hash function for {Zero-Knowledge} proof systems
The area of practical computational integrity proof systems, like SNARKs, STARKs,
Bulletproofs, is seeing a very dynamic development with several constructions having …
Bulletproofs, is seeing a very dynamic development with several constructions having …
Design of symmetric-key primitives for advanced cryptographic protocols
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient
hardware and software implementations, a range of emerging applications using advanced …
hardware and software implementations, a range of emerging applications using advanced …
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
Motivated by new applications such as secure Multi-Party Computation (MPC), Fully
Homomorphic Encryption (FHE), and Zero-Knowledge proofs (ZK), the need for symmetric …
Homomorphic Encryption (FHE), and Zero-Knowledge proofs (ZK), the need for symmetric …
On a generalization of substitution-permutation networks: The HADES design strategy
L Grassi, R Lüftenegger, C Rechberger… - Advances in Cryptology …, 2020 - Springer
Keyed and unkeyed cryptographic permutations often iterate simple round functions.
Substitution-permutation networks (SPNs) are an approach that is popular since the mid …
Substitution-permutation networks (SPNs) are an approach that is popular since the mid …
Reinforced concrete: a fast hash function for verifiable computation
L Grassi, D Khovratovich, R Lüftenegger… - Proceedings of the …, 2022 - dl.acm.org
We propose a new hash function Reinforced Concrete, which is the first generic purpose
hash that is fast both for a zero-knowledge prover and in native x86 computations. It is …
hash that is fast both for a zero-knowledge prover and in native x86 computations. It is …
Shorter signatures based on tailor-made minimalist symmetric-key crypto
Signature schemes based on the MPC-in-the-head approach (MPCitH) have either been
designed by taking a proof system and selecting a suitable symmetric-key primitive (Picnic …
designed by taking a proof system and selecting a suitable symmetric-key primitive (Picnic …
Algebraic attacks on RAIN and AIM using equivalent representations
Designing novel symmetric-key primitives for advanced protocols like secure multiparty
computation (MPC), fully homomorphic encryption (FHE) and zero-knowledge proof systems …
computation (MPC), fully homomorphic encryption (FHE) and zero-knowledge proof systems …
AIM: symmetric primitive for shorter signatures with stronger security
Post-quantum signature schemes based on the MPC-in-the-Head (MPCitH) paradigm are
recently attracting significant attention as their security solely depends on the one-wayness …
recently attracting significant attention as their security solely depends on the one-wayness …
Coefficient grouping: Breaking chaghri and more
We propose an efficient technique called coefficient grouping to evaluate the algebraic
degree of the FHE-friendly cipher Chaghri, which has been accepted for ACM CCS 2022. It …
degree of the FHE-friendly cipher Chaghri, which has been accepted for ACM CCS 2022. It …
Cryptanalysis of symmetric primitives over rings and a key recovery attack on Rubato
L Grassi, I Manterola Ayala, MN Hovd… - Annual International …, 2023 - Springer
Symmetric primitives are a cornerstone of cryptography, and have traditionally been defined
over fields, where cryptanalysis is now well understood. However, a few symmetric …
over fields, where cryptanalysis is now well understood. However, a few symmetric …