Poseidon: A new hash function for {Zero-Knowledge} proof systems

L Grassi, D Khovratovich, C Rechberger… - 30th USENIX Security …, 2021 - usenix.org
The area of practical computational integrity proof systems, like SNARKs, STARKs,
Bulletproofs, is seeing a very dynamic development with several constructions having …

Design of symmetric-key primitives for advanced cryptographic protocols

A Aly, T Ashur, E Ben-Sasson, S Dhooghe… - IACR Transactions on …, 2020 - tosc.iacr.org
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient
hardware and software implementations, a range of emerging applications using advanced …

Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields

C Dobraunig, L Grassi, A Guinet, D Kuijsters - … International Conference on …, 2021 - Springer
Motivated by new applications such as secure Multi-Party Computation (MPC), Fully
Homomorphic Encryption (FHE), and Zero-Knowledge proofs (ZK), the need for symmetric …

On a generalization of substitution-permutation networks: The HADES design strategy

L Grassi, R Lüftenegger, C Rechberger… - Advances in Cryptology …, 2020 - Springer
Keyed and unkeyed cryptographic permutations often iterate simple round functions.
Substitution-permutation networks (SPNs) are an approach that is popular since the mid …

Reinforced concrete: a fast hash function for verifiable computation

L Grassi, D Khovratovich, R Lüftenegger… - Proceedings of the …, 2022 - dl.acm.org
We propose a new hash function Reinforced Concrete, which is the first generic purpose
hash that is fast both for a zero-knowledge prover and in native x86 computations. It is …

Shorter signatures based on tailor-made minimalist symmetric-key crypto

C Dobraunig, D Kales, C Rechberger… - Proceedings of the …, 2022 - dl.acm.org
Signature schemes based on the MPC-in-the-head approach (MPCitH) have either been
designed by taking a proof system and selecting a suitable symmetric-key primitive (Picnic …

Algebraic attacks on RAIN and AIM using equivalent representations

F Liu, M Mahzoun, M Øygarden, W Meier - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Designing novel symmetric-key primitives for advanced protocols like secure multiparty
computation (MPC), fully homomorphic encryption (FHE) and zero-knowledge proof systems …

AIM: symmetric primitive for shorter signatures with stronger security

S Kim, J Ha, M Son, B Lee, D Moon, J Lee… - Proceedings of the …, 2023 - dl.acm.org
Post-quantum signature schemes based on the MPC-in-the-Head (MPCitH) paradigm are
recently attracting significant attention as their security solely depends on the one-wayness …

Coefficient grouping: Breaking chaghri and more

F Liu, R Anand, L Wang, W Meier, T Isobe - … International Conference on …, 2023 - Springer
We propose an efficient technique called coefficient grouping to evaluate the algebraic
degree of the FHE-friendly cipher Chaghri, which has been accepted for ACM CCS 2022. It …

Cryptanalysis of symmetric primitives over rings and a key recovery attack on Rubato

L Grassi, I Manterola Ayala, MN Hovd… - Annual International …, 2023 - Springer
Symmetric primitives are a cornerstone of cryptography, and have traditionally been defined
over fields, where cryptanalysis is now well understood. However, a few symmetric …