Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
Zero-knowledge (ZK) applications form a large group of use cases in modern cryptography,
and recently gained in popularity due to novel proof systems. For many of these …
and recently gained in popularity due to novel proof systems. For many of these …
New design techniques for efficient arithmetization-oriented hash functions: anemoi permutations and jive compression mode
Advanced cryptographic protocols such as Zero-knowledge (ZK) proofs of knowledge,
widely used in cryptocurrency applications such as Zcash, Monero, Filecoin, Tezos, Topos …
widely used in cryptocurrency applications such as Zcash, Monero, Filecoin, Tezos, Topos …
[PDF][PDF] Pasta: A case for hybrid homomorphic encryption
The idea of hybrid homomorphic encryption (HHE) is to drastically reduce bandwidth
requirements when using homomorphic encryption (HE) at the cost of more expensive …
requirements when using homomorphic encryption (HE) at the cost of more expensive …
Reinforced concrete: a fast hash function for verifiable computation
L Grassi, D Khovratovich, R Lüftenegger… - Proceedings of the …, 2022 - dl.acm.org
We propose a new hash function Reinforced Concrete, which is the first generic purpose
hash that is fast both for a zero-knowledge prover and in native x86 computations. It is …
hash that is fast both for a zero-knowledge prover and in native x86 computations. It is …
Poseidon2: A Faster Version of the Poseidon Hash Function
Zero-knowledge proof systems for computational integrity have seen a rise in popularity in
the last couple of years. One of the results of this development is the ongoing effort in …
the last couple of years. One of the results of this development is the ongoing effort in …
The Algebraic FreeLunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives
In this paper, we present a new type of algebraic attack that applies to many recent
arithmetization-oriented families of permutations, such as those used in Griffin, Anemoi …
arithmetization-oriented families of permutations, such as those used in Griffin, Anemoi …
Cryptanalysis of symmetric primitives over rings and a key recovery attack on Rubato
L Grassi, I Manterola Ayala, MN Hovd… - Annual International …, 2023 - Springer
Symmetric primitives are a cornerstone of cryptography, and have traditionally been defined
over fields, where cryptanalysis is now well understood. However, a few symmetric …
over fields, where cryptanalysis is now well understood. However, a few symmetric …
Loquat: A SNARK-Friendly Post-quantum Signature Based on the Legendre PRF with Applications in Ring and Aggregate Signatures
We design and implement a novel post-quantum signature scheme based on the Legendre
PRF, named Loquat. Prior to this work, efficient approaches for constructing post-quantum …
PRF, named Loquat. Prior to this work, efficient approaches for constructing post-quantum …
Monolith: Circuit-friendly hash functions with new nonlinear layers for fast and constant-time implementations
L Grassi, D Khovratovich, R Lüftenegger… - IACR Transactions on …, 2024 - tosc.iacr.org
Hash functions are a crucial component in incrementally verifiable computation (IVC)
protocols and applications. Among those, recursive SNARKs and folding schemes require …
protocols and applications. Among those, recursive SNARKs and folding schemes require …
Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi
K Koschatko, R Lüftenegger… - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Gröbner basis cryptanalysis of hash functions and ciphers, and their underlying
permutations, has seen renewed interest recently. Anemoi (Crypto'23) is a permutation …
permutations, has seen renewed interest recently. Anemoi (Crypto'23) is a permutation …