Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications

L Grassi, Y Hao, C Rechberger, M Schofnegger… - Annual International …, 2023 - Springer
Zero-knowledge (ZK) applications form a large group of use cases in modern cryptography,
and recently gained in popularity due to novel proof systems. For many of these …

New design techniques for efficient arithmetization-oriented hash functions: anemoi permutations and jive compression mode

C Bouvier, P Briaud, P Chaidos, L Perrin… - Annual International …, 2023 - Springer
Advanced cryptographic protocols such as Zero-knowledge (ZK) proofs of knowledge,
widely used in cryptocurrency applications such as Zcash, Monero, Filecoin, Tezos, Topos …

[PDF][PDF] Pasta: A case for hybrid homomorphic encryption

C Dobraunig, L Grassi, L Helminger, C Rechberger… - 2023 - repository.ubn.ru.nl
The idea of hybrid homomorphic encryption (HHE) is to drastically reduce bandwidth
requirements when using homomorphic encryption (HE) at the cost of more expensive …

Reinforced concrete: a fast hash function for verifiable computation

L Grassi, D Khovratovich, R Lüftenegger… - Proceedings of the …, 2022 - dl.acm.org
We propose a new hash function Reinforced Concrete, which is the first generic purpose
hash that is fast both for a zero-knowledge prover and in native x86 computations. It is …

Poseidon2: A Faster Version of the Poseidon Hash Function

L Grassi, D Khovratovich, M Schofnegger - International Conference on …, 2023 - Springer
Zero-knowledge proof systems for computational integrity have seen a rise in popularity in
the last couple of years. One of the results of this development is the ongoing effort in …

The Algebraic FreeLunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives

A Bariant, A Boeuf, A Lemoine… - Annual International …, 2024 - Springer
In this paper, we present a new type of algebraic attack that applies to many recent
arithmetization-oriented families of permutations, such as those used in Griffin, Anemoi …

Cryptanalysis of symmetric primitives over rings and a key recovery attack on Rubato

L Grassi, I Manterola Ayala, MN Hovd… - Annual International …, 2023 - Springer
Symmetric primitives are a cornerstone of cryptography, and have traditionally been defined
over fields, where cryptanalysis is now well understood. However, a few symmetric …

Loquat: A SNARK-Friendly Post-quantum Signature Based on the Legendre PRF with Applications in Ring and Aggregate Signatures

X Zhang, R Steinfeld, MF Esgin, JK Liu, D Liu… - Annual International …, 2024 - Springer
We design and implement a novel post-quantum signature scheme based on the Legendre
PRF, named Loquat. Prior to this work, efficient approaches for constructing post-quantum …

Monolith: Circuit-friendly hash functions with new nonlinear layers for fast and constant-time implementations

L Grassi, D Khovratovich, R Lüftenegger… - IACR Transactions on …, 2024 - tosc.iacr.org
Hash functions are a crucial component in incrementally verifiable computation (IVC)
protocols and applications. Among those, recursive SNARKs and folding schemes require …

Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi

K Koschatko, R Lüftenegger… - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Gröbner basis cryptanalysis of hash functions and ciphers, and their underlying
permutations, has seen renewed interest recently. Anemoi (Crypto'23) is a permutation …