Troika: a ternary cryptographic hash function
From MaRDI portal
Publication:2285779
DOI10.1007/s10623-019-00673-2zbMath1469.94104OpenAlexW2971081319WikidataQ127311275 ScholiaQ127311275MaRDI QIDQ2285779
Elmar Tischhauser, Patrick Derbez, Andrey Bogdanov, Stefan Kölbl
Publication date: 9 January 2020
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-019-00673-2
Related Items (1)
Uses Software
Cites Work
- Ternary self-orthogonal codes of dual distance three and ternary quantum codes of distance three
- Differential cryptanalysis of DES-like cryptosystems
- Optimal ternary quasi-cyclic codes
- Optimal ternary linear codes
- Proving resistance against invariant attacks: how to choose the round constants
- Three-weight ternary linear codes from a family of cyclic difference sets
- Linear frameworks for block ciphers
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- Nonlinear Invariant Attack
- Piccolo: An Ultra-Lightweight Blockcipher
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- PRESENT: An Ultra-Lightweight Block Cipher
- A New Family of Ternary Almost Perfect Nonlinear Mappings
- Sponge-Based Pseudo-Random Number Generators
- Pseudorandom Permutation Families over Abelian Groups
- Keccak
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- On the Indifferentiability of the Sponge Construction
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Troika: a ternary cryptographic hash function