\textsc{Poseidon}2: a faster version of the \textsc{Poseidon} hash function
From MaRDI portal
Publication:6186347
DOI10.1007/978-3-031-37679-5_8MaRDI QIDQ6186347
Lorenzo Grassi, Dmitry Khovratovich, Markus Schofnegger
Publication date: 2 February 2024
Published in: Progress in Cryptology - AFRICACRYPT 2023 (Search for Journal in Brave)
Cites Work
- Efficient computation of zero-dimensional Gröbner bases by change of ordering
- Mind the middle layer: the HADES design strategy revisited
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- On a generalization of substitution-permutation networks: the HADES design strategy
- Feistel structures for MPC, and more
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC
- Scalable zero knowledge with no trusted setup
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- The Wide Trail Design Strategy
- The interpolation attack on block ciphers
- Fast Reed-Solomon Interactive Oracle Proofs of Proximity
- On the Indifferentiability of the Sponge Construction
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: \textsc{Poseidon}2: a faster version of the \textsc{Poseidon} hash function