Poseidon: A new hash function for {Zero-Knowledge} proof systems

L Grassi, D Khovratovich, C Rechberger… - 30th USENIX Security …, 2021 - usenix.org
The area of practical computational integrity proof systems, like SNARKs, STARKs,
Bulletproofs, is seeing a very dynamic development with several constructions having …

A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments

JH Kong, LM Ang, KP Seng - Journal of Network and Computer …, 2015 - Elsevier
Modern cryptographic algorithms play an irreplaceable role in data communication systems
for various areas of applications. These algorithms are the backbone of data protection and …

SIT: a lightweight encryption algorithm for secure internet of things

M Usman, I Ahmed, MI Aslam, S Khan… - arXiv preprint arXiv …, 2017 - arxiv.org
The Internet of Things (IoT) being a promising technology of the future is expected to
connect billions of devices. The increased number of communication is expected to …

Design of symmetric-key primitives for advanced cryptographic protocols

A Aly, T Ashur, E Ben-Sasson, S Dhooghe… - IACR Transactions on …, 2020 - tosc.iacr.org
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient
hardware and software implementations, a range of emerging applications using advanced …

[图书][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

[图书][B] The design of Rijndael

J Daemen, V Rijmen - 2002 - Springer
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …

PRESENT: An ultra-lightweight block cipher

A Bogdanov, LR Knudsen, G Leander, C Paar… - … and Embedded Systems …, 2007 - Springer
With the establishment of the AES the need for new block ciphers has been greatly
diminished; for almost all block cipher applications the AES is an excellent and preferred …

The block cipher Square

J Daemen, L Knudsen, V Rijmen - … , FSE'97 Haifa, Israel, January 20–22 …, 1997 - Springer
In this paper we present a new 128-bit block cipher called Square. The original design of
Square concentrates on the resistance against differential and linear cryptanalysis …

Integral cryptanalysis

L Knudsen, D Wagner - … Encryption: 9th International Workshop, FSE 2002 …, 2002 - Springer
This paper considers a cryptanalytic approach called integral cryptanalysis. It can be seen
as a dual to differential cryptanalysis and applies to ciphers not vulnerable to differential …

[PDF][PDF] Twofish: A 128-bit block cipher

B Schneier, J Kelsey, D Whiting, D Wagner… - NIST AES …, 1998 - karlin.mff.cuni.cz
Twofish is a 128-bit block cipher that accepts a variable-length key up to 256 bits. The cipher
is a 16-round Feistel network with a bijective F function made up of four key-dependent 8-by …