Poseidon: A new hash function for {Zero-Knowledge} proof systems

L Grassi, D Khovratovich, C Rechberger… - 30th USENIX Security …, 2021 - usenix.org
The area of practical computational integrity proof systems, like SNARKs, STARKs,
Bulletproofs, is seeing a very dynamic development with several constructions having …

Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications

L Grassi, Y Hao, C Rechberger, M Schofnegger… - Annual International …, 2023 - Springer
Zero-knowledge (ZK) applications form a large group of use cases in modern cryptography,
and recently gained in popularity due to novel proof systems. For many of these …

Design of symmetric-key primitives for advanced cryptographic protocols

A Aly, T Ashur, E Ben-Sasson, S Dhooghe… - IACR Transactions on …, 2020 - tosc.iacr.org
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient
hardware and software implementations, a range of emerging applications using advanced …

Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields

C Dobraunig, L Grassi, A Guinet, D Kuijsters - … International Conference on …, 2021 - Springer
Motivated by new applications such as secure Multi-Party Computation (MPC), Fully
Homomorphic Encryption (FHE), and Zero-Knowledge proofs (ZK), the need for symmetric …

[PDF][PDF] Pasta: A case for hybrid homomorphic encryption

C Dobraunig, L Grassi, L Helminger, C Rechberger… - 2023 - repository.ubn.ru.nl
The idea of hybrid homomorphic encryption (HHE) is to drastically reduce bandwidth
requirements when using homomorphic encryption (HE) at the cost of more expensive …

Reinforced concrete: a fast hash function for verifiable computation

L Grassi, D Khovratovich, R Lüftenegger… - Proceedings of the …, 2022 - dl.acm.org
We propose a new hash function Reinforced Concrete, which is the first generic purpose
hash that is fast both for a zero-knowledge prover and in native x86 computations. It is …

Poseidon2: A Faster Version of the Poseidon Hash Function

L Grassi, D Khovratovich, M Schofnegger - International Conference on …, 2023 - Springer
Zero-knowledge proof systems for computational integrity have seen a rise in popularity in
the last couple of years. One of the results of this development is the ongoing effort in …

Chaghri-a FHE-friendly block cipher

T Ashur, M Mahzoun, D Toprakhisar - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
The Recent progress in practical applications of secure computation protocols has also
attracted attention to the symmetric-key primitives underlying them. Whereas traditional …

Out of oddity–new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems

T Beyne, A Canteaut, I Dinur, M Eichlseder… - Advances in Cryptology …, 2020 - Springer
The security and performance of many integrity proof systems like SNARKs, STARKs and
Bulletproofs highly depend on the underlying hash function. For this reason several new …

Shorter signatures based on tailor-made minimalist symmetric-key crypto

C Dobraunig, D Kales, C Rechberger… - Proceedings of the …, 2022 - dl.acm.org
Signature schemes based on the MPC-in-the-head approach (MPCitH) have either been
designed by taking a proof system and selecting a suitable symmetric-key primitive (Picnic …