Author of the publication

Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications.

, , , , , and . CRYPTO (3), volume 14083 of Lecture Notes in Computer Science, page 573-606. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX)., , , , , , , and . CRYPTO (3), volume 12172 of Lecture Notes in Computer Science, page 419-448. Springer, (2020)Key Filtering in Cube Attacks from the Implementation Aspect., , , , and . CANS, volume 14342 of Lecture Notes in Computer Science, page 293-317. Springer, (2023)Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD., , , , and . EUROCRYPT (1), volume 12105 of Lecture Notes in Computer Science, page 466-495. Springer, (2020)Massive Superpoly Recovery with Nested Monomial Predictions., , , , and . ASIACRYPT (1), volume 13090 of Lecture Notes in Computer Science, page 392-421. Springer, (2021)Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications., , , , , and . CRYPTO (3), volume 14083 of Lecture Notes in Computer Science, page 573-606. Springer, (2023)An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums., , , and . ASIACRYPT (1), volume 12491 of Lecture Notes in Computer Science, page 446-476. Springer, (2020)Extreme Algebraic Attacks., and . IACR Cryptol. ePrint Arch., (2024)Lightweight AEAD and Hashing using the Sparkle Permutation Family., , , , , , , and . IACR Trans. Symmetric Cryptol., 2020 (S1): 208-261 (2020)Algebraic Attacks on Round-Reduced Rain and Full AIM-III., , , , and . ASIACRYPT (3), volume 14440 of Lecture Notes in Computer Science, page 285-310. Springer, (2023)An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC., , , , , , and . ASIACRYPT (1), volume 12491 of Lecture Notes in Computer Science, page 477-506. Springer, (2020)