Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols

While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such as multi-party computation and zero knowledge proofs require optimization with respect to a diffe...

Full description

Bibliographic Details
Main Authors: Abdelrahaman Aly, Tomer Ashur, Eli Ben-Sasson, Alan Szepieniec
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2020-09-01
Series:IACR Transactions on Symmetric Cryptology
Subjects:
Online Access:https://tosc.iacr.org/index.php/ToSC/article/view/8695