Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such as multi-party computation and zero knowledge proofs require optimization with respect to a diffe...
Main Authors: | Abdelrahaman Aly, Tomer Ashur, Eli Ben-Sasson, Alan Szepieniec |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2020-09-01
|
Series: | IACR Transactions on Symmetric Cryptology |
Subjects: | |
Online Access: | https://tosc.iacr.org/index.php/ToSC/article/view/8695 |
Similar Items
-
cryptographic Primitives: Insertions, Examples and Open Problems
by: Stanislav Olegovich Dordzhiev, et al.
Published: (2014-02-01) -
Cryptanalysis of Symmetric Cryptographic Primitives
by: Kircanski, Aleksandar
Published: (2013) -
A Study on Cryptographic Protocols: Achieving Strong Security for Zero-knowledge Proofs and Secure Computation
by: Kiyoshima, Susumu
Published: (2018) -
‘If You Prick Us Do We Not Bleed?’: Marvel Comics’ Vision: Director’s Cut Re-Evaluating What It Means to Be Human
by: Leah Henderson
Published: (2020-11-01) -
Cryptographically Secure Multiparty Computation and Distributed Auctions Using Homomorphic Encryption
by: Anunay Kulshrestha, et al.
Published: (2017-12-01)