mirror of https://github.com/zcash/zips.git
More WIP.
Signed-off-by: Daira Hopwood <daira@jacaranda.org>
This commit is contained in:
parent
6453611314
commit
e62d57959e
File diff suppressed because it is too large
Load Diff
|
@ -480,6 +480,99 @@ Received March~20, 2012.}
|
|||
urldate={2016-08-14}
|
||||
}
|
||||
|
||||
@misc{GKRRS2019,
|
||||
presort={GKRRS2019},
|
||||
author={Lorenzo Grassi and Dmitry Khovratovich and Christian Rechberger and Arnab Roy and Markus Schofnegger},
|
||||
title={Poseidon: A New Hash Function for Zero-Knowledge Proof Systems},
|
||||
url={https://eprint.iacr.org/2019/458},
|
||||
urldate={2021-02-28},
|
||||
howpublished={Cryptology ePrint Archive: Report 2019/458.
|
||||
Last updated December~16, 2020.}
|
||||
}
|
||||
|
||||
@misc{BDPA2007,
|
||||
presort={BDPA2007},
|
||||
author={Guido Bertoni and Joan Daemen and Michaël Peeters and Gilles {Van Assche}},
|
||||
title={Sponge functions},
|
||||
url={https://www.researchgate.net/publication/242285874_Sponge_Functions},
|
||||
urldate={2021-03-01},
|
||||
howpublished={ECRYPT Hash Workshop (May 2007), also available as a public comment to NIST
|
||||
as part of the Hash Algorithm Requirements and Evaluation Criteria for the SHA-3 competition.}
|
||||
}
|
||||
|
||||
@misc{BDPA2011,
|
||||
presort={BDPA2011},
|
||||
author={Guido Bertoni and Joan Daemen and Michaël Peeters and Gilles {Van Assche}},
|
||||
title={Cryptographic sponge functions},
|
||||
url={https://keccak.team/files/CSF-0.1.pdf},
|
||||
urldate={2021-03-01},
|
||||
howpublished={Team Keccak web page, \url{https://keccak.team/sponge\_duplex.html}. Version 0.1, January~14, 2011.}
|
||||
}
|
||||
|
||||
@misc{ADMA2015,
|
||||
presort={ADMA2015},
|
||||
author={Elena Andreeva and Joan Daemen and Bart Mennink and Gilles {Van Assche}},
|
||||
title={Security of Keyed Sponge Constructions Using a Modular Proof Approach},
|
||||
url={https://keccak.team/files/ModularKeyedSponge.pdf},
|
||||
urldate={2021-03-01},
|
||||
howpublished={Team Keccak web page, \url{https://keccak.team/papers.html}.},
|
||||
addendum={Originally published in \textsl{Fast Software Encryption - Proceeedings of the 22nd International Workshop
|
||||
(Istanbul, Turkey, March~8--11, 2015)}, pages 364--384; Springer, 2015. Note that the pre-proceedings version contained
|
||||
an oversight in the analysis of the outer-keyed sponge.}
|
||||
}
|
||||
|
||||
@inproceedings{GPT2015,
|
||||
presort={GPT2015},
|
||||
author={Peter Gazi and Krzysztof Pietrzak and Stefano Tessaro},
|
||||
title={The Exact {PRF} Security of Truncation: {T}ight Bounds for Keyed Sponges and Truncated {CBC}},
|
||||
booktitle={Advances in Cryptology - CRYPTO~2015.
|
||||
Proceedings of the 35th Annual International Cryptology Conference
|
||||
(Santa Barbara, California, USA, August~16--20, 2015), Part I},
|
||||
volume={9215},
|
||||
series={Lecture Notes in Computer Science},
|
||||
editor={Rosario Gennaro and Matthew Robshaw},
|
||||
pages={368--387},
|
||||
date={2015-08-01},
|
||||
publisher={Springer},
|
||||
isbn={978-3-662-47989-6},
|
||||
doi={10.1007/978-3-662-47989-6\_18},
|
||||
url={https://iacr.org/cryptodb/data/paper.php?pubkey=27279},
|
||||
urldate={2021-03-01}
|
||||
}
|
||||
|
||||
@misc{GG2015,
|
||||
presort={GG2015},
|
||||
author={Shoni Gilboa and Shay Gueron},
|
||||
title={Distinguishing a truncated random permutation from a random function},
|
||||
url={https://eprint.iacr.org/2015/773},
|
||||
urldate={2021-03-01},
|
||||
howpublished={Cryptology ePrint Archive: Report 2015/773.
|
||||
Received August~3, 2015.}
|
||||
}
|
||||
|
||||
@misc{KR2020,
|
||||
presort={KR2020},
|
||||
author={Nathan Keller and Asaf Rosemarin},
|
||||
title={Mind the Middle Layer: {T}he {HADES} Design Strategy Revisited},
|
||||
url={https://eprint.iacr.org/2020/179},
|
||||
urldate={2021-03-01},
|
||||
howpublished={Cryptology ePrint Archive: Report 2020/179.
|
||||
Received February~13, 2020.}
|
||||
}
|
||||
|
||||
@misc{BCD+2020,
|
||||
presort={BCD+2020},
|
||||
author={Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Gaëtan Leurent and
|
||||
María Naya-Plasencia and Léo Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer},
|
||||
title={Out of Oddity --- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems},
|
||||
url={https://eprint.iacr.org/2020/188},
|
||||
urldate={2021-03-01},
|
||||
howpublished={Cryptology ePrint Archive: Report 2020/188.
|
||||
Last revised November~11, 2020.},
|
||||
addendum={Originally published (with major differences) in \textsl{Advances in Cryptology - CRYPTO~2020}, Vol.~12172 pages 299--328;
|
||||
Lecture Notes in Computer Science; Springer, 2020.}
|
||||
}
|
||||
|
||||
@misc{AGRRT2017,
|
||||
presort={AGRRT2017},
|
||||
author={Martin Albrecht and Lorenzo Grassi and Christian Rechberger and
|
||||
|
|
Loading…
Reference in New Issue