Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols

While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such as multi-party computation and zero knowledge proofs require optimization with respect to a differ...

Full description

Saved in:
Bibliographic Details
Published inIACR Transactions on Symmetric Cryptology Vol. 2020; no. 3
Main Authors Abdelrahaman Aly, Tomer Ashur, Eli Ben-Sasson, Alan Szepieniec
Format Journal Article
LanguageEnglish
Published Ruhr-Universität Bochum 01.01.2020
Subjects
Online AccessGet full text

Cover

Loading…