Author:
Grassi Lorenzo,Khovratovich Dmitry,Schofnegger Markus
Publisher
Springer Nature Switzerland
Reference47 articles.
1. Lecture Notes in Computer Science;MR Albrecht,2019
2. Lecture Notes in Computer Science;MR Albrecht,2019
3. Lecture Notes in Computer Science;M Albrecht,2016
4. Aly, A., Ashur, T., Eli Ben-Sasson, Dhooghe, S., Szepieniec, A.: Design of symmetric-key primitives for advanced cryptographic protocols. IACR Trans. Symmetric Cryptol. 2020(3), 1–45 (2020)
5. Ambrona, M., Schmitt, A., Toledo, R.R., Willems, D.: New optimization techniques for PlonK’s arithmetization. IACR Cryptol. ePrint Arch., p. 462 (2022)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Towards Post-Quantum Verifiable Credentials;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
2. Solving Degree Bounds for Iterated Polynomial Systems;IACR Transactions on Symmetric Cryptology;2024-03-01
3. Algebraic Cryptanalysis of the HADES Design Strategy: Application to Poseidon and Poseidon2;Lecture Notes in Computer Science;2024