We propose a new hash function Reinforced Concrete, which is the first generic purpose hash that is fast both for a zero-knowledge prover and in native x86 computations. It is suitable for a various range of zero-knowledge proofs and protocols, from set membership to generic purpose verifiable computation. Being up to 15x faster than its predecessor Poseidon hash, Reinforced Concrete inherits security from traditional time-tested schemes such as AES, whereas taking the zero-knowledge performance from a novel and efficient decomposition of a prime field into compact buckets. The new hash function is suitable for a wide range of applications like privacy-preserving cryptocurrencies, verifiable encryption, protocols with state membership proo...
We introduce VSH, very smooth hash, a new S-bit hash function that is provably collision-resistant a...
Verifiable computation (VC) protocols enable clients to outsource computations to untrusted servers ...
The sequential computation of hashes at the core of many distributed storage systems and found, for ...
SNARK is a well-known family of cryptographic tools that is increasingly used in the field of comput...
ZK-SNARKs are advanced cryptographic protocols used in private verifiable computation: modern SNARKs...
A hash chain H for a hash function hash(.) is a sequence of hash values , where x(0) is a secret val...
In this paper, we present a construction of hash functions. These functions are collision free in th...
This paper shows how to securely authenticate messages using just 29 bit operations per authenticate...
We present a high-assurance and high-speed implementation of the SHA-3 hash function. Our implementa...
In this paper we consider very fast evaluation of strongly universal hash functions, or equivalently...
Doctor en Ciencias, Mención ComputaciónSe estudian funciones de hash resistentes a colisiones (FHRC)...
We introduce VSH, very smooth hash, a new S-bit hash function that is provably collision-resistant a...
The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compression functi...
We establish a set of zero-knowledge arguments that allow for the hashing of a committed secret $a$-...
In this thesis, a new method for implementing cryptographic hash functions is proposed. This method ...
We introduce VSH, very smooth hash, a new S-bit hash function that is provably collision-resistant a...
Verifiable computation (VC) protocols enable clients to outsource computations to untrusted servers ...
The sequential computation of hashes at the core of many distributed storage systems and found, for ...
SNARK is a well-known family of cryptographic tools that is increasingly used in the field of comput...
ZK-SNARKs are advanced cryptographic protocols used in private verifiable computation: modern SNARKs...
A hash chain H for a hash function hash(.) is a sequence of hash values , where x(0) is a secret val...
In this paper, we present a construction of hash functions. These functions are collision free in th...
This paper shows how to securely authenticate messages using just 29 bit operations per authenticate...
We present a high-assurance and high-speed implementation of the SHA-3 hash function. Our implementa...
In this paper we consider very fast evaluation of strongly universal hash functions, or equivalently...
Doctor en Ciencias, Mención ComputaciónSe estudian funciones de hash resistentes a colisiones (FHRC)...
We introduce VSH, very smooth hash, a new S-bit hash function that is provably collision-resistant a...
The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compression functi...
We establish a set of zero-knowledge arguments that allow for the hashing of a committed secret $a$-...
In this thesis, a new method for implementing cryptographic hash functions is proposed. This method ...
We introduce VSH, very smooth hash, a new S-bit hash function that is provably collision-resistant a...
Verifiable computation (VC) protocols enable clients to outsource computations to untrusted servers ...
The sequential computation of hashes at the core of many distributed storage systems and found, for ...