2

ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny featured image

ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny

We study possible alternatives for ShiftRows to be used as cell permutations in AES-like ciphers. As observed during the design process of the block cipher Midori, when using a …

gianira-n.-alfarano
Haraka - Efficient Short-Input Hashing for Post-Quantum Applications featured image

Haraka - Efficient Short-Input Hashing for Post-Quantum Applications

Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared …

avatar
Stefan Kölbl

Troika: a ternary cryptographic hash function

Linear codes over finite fields are one of the most well-studied areas in coding theory. While codes over finite fields of characteristic two are of particular practical interest …

avatar
Stefan Kölbl