{"id":1812,"date":"2024-04-25T00:00:00","date_gmt":"2024-04-24T22:00:00","guid":{"rendered":"https:\/\/stap-wiki.fr\/index.php\/all-stap-primitives-2\/"},"modified":"2024-04-25T00:00:00","modified_gmt":"2024-04-24T22:00:00","slug":"all-stap-primitives-2","status":"publish","type":"page","link":"https:\/\/stap-wiki.fr\/index.php\/all-stap-primitives-2\/","title":{"rendered":"All STAP primitives"},"content":{"rendered":"<p>[vc_row height=&#8221;medium&#8221; us_bg_overlay_color=&#8221;#f5f5f5&#8243; us_shape_show_bottom=&#8221;1&#8243; us_shape_color_bottom=&#8221;#ffffff&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22%23f5f5f5%22%7D%7D&#8221;][vc_column width=&#8221;5\/6&#8243;][vc_column_text css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23023047%22%7D%7D&#8221;]<\/p>\n<h2>List of STAP primitives<\/h2>\n<p>[\/vc_column_text][us_separator][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][vc_row height=&#8221;small&#8221; color_scheme=&#8221;alternate&#8221; us_bg_overlay_color=&#8221;#ffffff&#8221; us_shape_show_top=&#8221;1&#8243; us_shape_color_top=&#8221;#ffffff&#8221; us_shape_flip_top=&#8221;1&#8243; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_header_middle_bg%22%7D%7D&#8221;][vc_column link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/12&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][us_separator size=&#8221;small&#8221;][vc_custom_heading text=&#8221;STAP Lounge&#8221; font_container=&#8221;tag:h2|font_size:42|text_align:center|color:%23219ebc&#8221; google_fonts=&#8221;font_family:ABeeZee%3Aregular%2Citalic|font_style:400%20regular%3A400%3Anormal&#8221;][vc_column_text css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22_footer_bg%22%7D%7D&#8221;]<\/p>\n<p style=\"text-align: center;\">The STAP Zoo currently collects information about the following list of primitives:<\/p>\n<p style=\"text-align: center;\"><em>(BC = Block Ciphers, SC = Stream Ciphers, HF = Hash functions, PRF = Pseudo-Random Functions,<br \/>\nFHE = Fully Homomorphic Encryption, MPC = Multi Party Computation, ZK = Zero Knowledge)<\/em><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/12&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row us_bg_overlay_color=&#8221;_header_middle_text&#8221;][vc_column][us_html css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22_header_middle_bg%22%7D%7D&#8221;]%3C%21DOCTYPE%20html%3E%0A%3Chtml%20lang%3D%27en%27%3E%0A%3Chead%3E%0A%3Cstyle%3E%0A%20%20%20%20table%20%7B%20%0A%20%20%20%20%20%20%20%20border-collapse%3Acollapse%3B%20%0A%20%20%20%20%20%20%20%20border-spacing%3A0%3B%20%0A%20%20%20%20%20%20%20%20empty-cells%3Ashow%20%0A%20%20%20%20%7D%0A%20%20%20%20td%2C%20th%20%7B%20%0A%20%20%20%20%20%20%20%20vertical-align%3Atop%3B%20%0A%20%20%20%20%20%20%20%20font-size%3A10pt%3B%0A%20%20%20%20%7D%0A%20%20%20%20.ptab%20%7B%20%0A%20%20%20%20%20%20%20%20white-space%3A%20nowrap%3B%20%0A%20%20%20%20%7D%0A%20%20%20%20span.footnodeNumber%20%7B%20%0A%20%20%20%20%20%20%20%20padding-right%3A1em%3B%20%0A%20%20%20%20%7D%0A%20%20%20%20span.heading_numbering%20%7B%20%0A%20%20%20%20%20%20%20%20margin-right%3A%200.8rem%3B%20%0A%20%20%20%20%7D%2A%20%7B%20margin%3A0%3B%7D%0A%20%20%20%20.ta1%20%7B%20%0A%20%20%20%20%20%20%20%20writing-mode%3Ahorizontal-tb%3B%20%0A%20%20%20%20%20%20%20%20direction%3Altr%3B%20%0A%20%20%20%20%7D%0A%0A%20%20%20%20.ce0%20%7B%20%0A%20%20%20%20%20%20%20%20font-size%3A10pt%3B%20%0A%20%20%20%20%20%20%20%20font-family%3A%27Liberation%20Sans%27%3B%20%0A%20%20%20%20%20%20%20%20border-bottom-style%3Asolid%3B%20%0A%20%20%20%20%20%20%20%20border-bottom-width%3ANaNcm%3B%20%0A%20%20%20%20%20%20%20%20border-bottom-color%3A%23ffffff%3B%20%0A%20%20%20%20%20%20%20%20background-color%3A%23ffffff%3B%20%0A%20%20%20%20%20%20%20%20color%3A%23ffffff%3B%20%0A%20%20%20%20%7D%0A%20%20%20%20.ce1%2C%20.ce2%2C%20.ce3%2C%20.ce4%2C%20.ce5%20%7B%0A%20%20%20%20%20%20%20%20font-size%3A12pt%3B%20%0A%20%20%20%20%20%20%20%20font-family%3A%27Liberation%20Sans%27%3B%20%20%20%20%20%20%20%20%20%0A%20%20%20%20%7D%0A%20%20%20%20.ce1%20%7B%20%0A%20%20%20%20%20%20%20%20background-color%3A%23023047%3B%20%0A%20%20%20%20%20%20%20%20border-width%3ANaNcm%3B%20%0A%20%20%20%20%20%20%20%20border-style%3Asolid%3B%20%0A%20%20%20%20%20%20%20%20border-color%3A%23ffffff%3B%20%0A%20%20%20%20%20%20%20%20text-align%3Acenter%20%21%20important%3B%20%0A%20%20%20%20%20%20%20%20margin-left%3A0cm%3B%20%0A%20%20%20%20%20%20%20%20color%3A%23ffffff%3B%20%0A%20%20%20%20%20%20%20%20font-weight%3Abold%3B%20%0A%20%20%20%20%7D%0A%20%20%20%20.ce2%2C%20.ce3%2C%20.ce4%2C%20.ce5%20%7B%20%0A%20%20%20%20%20%20%20%20color%3A%23219ebc%3B%0A%20%20%20%20%20%20%20%20border-bottom-style%3Anone%3B%20%0A%20%20%20%20%20%20%20%20border-top-style%3Anone%3B%20%20%0A%20%20%20%20%7D%0A%20%20%20%20.ce2%2C%20.ce3%20%7B%0A%20%20%20%20%20%20%20%20background-color%3A%23ffffff%3B%20%0A%20%20%20%20%7D%0A%20%20%20%20.ce4%2C%20.ce5%20%7B%20%0A%20%20%20%20%20%20%20%20background-color%3A%23f2f2f2%3B%20%0A%20%20%20%20%7D%0A%20%20%20%20.ce2%2C%20.ce4%20%7B%20%0A%20%20%20%20%20%20%20%20border-left-style%3Asolid%3B%20%0A%20%20%20%20%20%20%20%20border-left-width%3ANaNcm%3B%20%0A%20%20%20%20%20%20%20%20border-left-color%3A%23ffffff%3B%20%0A%20%20%20%20%20%20%20%20border-right-style%3Anone%3B%20%0A%20%20%20%20%7D%0A%20%20%20%20.ce3%2C%20.ce5%20%7B%20%0A%20%20%20%20%20%20%20%20border-left-style%3Anone%3B%20%0A%20%20%20%20%20%20%20%20border-right-width%3ANaNcm%3B%20%0A%20%20%20%20%20%20%20%20border-right-style%3Asolid%3B%20%0A%20%20%20%20%20%20%20%20border-right-color%3A%23023047%3B%20%0A%20%20%20%20%7D%0A%20%20%20%20.ce6%2C%20.ce7%2C%20.ce8%2C%20.ce9%20%7B%0A%20%20%20%20%20%20%20%20font-size%3A10pt%3B%20%0A%20%20%20%20%20%20%20%20font-family%3A%27Liberation%20Sans%27%3B%20%20%20%20%0A%20%20%20%20%20%20%20%20border-bottom-style%3Anone%3B%20%20%20%20%0A%20%20%20%20%20%20%20%20border-top-style%3Anone%3B%20%0A%20%20%20%20%20%20%20%20text-align%3Acenter%20%21%20important%3B%20%0A%20%20%20%20%20%20%20%20margin-left%3A0cm%3B%20%20%20%0A%20%20%20%20%7D%0A%20%20%20%20.ce6%2C%20.ce7%20%7B%0A%20%20%20%20%20%20%20%20background-color%3A%23ffffff%3B%20%0A%20%20%20%20%7D%0A%20%20%20%20.ce8%2C%20.ce9%20%7B%0A%20%20%20%20%20%20%20%20background-color%3A%23f2f2f2%3B%20%0A%20%20%20%20%7D%0A%20%20%20%20.ce6%2C%20.ce8%20%7B%20%0A%20%20%20%20%20%20%20%20border-left-style%3Asolid%3B%20%0A%20%20%20%20%20%20%20%20border-left-width%3ANaNcm%3B%20%0A%20%20%20%20%20%20%20%20border-right-width%3ANaNcm%3B%20%0A%20%20%20%20%20%20%20%20border-right-style%3Asolid%3B%20%0A%20%20%20%20%7D%0A%20%20%20%20.ce6%20%7B%20%0A%20%20%20%20%20%20%20%20border-left-color%3A%23ffffff%3B%20%0A%20%20%20%20%20%20%20%20border-right-color%3A%23ffffff%3B%20%0A%20%20%20%20%7D%0A%20%20%20%20.ce8%20%7B%20%0A%20%20%20%20%20%20%20%20border-left-color%3A%23f2f2f2%3B%20%0A%20%20%20%20%20%20%20%20border-right-color%3A%23f2f2f2%3B%20%0A%20%20%20%20%7D%0A%20%20%20%20.ce7%2C%20.ce9%20%7B%20%0A%20%20%20%20%20%20%20%20border-left-style%3Anone%3B%20%0A%20%20%20%20%20%20%20%20border-right-width%3ANaNcm%3B%20%0A%20%20%20%20%20%20%20%20border-right-style%3Asolid%3B%20%0A%20%20%20%20%20%20%20%20border-right-color%3A%23023047%3B%20%0A%20%20%20%20%7D%0A%0A%20%20%20%20.ro%20%7B%20%0A%20%20%20%20%20%20%20%20height%3A0.470cm%3B%20%0A%20%20%20%20%7D%0A%3C%2Fstyle%3E%0A%3C%2Fhead%3E%0A%3Cbody%20dir%3D%22ltr%22%3E%0A%20%20%20%20%3Ctable%20border%3D%220%22%20cellspacing%3D%220%22%20cellpadding%3D%220%22%20class%3D%22ta1%22%3E%0A%20%20%20%20%3Ccolgroup%3E%0A%20%20%20%20%20%20%20%20%3Ccol%20width%3D%22168%22%2F%3E%3Ccol%20width%3D%22184%22%2F%3E%3Ccol%20width%3D%2233%22%2F%3E%3Ccol%20width%3D%2233%22%2F%3E%3Ccol%20width%3D%2232%22%2F%3E%3Ccol%20width%3D%2243%22%2F%3E%3Ccol%20width%3D%2243%22%2F%3E%3Ccol%20width%3D%2246%22%2F%3E%3Ccol%20width%3D%2232%22%2F%3E%0A%20%20%20%20%3C%2Fcolgroup%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20style%3D%22text-align%3Aleft%3Bwidth%3A3.847cm%3B%20%22%20class%3D%22ce0%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20style%3D%22text-align%3Aleft%3Bwidth%3A4.221cm%3B%20%22%20class%3D%22ce0%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20colspan%3D%224%22%20style%3D%22text-align%3Aleft%3Bwidth%3A0.764cm%3B%20%22%20class%3D%22ce1%22%3E%3Cp%20class%3D%22ptab%22%3EPrimitives%20Type%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20colspan%3D%223%22%20style%3D%22text-align%3Aleft%3Bwidth%3A0.974cm%3B%20%22%20class%3D%22ce1%22%3E%3Cp%20class%3D%22ptab%22%3EUses-cases%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20style%3D%22text-align%3Aleft%3Bwidth%3A3.847cm%3B%20%22%20class%3D%22ce0%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20style%3D%22text-align%3Aleft%3Bwidth%3A4.221cm%3B%20%22%20class%3D%22ce0%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20style%3D%22text-align%3Aleft%3Bwidth%3A0.764cm%3B%20%22%20class%3D%22ce1%22%3E%3Cp%20class%3D%22ptab%22%3EBC%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20style%3D%22text-align%3Aleft%3Bwidth%3A0.764cm%3B%20%22%20class%3D%22ce1%22%3E%3Cp%20class%3D%22ptab%22%3ESC%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20style%3D%22text-align%3Aleft%3Bwidth%3A0.743cm%3B%20%22%20class%3D%22ce1%22%3E%3Cp%20class%3D%22ptab%22%3EHF%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20style%3D%22text-align%3Aleft%3Bwidth%3A0.974cm%3B%20%22%20class%3D%22ce1%22%3E%3Cp%20class%3D%22ptab%22%3EPRF%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20style%3D%22text-align%3Aleft%3Bwidth%3A0.974cm%3B%20%22%20class%3D%22ce1%22%3E%3Cp%20class%3D%22ptab%22%3EFHE%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20style%3D%22text-align%3Aleft%3Bwidth%3A1.057cm%3B%20%22%20class%3D%22ce1%22%3E%3Cp%20class%3D%22ptab%22%3EMPC%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20style%3D%22text-align%3Aleft%3Bwidth%3A0.721cm%3B%20%22%20class%3D%22ce1%22%3E%3Cp%20class%3D%22ptab%22%3EZK%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23anemoi%22%3EAnemoi%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce4%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23arion%22%3EArion%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce5%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce9%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23chaghri%22%3EChaghri%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce4%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23ciminion%22%3ECiminion%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce5%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce9%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23darkmatter%22%3EDark%20Matter%20PRF%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce4%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23elisabeth%22%3EElisabeth%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce5%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce9%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23flip-variants%22%3EFLIP%20variants%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%3Cp%20class%3D%22ptab%22%3EFiLIP%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%3Cp%20class%3D%22ptab%22%3EFLIP%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce4%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23gmimc%22%3EGMiMC%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce5%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce9%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23goldreich%22%3EGoldreich%E2%80%99s%20PRG%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce4%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23grendel%22%3EGrendel%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce5%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce9%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23griffin%22%3EGriffin%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce4%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23hera%22%3EHera%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce5%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce9%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23hydra%22%3EHydra%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce4%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23kreyvium%22%3EKreyvium%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce5%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce9%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23legendre-prf%22%3ELegendre%20PRF%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce4%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23lowmc%22%3ELowMC%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce5%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce9%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23marvellous-1%22%3EMARVELlous%20designs%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%3Cp%20class%3D%22ptab%22%3EFriday%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%3Cp%20class%3D%22ptab%22%3EJarvis%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce4%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23marvellous-2%22%3EMarvellous%20designs%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce5%22%3E%3Cp%20class%3D%22ptab%22%3ERescue%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce9%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce4%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce5%22%3E%3Cp%20class%3D%22ptab%22%3ERescue-Prime%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce9%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce4%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce5%22%3E%3Cp%20class%3D%22ptab%22%3ERescue-Prime%20Optimized%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce9%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce4%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce5%22%3E%3Cp%20class%3D%22ptab%22%3EVision%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce9%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce4%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce5%22%3E%3Cp%20class%3D%22ptab%22%3EVision%20Mark-32%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce9%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce4%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce5%22%3E%3Cp%20class%3D%22ptab%22%3EXHash8%20and%20XHash12%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce9%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23mimc%22%3EMiMC%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce4%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23monolith%22%3EMonolith%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce5%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce9%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23poseidon-variants%22%3EPoseidon%20variants%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%3Cp%20class%3D%22ptab%22%3EHadesMiMC%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%3Cp%20class%3D%22ptab%22%3ENeptune%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%3Cp%20class%3D%22ptab%22%3EPoseidon%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%3Cp%20class%3D%22ptab%22%3EPoseidon%202%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce4%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23rain%22%3ERain%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce5%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce9%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23rasta-variants%22%3ERasta%20variants%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%3Cp%20class%3D%22ptab%22%3EDasta%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%3Cp%20class%3D%22ptab%22%3EFasta%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%3Cp%20class%3D%22ptab%22%3EMasta%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%3Cp%20class%3D%22ptab%22%3EPasta%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%3Cp%20class%3D%22ptab%22%3ERasta%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce4%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23reinforcedconcrete%22%3EReinforced%20Concrete%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce5%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce9%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23rubato%22%3ERubato%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce4%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23small-psquare%22%3ESmall-pSquare%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce5%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce9%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce8%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%3Cp%20class%3D%22ptab%22%3E%3Ca%20href%3D%22https%3A%2F%2Fstap-zoo.com%2Fall-stap-primitives%2F%23tip5-variants%22%3ETip5%20variants%3C%2Fa%3E%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%3Cp%20class%3D%22ptab%22%3ETip4%20and%20Tip4%E2%80%B2%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3Ctr%20class%3D%22ro%22%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce2%22%3E%C2%A0%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce3%22%3E%3Cp%20class%3D%22ptab%22%3ETip5%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce7%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3E.%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%20%20%20%20%3Ctd%20class%3D%22ce6%22%3E%3Cp%20class%3D%22ptab%22%3Ex%3C%2Fp%3E%3C%2Ftd%3E%0A%20%20%20%20%3C%2Ftr%3E%0A%20%20%20%20%3C%2Ftable%3E%0A%3C%2Fbody%3E%0A%3C%2Fhtml%3E[\/us_html][us_separator size=&#8221;huge&#8221;][us_image image=&#8221;1749&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22_header_middle_bg%22%7D%7D&#8221;][us_separator size=&#8221;large&#8221;][us_image image=&#8221;1748&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22_header_middle_bg%22%7D%7D&#8221;][us_separator][\/vc_column][\/vc_row][vc_row height=&#8221;small&#8221; us_bg_overlay_color=&#8221;_header_middle_text&#8221;][vc_column][vc_tta_accordion toggle=&#8221;1&#8243; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22background-color%22%3A%22%23f5f5f5%22%7D%7D&#8221;][vc_tta_section title=&#8221;Anemoi&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;anemoi&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers:\u00a0<\/strong>Cl\u00e9mence Bouvier, Pierre Briaud, Pyrros Chaidos, L\u00e9o Perrin, Robin Salen, Vesselin Velichkov, Danny Willems.<\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2022\/840\">New Design Techniques for Efficient Arithmetization-Oriented Hash Functions: Anemoi Permutations and Jive Compression Mode<\/a>, CRYPTO 2023.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Anemoi is a family of ZK-friendly permutations, that can be used to construct efficient hash functions and compression functions. Anemoi relies on two new components: a new S-box called Flystel, exploiting a previously unknown relationship with CCZ-equivalence, and a new mode of operation called Jive.<\/p>\n<p>The Flystel is a pair of functions (the open and closed Flystel) relying on two quadratic functions Q\u03b3, Q\u03b4 and a permutation E. While the open Flystel is a high degree permutation of (F_q)^2 the closed Flystel is a low degree function of (F_q)^2. The two variants are CCZ-equivalent, meaning that it is possible to encode the verification of the evaluation of the open Flystel H using the polynomial representation of the closed Flystel V.[\/vc_column_text][us_image image=&#8221;1487&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_separator size=&#8221;small&#8221;][vc_column_text]Jive is a dedicated mode for compression functions in a Merkle tree. Given a permutation P of (F_q^m)^b, we can construct a b-to-1 compression function.[\/vc_column_text][us_image image=&#8221;1485&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; size=&#8221;medium&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]The internal state of Anemoi is represented as a matrix with l columns and 2 rows. A round function is then a permutation of (F_q)^{2l}, where q is either a prime number or a power of 2. The function applied at each round has a classical Substitution-Permutation Network (SPN) structure: first the constant addition, then the linear layer, and finally the S-box layer (i.e. the Flystel).[\/vc_column_text][us_image image=&#8221;1481&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_separator size=&#8221;small&#8221;][vc_column_text]The number of rounds is determined by the complexity of algebraic attacks.[\/vc_column_text][us_image image=&#8221;1483&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]The FreeLunch attack and 6 worlds of GB are two recent algebraic cryptanalysis on Anemoi. Both papers slightly reduce the security margin of Anemoi for the instance with l=1.<\/p>\n<ul>\n<li><strong>Authors:<\/strong> <span class=\"authorName\">Augustin Bariant<\/span><span class=\"affiliation\">, A<\/span><span class=\"authorName\">ur\u00e9lien Boeuf<\/span><span class=\"affiliation\">, A<\/span><span class=\"authorName\">xel Lemoine<\/span><span class=\"affiliation\">, <\/span><span class=\"authorName\">Irati Manterola Ayala<\/span><span class=\"affiliation\">, <\/span><span class=\"authorName\">Morten \u00d8ygarden<\/span><span class=\"affiliation\">, <\/span><span class=\"authorName\">L\u00e9o Perrin<\/span><span class=\"affiliation\">, H<\/span><span class=\"authorName\">\u00e5vard Raddum<\/span><br \/>\n<strong>Title: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2024\/347\">The Algebraic Freelunch: Efficient Gr\u00f6bner Basis Attacks Against Arithmetization-Oriented Primitives<\/a><span class=\"authorName\">, CRYPTO 2024<\/span><\/li>\n<li><strong>Authors:<\/strong> <span class=\"authorName\">Katharina Koschatko<\/span><span class=\"affiliation\">, <\/span><span class=\"authorName\">Reinhard L\u00fcftenegger<\/span><span class=\"affiliation\">, <\/span><span class=\"authorName\">Christian Rechberger<\/span><br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2024\/250\">Exploring the Six Worlds of Gr\u00f6bner Basis Cryptanalysis: Application to Anemoi<\/a>, 2024<\/li>\n<\/ul>\n<p>[\/vc_column_text][us_separator size=&#8221;small&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1707&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1708&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]The authors propose comparison with various instances of Rescue\u2013Prime, Poseidon, Griffin with respect to SNARK metrics: R1CS and Plonk, and STARK: AIR.[\/vc_column_text][us_image image=&#8221;1484&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-38548-3_17\">Springer<\/a><\/li>\n<li><a href=\"https:\/\/eprint.iacr.org\/2022\/840\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/anemoi-hash.github.io\/\">website<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/anemoi-hash\/anemoi-hash\">github repository<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=P4cPvi2s-qM&amp;list=PLeeS-3Ml-rpq6m4DK_dARhLhIW31SE2pn&amp;index=23\">presentation<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Hash Functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fhash-functions%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero-Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Arion&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;arion&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong>Arnab Roy, Matthias Johann Steiner, Stefano Trevisani.<\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/arxiv.org\/abs\/2303.04639\">Arion: Arithmetization-Oriented Permutation and Hashing from Generalized Triangular Dynamical Systems<\/a>, 2023<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]The block cipher Arion and the hash function ArionHash are constructed over F_p for odd and particularly large primes, targeting low multiplicative complexity in a prover circuit. Both are based on the Generalized Triangular Dynamical System (GTDS), which uses a polynomial dynamical system to construct cryptographic permutations over finite fields.<\/p>\n<p>ArionHash aims for efficient implementation in zkSNARK protocols and Zero-Knowledge proof systems, targeting BLS12 and BN254 curves. Its core primitive, the permutation Arion-\u03c0, uses in each round a polynomial of very high degree in one branch and low degree polynomials in the remaining branches to decrease the number of necessary rounds to achieve the\u00a0desired security.[\/vc_column_text][us_image image=&#8221;1510&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Arion and ArionHash also have aggressive versions, \u03b1-Arion and \u03b1-ArionHash, which avoid a proposed probabilistic Gr\u00f6bner basis attack.[\/vc_column_text][us_image image=&#8221;1511&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Authors:<\/strong> <span class=\"authorName\">Augustin Bariant<\/span><span class=\"affiliation\">, A<\/span><span class=\"authorName\">ur\u00e9lien Boeuf<\/span><span class=\"affiliation\">, A<\/span><span class=\"authorName\">xel Lemoine<\/span><span class=\"affiliation\">, <\/span><span class=\"authorName\">Irati Manterola Ayala<\/span><span class=\"affiliation\">, <\/span><span class=\"authorName\">Morten \u00d8ygarden<\/span><span class=\"affiliation\">, <\/span><span class=\"authorName\">L\u00e9o Perrin<\/span><span class=\"affiliation\">, H<\/span><span class=\"authorName\">\u00e5vard Raddum<\/span><br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2024\/347\">The Algebraic Freelunch: Efficient Gr\u00f6bner Basis Attacks Against Arithmetization-Oriented Primitives<\/a>, CRYPTO 2024<br \/>\nRecovery of a CICO solution for 4 rounds of Arion (resp. of \u03b1-Arion) with attack complexities as low as 2^98 (resp. 2^83) for its weakest variants<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<span>The designers have implemented ArionHash and \u03b1-ArionHash, and compared their Plonk and R1CS constraints to Poseidon, Griffin and Anemoi.<\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;small&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1512&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1513&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/arxiv.org\/abs\/2303.04639\">arXiv<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/sca-research\/Arion\">github repository<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Block Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fblock-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Hash Functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fhash-functions%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero-Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Chaghri&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;chaghri&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"authorName\">Tomer Ashur<\/span><span class=\"affiliation\">, <\/span><span class=\"authorName\">Mohammad Mahzoun<\/span><span class=\"affiliation\">, <\/span><span class=\"authorName\">Dilara Toprakhisar.<\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2022\/592\">Chaghri &#8212; an FHE-friendly Block Cipher<\/a>, ACM CCS 2022.<strong><br \/>\n<\/strong><\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Chaghri takes <a href=\"#vision\">Vision<\/a> as a starting point but while the two steps of a Marvellous round employ different S-boxes, every round of Chaghri is composed of two similar steps. Chaghri is a 8-round SPN construction defined over F_{2^63}. The non-linear layer is composed of G, a power function using the Gold exponent 2^32 + 1, and B, an affine polynomial. In a first version of the design, the authors used B = c1 + c2 x^8, and following the work by <a href=\"https:\/\/eprint.iacr.org\/2022\/991\">Liu et al.<\/a> they moved to another affine layer B = c1 + c2 x + c3 x^4 + c^4 x^256.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1500&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Authors:<\/strong> <span class=\"authorName\">Fukang Liu, <\/span><span class=\"authorName\">Ravi Anand, <\/span><span class=\"authorName\">Libo Wang, <\/span><span class=\"authorName\">Willi Meier, <\/span><span class=\"authorName\">Takanori Isobe<\/span><br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2022\/991\">Coefficient Grouping: Breaking Chaghri and More<\/a>, EUROCRYPT 2023<br \/>\nLiu et al. have shown that the first choice of affine layer implies a linear increase of the algebraic degree leading to a practical higher-order differential attack.<\/li>\n<li><strong>Authors:<\/strong> <span class=\"authorName\">Fukang Liu<\/span><span class=\"affiliation\">, <\/span><span class=\"authorName\">Lorenzo Grassi<\/span><span class=\"affiliation\">, <\/span><span class=\"authorName\">Cl\u00e9mence Bouvier<\/span><span class=\"affiliation\">, <\/span><span class=\"authorName\">Willi Meier<\/span><span class=\"affiliation\">, <\/span><span class=\"authorName\">Takanori Isobe<\/span><br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2023\/782\">Coefficient Grouping for Complex Affine Layers<\/a>, CRYPTO 2023<br \/>\nThis more recent analysis of complex affine layers shows that the new parameters are not part of good affine layers (that should lead to an exponential growth of the degree).<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]The authors have implemented Chaghri using HElib, a library implementing the BGV variant, and compared the results with AES.[\/vc_column_text][us_image image=&#8221;1591&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3559364\">ACM<\/a><\/li>\n<li><a href=\"https:\/\/eprint.iacr.org\/2022\/592\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/KULeuven-COSIC\/Chaghri\">github repository<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Block Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fblock-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Fully Homomorphic Encryption page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Ffhe%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Multi Party Computation page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fmpc%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Ciminion&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;ciminion&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"affiliation\"><span class=\"authorName\">Christoph Dobraunig, Lorenzo Grassi, Anna Guinet, Dani\u00ebl Kuijsters.<\/span><\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2021\/267\">Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields<\/a>, EUROCRYPT 2021.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Unlike other primitives Ciminion does not use a power map as S-box. The non-linearity instead comes from the use of Toffoli gates.[\/vc_column_text][us_image image=&#8221;1499&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_separator size=&#8221;small&#8221;][us_image image=&#8221;1514&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1498&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Authors:<\/strong> Augustin Bariant, Cl\u00e9mence Bouvier, <span class=\"name\">Ga\u00ebtan Leurent, L\u00e9o Perrin<\/span><br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/9850\">Algebraic Attacks against Some Arithmetization-Oriented Primitives<\/a>, ToSC 2022<br \/>\nThe authors propose an alternative way to set up a system of equations for algebraic attacks on Ciminion, this leads to much faster attacks than expected by the designers.<\/li>\n<li><strong>Author:<\/strong> Augustin Bariant<br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2023\/1283\">Algebraic Cryptanalysis of Full Ciminion<\/a>, SAC 2024<br \/>\nThe paper presents a new univariate modeling of Ciminion<\/li>\n<li><strong>Authors:<\/strong> Lulu Zhang, Meicheng Liu, Shuaishuai Li, Dongdai Lin<br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-26553-2_12\">Cryptanalysis of Ciminion<\/a>, INSCRYPT 2022<br \/>\nThe authors propose higher order differential cryptanalysis and integral cryptanalysis.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1515&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1516&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-77886-6_1\">Springer<\/a><\/li>\n<li><a href=\"https:\/\/eprint.iacr.org\/2021\/267\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/ongetekend\/ciminion\">github repository<\/a><\/li>\n<li><a href=\"https:\/\/youtu.be\/YeaRigKun4Y?list=PLeeS-3Ml-rprwuVrOTYyYWkXuJLSu4fbu\">presentation<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Stream Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fstream-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Multi Party Computation page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fmpc%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Dark Matter PRF&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;darkmatter&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"affiliation\"><span class=\"authorName\">Dan Boneh, Yuval Ishai, Alain Passel\u00e8gue, Amit Sahai, and David J. Wu<\/span><\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/ia.cr\/2018\/1218\">Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications<\/a>, TCC 2018<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]It is a low-depth, MPC friendly weak PRF which uses a combination of linear operations in two different fields, and can be implemented in depth-2 <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">ACC^0<\/span><\/span><\/span> circuit.The key space is <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">K_\u03bb = Z_p^{m\u00d7n}<\/span><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord\"><span class=\"msupsub\"><span class=\"vlist-t vlist-t2\"><span class=\"vlist-r\"><span class=\"vlist-s\">\u200b<\/span><\/span><span class=\"vlist-r\"><span class=\"vlist\"><span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span>, the domain <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">X_\u03bb = Z_p^n<\/span><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord\"><span class=\"msupsub\"><span class=\"vlist-t vlist-t2\"><span class=\"vlist-r\"><span class=\"vlist-s\">\u200b<\/span><\/span><span class=\"vlist-r\"><span class=\"vlist\"><span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span> and the range <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">Y_\u03bb = Z_q<\/span><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord\"><span class=\"msupsub\"><span class=\"vlist-t vlist-t2\"><span class=\"vlist-r\"><span class=\"vlist-s\">\u200b<\/span><\/span><span class=\"vlist-r\"><span class=\"vlist\"><span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span> where <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"strut\"><\/span><span class=\"mord mathnormal\">p<\/span><\/span><\/span><\/span><\/span> and <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">q<\/span> <\/span><\/span>are primes.<br \/>\nDefine a nonlinear mapping <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">map_{p,q} from {0,1,&#8230;p\u22121}^m to Z_q<br \/>\n<\/span><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"strut\"><\/span><span class=\"mord mathnormal\"><\/span><\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align: center;\"><span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord mathnormal\">ma<\/span><span class=\"mord\"><span class=\"mord mathnormal\">p_{<\/span><span class=\"msupsub\"><span class=\"vlist-t vlist-t2\"><span class=\"vlist-r\"><span class=\"vlist\"><span><span class=\"pstrut\"><\/span><span class=\"sizing reset-size6 size3 mtight\"><span class=\"mord mtight\"><span class=\"mord mathnormal mtight\">p<\/span><span class=\"mpunct mtight\">,<\/span><span class=\"mord mathnormal mtight\">q}<\/span><\/span><\/span><\/span><\/span><span class=\"vlist-s\">\u200b <\/span><\/span><span class=\"vlist-r\"><span class=\"vlist\"><span><\/span><\/span><\/span><\/span><\/span><\/span><span class=\"mspace\"><\/span><span class=\"mrel\"><\/span><span class=\"mspace\"><\/span><\/span><span class=\"base\"><span class=\"strut\"><\/span><span class=\"mopen\"><\/span><\/span><\/span><\/span><\/span><span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">(y) = \u2211_{i=1}^n y_i mod q<\/span><\/span><\/span><\/p>\n<p>Then the <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">mod\u2212p\/mod\u2212q<\/span> <\/span><\/span>weak PRF is defined as<\/p>\n<p style=\"text-align: center;\"><span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">F_A(x) = map(Ax)<\/span><\/span><\/span><\/p>\n<p>for an input <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">x in Z_p^n<\/span><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord\"><span class=\"msupsub\"><span class=\"vlist-t vlist-t2\"><span class=\"vlist-r\"><span class=\"vlist-s\">\u200b<\/span><\/span><span class=\"vlist-r\"><span class=\"vlist\"><span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span> and a key <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">A in Z_p^{m\u00d7n}<\/span><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord\"><span class=\"msupsub\"><span class=\"vlist-t vlist-t2\"><span class=\"vlist-r\"><span class=\"vlist-s\">\u200b<\/span><\/span><span class=\"vlist-r\"><span class=\"vlist\"><span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span>.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Here, <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">y = Ax<\/span><\/span><\/span> will be a vector in <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">Z_p^m<\/span><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord\"><span class=\"msupsub\"><span class=\"vlist-t vlist-t2\"><span class=\"vlist-r\"><span class=\"vlist-s\">\u200b<\/span><\/span><span class=\"vlist-r\"><span class=\"vlist\"><span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span> which is viewed as a vector in <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">{0,1,&#8230;p\u22121}^m<\/span><\/span><\/span> with integer entries; to which we apply the mapping <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">map_{p,q}<\/span><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord\"><span class=\"msupsub\"><span class=\"vlist-t vlist-t2\"><span class=\"vlist-r\"><span class=\"vlist-s\">\u200b<\/span><\/span><span class=\"vlist-r\"><span class=\"vlist\"><span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span> to get an output in <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">Z_q<\/span><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\">.<br \/>\n<span class=\"mord\"><span class=\"msupsub\"><span class=\"vlist-t vlist-t2\"><span class=\"vlist-r\"><span class=\"vlist\"><span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span> For efficiency, authors suggest using a circulant matrix as a key. Moreover, the linear mapping <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">map_{p,q}<\/span><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord\"><span class=\"msupsub\"><span class=\"vlist-t vlist-t2\"><span class=\"vlist-r\"><span class=\"vlist-s\">\u200b<\/span><\/span><span class=\"vlist-r\"><span class=\"vlist\"><span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span> can be replaced by multiplication by a public matrix <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">G in Z_q^{l\u00d7n}<\/span><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord\"><span class=\"msupsub\"><span class=\"vlist-t vlist-t2\"><span class=\"vlist-r\"><span class=\"vlist-s\">\u200b<\/span><\/span><span class=\"vlist-r\"><span class=\"vlist\"><span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span> to get a longer output. The main focus is on the case of <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">mod\u22122\/mod\u22123<\/span><\/span><\/span> weak PRF for which the authors provide a distributed evaluation protocol. The authors also propose an &#8216;alternative&#8217; binary weak PRF <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">F from Z_2^n \u00d7 Z_2^ n to Z_2^n<\/span><\/span><\/span> which can be described as<\/p>\n<p style=\"text-align: center;\"><span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">F(k,x) = (\u27e8k,x\u27e9 mod 2+\u27e8k,x\u27e9 mod 3) mod 2<\/span><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"strut\"><\/span><\/span><\/span><\/span><\/span><\/p>\n<p>where both key <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"strut\"><\/span><span class=\"mord mathnormal\">k<\/span><\/span><\/span><\/span><\/span> and input <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"strut\"><\/span><span class=\"mord mathnormal\">x<\/span><\/span><\/span><\/span><\/span> are binary vectors of length <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">n<\/span><\/span><\/span>.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Authors:<\/strong> Jung Hee Cheon, Wonhee Cho, Jeong Han Kim, Jiseung Kim<br \/>\n<strong>Title: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2020\/783\">Adventures in Crypto Dark Matter: Attacks and Fixes for Weak Pseudorandom Functions<\/a>, PKC 2021<br \/>\nAuthors propose an attack where the advantage of an alternative Mod-2\/Mod-3 weak PRF is 2^{\u22120.105n} with the size of input space n. Similarly, they provide a heuristic attack for circulant mod\u22122\/mod\u22123 weak PRF with an advantage 2^{\u22120.21n}. The attack is based on the conditional probability of certain input vectors given that the outputs are \u2018zero\u2019, which deviates from 1\/2. They suggest using a circulant key generated by two vectors to prevent this attack.<\/li>\n<li><strong>Authors:<\/strong> Thomas Johansson, Willi Meier, Vu Nguyen<br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/ieeexplore.ieee.org\/document\/10206853\">Differential cryptanalysis of Mod-2\/Mod-3 constructions of binary weak PRFs<\/a>, IEEE 2023<br \/>\nAuthors propose an improved attack for the alternative weak PRF candidate. Their attack outperforms the attack by Cheon et. al. by achieving complexity of <span class=\"post-body--code inline-tex\"><span class=\"katex\"><span class=\"katex-mathml\">O(2^{0.166n})<\/span><\/span><\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text][us_image image=&#8221;1702&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2018\/1218\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/dl.acm.org\/doi\/10.1007\/978-3-030-03810-6_25\">TCC<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Pseudorandom functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fprfs%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Multiparty Computation page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fmpc%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Elisabeth&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;elisabeth&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"affiliation\"><span class=\"authorName\">Orel Cosseron, Cl\u00e9ment Hoffmann, Pierrick M\u00e9aux, Fran\u00e7ois-Xavier Standaert.<br \/>\n<\/span><\/span><\/li>\n<li><strong>Articles:<\/strong>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2022\/180\">Towards Globally Optimized Hybrid Homomorphic Encryption &#8211; Featuring the Elisabeth Stream Cipher<\/a>, ASIACRYPT 2022.<\/li>\n<li><a href=\"https:\/\/eprint.iacr.org\/2023\/1895\">The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator Paradigm<\/a>, Indocrypt 2023<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Elisabeth is a family of stream ciphers designed for Torus Fully Homomorphic Encryption (TFHE) applications published at Asiacrypt 2022. Its structure is heavily inspired by <a href=\"https:\/\/stap-zoo.com\/all-stap-primitives#flip-variants\">FliP<\/a>: a subkey with a size much bigger than the security level is generated, and then stored. Then, to generate each block of keystream, a complex non-linear function is applied on a deterministically chosen subset of the subkey bits. Operating in this way means that the subkey is not updated, and thus that noise does not get an opportunity to grow. This is summarized in the first figure to the right.<\/p>\n<p>The filter function has a complex design: it essentially consists in several iterations of an SPN-like structure, whereby S-boxes are applied in parallel to the filter&#8217;s internal state, followed by partial-rank diffusion layer that uses only additions, and the mixing<br \/>\nof some key words (see Figure to the right). Several such functions are evaluated in parallel on different parts of the subkey, and then the sum of their outputs is returned as a keystream word.<\/p>\n<p>The cipher operates on Z\/16Z. As 16 is even, the S-boxes have to have a specific property, nega-cyclicity, meaning that S(x)=16-x for all x.<\/p>\n<p>Following the cryptanalysis by Gilbert et al, the designers published a follow-up paper describing potential strategies to fix the stream cipher. They in particular<br \/>\nproposed new variants: Elisabeth-b, Gabriel, and Margrethe.<br \/>\n&#8211; Elisabeth-b is built on the same principle but uses a filter with a larger internal state.<br \/>\n&#8211; Gabriel complexifies the design of the filter function by giving it another component intended to ensure a dense enough polynomial representation, thus blocking the attacks of Gilbert et al.<br \/>\n&#8211; Margrethe mixes arithmetic over Z\/16Z and F_2^18.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1701&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_image image=&#8221;1751&#8243; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Authors:<\/strong> <span class=\"name\">Henri Gilbert, Rachelle Heim Boissier, J\u00e9r\u00e9my Jean, Jean-Ren\u00e9 Reinhard<\/span><br \/>\n<strong>Title: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2023\/1436\">Cryptanalysis of Elisabeth-4<\/a>, ASIACRYPT 2023<br \/>\nThis paper proposes different variants of key recovery attacks on the full version of Elisabeth-4 cipher. The main flaw they identified is an improper estimation of the number of monomials present in the polynomial representation of the filter function, which allowed the attackers to present an efficient linearization of the primitive.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-22969-5_2\">Springer<\/a><\/li>\n<li><a href=\"https:\/\/eprint.iacr.org\/2022\/180\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/princess-elisabeth\/Elisabeth\">github repository<\/a><\/li>\n<li><a href=\"https:\/\/youtu.be\/PTlNFj4IHn8?list=PLeeS-3Ml-rpqZSqbKrJRKbsCGZt84gE9I\">presentation<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Stream Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fstream-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Fully Homomorphic Encryption page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Ffhe%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;FLIP variants&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;flip-variants&#8221;][us_text text=&#8221;FiLIP&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22font-size%22%3A%2232px%22%2C%22margin-bottom%22%3A%221cm%22%7D%7D&#8221; el_id=&#8221;filip&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong>Pierrick M\u00e9aux, Claude Carlet, Anthony Journault, and Fran\u00e7ois-Xavier Standaert.<\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2019\/483\">Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations<\/a>, 2019<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Inspired by the Filter Permutator (FP) paradigm proposed for <a href=\"https:\/\/eprint.iacr.org\/2016\/254\">FLIP<\/a>, the authors proposed a modified version, the Improved Filter Permutator (IFP) paradigm, considering two sizes of registers.<br \/>\nThe stream cipher family FiLIP is then an instantiation of the IFP paradigm where the PRNG is a variant of AES in counter mode, and the wire-cross permutations are generated by the Knuth shuffle.<\/p>\n<p>FiLIP_{DSM} and FiLIP_{XMAJ} are specific ciphers instantiated respectively by Direct Sums of Monomials (DSM) functions, which are generalization of FLIP functions, and XOR-MAJ functions.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1709&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]Authors proposed comparison with FLIP and other FHE-friendly primitives.[\/vc_column_text][us_separator size=&#8221;small&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1712&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_separator size=&#8221;small&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1713&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_separator size=&#8221;small&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1710&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1711&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2019\/483\">ePrint<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Stream Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fstream-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Fully Homomorphic Encryption page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Ffhe%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;large&#8221; show_line=&#8221;1&#8243;][us_text text=&#8221;FLIP&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22font-size%22%3A%2232px%22%2C%22margin-bottom%22%3A%221cm%22%7D%7D&#8221; el_id=&#8221;flip&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"affiliation\"><span class=\"authorName\">Pierrick M\u00e9aux, Anthony Journault, Fran\u00e7ois-Xavier Standaert, Claude Carlet<\/span><\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2016\/254\">Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts<\/a>, EUROCRYPT 2016<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]FLIP is a family of stream ciphers designed to address some of the limitations of previous schemes, by allowing constant and reducing noise. This is possible thanks to a novel construction resembling a filter generator with a constant register that is permuted before entering the filtering function, thereby limiting the circuit&#8217;s multiplicative depth.<\/p>\n<p>The original construction has been revised after <a href=\"https:\/\/eprint.iacr.org\/2016\/271\">Duval et al.<\/a> showed several vulnerabilities.[\/vc_column_text][us_image image=&#8221;1704&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1703&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Attack by:<\/strong> <span class=\"name\">S\u00e9bastien Duval, Virginie Lallemand, and Yann Rotella <\/span><br \/>\n<strong>Title: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2016\/271\">Cryptanalysis of the FLIP Family of Stream Ciphers<\/a>, CRYPTO 2016<br \/>\nThe authors present an attack on the original version of FLIP, exploiting the structure of the filter function and the constant internal state of the cipher.<\/li>\n<\/ul>\n<p>[\/vc_column_text][us_image image=&#8221;1705&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]The authors investigated the performances of different instances of FLIP for FHE schemes using HElib and compared them with Trivium, Kreyvium and LowMC.[\/vc_column_text][us_image image=&#8221;1706&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2016\/254\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-662-49890-3_13\">Springer<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=LLE8t5e0_98\">presentation<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Stream Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fstream-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Fully Homomorphic Encryption page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Ffhe%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;GMiMC&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;gmimc&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"affiliation\"><span class=\"authorName\">Martin R. Albrecht, Lorenzo Grassi, Leo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger.<\/span><\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2019\/397\">Feistel Structures for MPC, and More<\/a>, <span class=\"app-article-masthead__conference-info\">ESORICS 2019.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;small&#8221;][vc_column_text]Generalized Feistel MiMC (GMiMC) refers to a family of block ciphers and hash functions based on the MiMC permutation. It can be seen as a further generalization of the (balanced) <a href=\"https:\/\/stap-zoo.com\/all-stap-primitives\/#mimc\">Feistel-MiMC<\/a>.<\/p>\n<p>The GMiMC family is comprised of four variants:<br \/>\n&#8211; an unbalanced Feistel network (UFN) with contracting round functions (CRF) (Figure 1);<br \/>\n&#8211; a UFN with expanding round functions (ERF) (Figure 2);<br \/>\n&#8211; a Nyberg generalized Feistel network (Figure 3);<br \/>\n&#8211; and a multi-rotating Feistel network (Figure 4).<\/p>\n<p>All of the above Feistel networks can be used to create block ciphers. Hash function variants are, in turn, constructed by setting the keys to 0 and applying the resulting permutation in a sponge framework.<\/p>\n<p>In the initial security analysis, the authors of GMiMC consider two settings:<br \/>\n&#8211; Over a finite field GF(p), where p is a prime of at least 128 bits.<br \/>\n&#8211; Over a finite field GF(2^n), but the attacker is only restricted to a small number of plaintext-ciphertext pairs (this is intended for use in post-quantum signature schemes).<\/p>\n<p>The block cipher variants can be further divided into two cases. For t the number of branches, and n the number of bits of the finite field these cases are<br \/>\ni) the &#8220;univariate case&#8221;, where the key size is n bits;<br \/>\nii) the &#8220;multivariate case&#8221; where the key size is t*n.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1722&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_image image=&#8221;1723&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_image image=&#8221;1724&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_image image=&#8221;1725&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]The GMiMC family has been the target of several cryptanalysis papers. Bonnetain showed a weakness among the univariate cases of GMiMC, and Beyne-Liu have described attacks in some cases for the CRF variant. The remaining analysis has largely focused on attacks in round-reduced settings, as well as distinguishers (both reduced and full-round).<\/p>\n<ul>\n<li><strong>Authors:<\/strong> Xavier Bonnetain<br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2019\/951\">Collisions on Feistel-MiMC and univariate GMiMC<\/a>, 2019<br \/>\nThis paper describes a collision attack that applies to most variants of block cipher GMiMC in the univariate case.<\/li>\n<li><strong>Authors: <\/strong>Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Ga\u00ebtan Leurent, Mar\u00eda Naya-Plasencia, L\u00e9o Perrin, Yu Sasaki, Yosuke Todo, and Friedrich Wiemer.<br \/>\n<strong>Title: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2020\/188\">Out of Oddity &#8211; New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems<\/a>, CRYPTO 2020.<strong><br \/>\n<\/strong>This paper describes zero-sum distinguishers of low complexity of full-round variants of GMiMC permutations. Practical collision attacks on round-reduced variants are also presented.<strong><br \/>\n<\/strong><span class=\"authorName\"><\/span><\/li>\n<li><strong>Authors: <\/strong>Arnab Roy, Elena Andreeva and Jan Ferdinand Sauer.<br \/>\n<strong>Title: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2021\/367\">Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions<\/a>, SAC 2020.<br \/>\nThe article explores several aspects of algebraic attacks on the UFN variants of GMiMC with expanding and contracting round functions. In particular, techniques for low-memory interpolation on GMiMC are presented.<br \/>\n<span class=\"authorName\"><\/span><\/li>\n<li><strong>Authors: <\/strong>Tim Beyne and Yunwen Liu.<br \/>\n<strong>Title: <\/strong><a href=\"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/9717\">Truncated Differential Attacks on Contracting Feistel Ciphers<\/a>, ToSC 2022.<br \/>\n<span class=\"authorName\"><\/span>Full-round distinguishers and key-recovery attacks are presented in this work for some cases of the GMiMC CRF variant.<\/li>\n<li><strong>Authors:<\/strong> <span class=\"authorName\">Jiamin Cui, Kai Hu, Meiqin Wang and Puwen Wei.<\/span><br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2022\/1210\">On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC<\/a>, ASIACRYPT 2022.<br \/>\nThis paper improves the distinguishers for GMiMC with ERF.<\/li>\n<li><strong>Authors: <\/strong>Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei and Zeyu Xu.<br \/>\n<strong>Title: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2023\/748\">Towards the Links of Cryptanalytic Methods on MPC\/FHE\/ZK-Friendly Symmetric-Key Primitives<\/a>, ToSC 2023.<br \/>\nThis paper further improves the distinguishers on the different GMiMC variants.<br \/>\n<span class=\"authorName\"><\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][us_image image=&#8221;1561&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_image image=&#8221;1560&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_image image=&#8221;1559&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2019\/397\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-29962-0_8\">Springer<\/a><\/li>\n<li><a href=\"https:\/\/rdragos.github.io\/assets\/slides\/gmimc-19.pdf\">presentation slides<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Block Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fblock-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Hash functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fhash-functions%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Multi Party Computation page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fmpc%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Goldreich&#8217;s PRG&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;goldreich&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong>Oded Goldreich.<\/li>\n<li><strong>Article:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2000\/063\">Candidate One-Way Functions Based on Expander Graphs<\/a>, Studies in Complexities and Cryptography 2011<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner][vc_column_text]This PRF expands a short input using a secret key into a larger output which could be thought of as a keystream, or if it is truncated as a PRF. It works using a simple Boolean function which is applied on an input-dependent selection of key bits. In a way, it does the opposite of <a href=\"https:\/\/stap-zoo.com\/all-stap-primitives#flip-variants\">FLIP.<\/a>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2000\/063\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-22670-0_10\">Springer<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Pseudorandom functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fprfs%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Multiparty Computation page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fmpc%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Grendel&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;grendel&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designer: <\/strong>Alan Szepieniec.<\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2021\/984\">On the Use of the Legendre Symbol in Symmetric Cipher Design<\/a>, 2021<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Grendel is a cipher designed for zero-knowledge and efficiently-verifiable proof systems. It utilizes Legendre symbols as component gates, which correspond to high-degree maps but can be evaluated much faster, enabling Grendel to offer the same security as high-degree maps without the associated slow evaluation time.<\/p>\n<p>More specifically, Grendel is an SPN construction over F_p^m where the S-box uses the Legendre symbol; the non-linear layer is a low-degree power-map x -&gt; x^d, with a possible sign flip given by the Legendre symbol. Grendel then employs this enhanced S-box in conjunction with the SHARK strategy.<\/p>\n<p>Grendel defines a permutation that serves as a sponge function, which is used internally by the Grendel hash function.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1654&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; size=&#8221;us_600_600&#8243; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Authors:<\/strong> Lorenzo Grassi, Dmitry Khovratovich, Sondre R\u00f8njom, Markus Schofnegger<br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2021\/1533\">The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over (F_p)^n<\/a>, ToSC 2022<br \/>\nPreimage attacks on a sponge hash function instantiated with the full Grendel permutation with practical verification<\/li>\n<li><strong>Authors:<\/strong> Jianqiang Ni, Jianhui Zhang, Gaoli Wang, Rui Li, Yanzhao Shen<br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/www.mdpi.com\/2073-8994\/15\/8\/1563\">Algebraic Attacks against Grendel: An Arithmetization-Oriented Primitive with the Legendre Symbol<\/a><span>, Symmetry 2023<br \/>\nPreimage attack on the sponge hash function instantiated with the complete rounds of the <\/span><span class=\"html-italic\">Grendel<\/span><span>\u00a0permutation, employing algebraic methods<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2021\/984\">ePrint<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Block Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fblock-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Hash Functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fhash-functions%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Griffin&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;griffin&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong>Lorenzo Grassi, Yonglin Hao, Christian Rechberger, Markus Schofnegger, Roman Walch, Qingju Wang.<\/li>\n<li><strong>Article:\u00a0<\/strong><a href=\"https:\/\/eprint.iacr.org\/2022\/403\">Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications<\/a>, CRYPTO 2023.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Griffin is a family of sponge hash and compression functions designed for Zero-Knowledge applications, using the internal permutation Griffin-\u03c0, which is defined over the finite field F_t where t = 3 or t is a multiple of four.<\/p>\n<p>Griffin is claimed to offer efficient verifiability, high degrees of security in both forward and backward directions, minimal multiplicative complexity, and robust security against algebraic attacks\u00a0on top of\u00a0simple arguments against statistical attacks.[\/vc_column_text][us_image image=&#8221;1660&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Each round function of Griffin-\u03c0 consists of a nonlinear layer, the addition of a round constant, and a linear layer defined by multiplication by an MDS matrix ensuring full diffusion. The nonlinear layer of Griffin-\u03c0 consists of two nonlinear sublayers defined by three different nonlinear functions. Two of these functions are invertible power maps, x \u21a6x^d and x \u21a6x^(1\/d). The third function is based on the proposed Horst strategy, which uses the map (x,y) \u21a6(x, y\u22c5G(x)) for a quadratic function G such that G(z)\u22600 for each z.[\/vc_column_text][us_image image=&#8221;1509&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_image image=&#8221;1659&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Authors:<\/strong> <span class=\"authorName\">Augustin Bariant<\/span><span class=\"affiliation\">, A<\/span><span class=\"authorName\">ur\u00e9lien Boeuf<\/span><span class=\"affiliation\">, A<\/span><span class=\"authorName\">xel Lemoine<\/span><span class=\"affiliation\">, <\/span><span class=\"authorName\">Irati Manterola Ayala<\/span><span class=\"affiliation\">, <\/span><span class=\"authorName\">Morten \u00d8ygarden<\/span><span class=\"affiliation\">, <\/span><span class=\"authorName\">L\u00e9o Perrin<\/span><span class=\"affiliation\">, H<\/span><span class=\"authorName\">\u00e5vard Raddum<\/span><br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2024\/347\">The Algebraic Freelunch: Efficient Gr\u00f6bner Basis Attacks Against Arithmetization-Oriented Primitives<\/a>, CRYPTO 2024<br \/>\nRecovery of a CICO solution for 7 out of 10 rounds of Griffin in less than four hours with attack complexities as low as 2^64 for its weakest variants<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;small&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1517&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_separator size=&#8221;small&#8221;][us_image image=&#8221;1518&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1519&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/extgit.iaik.tugraz.at\/krypto\/zkfriendlyhashzoo\/-\/tree\/master\">github repository<\/a><\/li>\n<li><a href=\"https:\/\/youtu.be\/gm1F-a3xM8Q?list=PLeeS-3Ml-rpq6m4DK_dARhLhIW31SE2pn\">presentation<\/a><\/li>\n<li><a href=\"https:\/\/eprint.iacr.org\/2022\/403\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-38548-3_19\">springer<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Block Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fblock-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Hash Functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fhash-functions%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Hera&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;hera&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"affiliation\"><span class=\"authorName\">Jihoon Cho, Jincheol Ha, Seongkwang Kim, Byeonghak Lee, Joohee Lee, Jooyoung Lee, Dukjae Moon, Hyojin Yoon.<\/span><\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2020\/1335\">Transciphering Framework for Approximate Homomorphic Encryption<\/a>, ASIACRYPT 2021.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Hera is a cipher featuring a simple randomized key schedule and sparse linear layers in order to be efficiently evaluated with batching technique.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1542&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2020\/1335\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-92078-4_22\">Springer<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Stream Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fstream-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Fully Homomorphic Encryption page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Ffhe%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Hydra&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;hydra&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong>Lorenzo Grassi, Morten \u00d8ygarden, Markus Schofnegger, and Roman Walch<\/li>\n<li><strong>Article:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2022\/342\">From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications<\/a>, EUROCRYPT 2023<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]The PRF Hydra is a specific instantiation of the Megafono construction, which builds on the Hades strategy and extended versions of the Lai\u2013Massey scheme.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1733&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][us_image image=&#8221;1734&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2022\/342\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-30634-1_9\">Springer<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Pseudorandom functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fprfs%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Multiparty Computation page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fmpc%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Kreyvium&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;kreyvium&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"affiliation\"><span class=\"authorName\">Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancr\u00e8de Lepoint, Mar\u00eda Naya-Plasencia, Pascal Paillier, Renaud Sirdey.<\/span><\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2015\/113\">Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression<\/a>, Journal of Cryptology 2018<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Kreyvium is designed for efficient compression of homomorphic ciphertexts and is composed of five registers. The main difference from Trivium lies in the 128-bit top and bottom registers, while the three middle registers, with lengths of 93, 84, and 111 bits, are identical to those in Trivium. Kreyvium is designed to provide 128-bit security and supports a 128-bit key and a 128-bit IV. The initial loading process differs from Trivium in that the IV and the key are loaded into the top and bottom registers, respectively. Apart from this, the initialization process is similar to Trivium, involving 1152 rounds. During each step, both the key and IV are involved linearly in the state update, and the key also contributes linearly to the keystream generation.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1543&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2015\/113\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s00145-017-9273-9\">Springer<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Stream Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fstream-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Fully Homomorphic Encryption page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Ffhe%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Legendre PRF&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;legendre-prf&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong>Lorenzo Grassi, Christian Rechberger, Dragos Rotaru, Peter Scholl, Nigel P. Smart<\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/2976749.2978332\">MPC-Friendly Symmetric Key Primitives<\/a>, ACM CCS 2016<strong><br \/>\n<\/strong><\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner][vc_column_text]The authors proposed a PRF based on the Legendre symbol.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Authors: <\/strong>Ward Beullens, Tim Beyne, Aleksei Udovenko and Giuseppe Vitto<br \/>\n<strong>Title: <\/strong><a href=\"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/8567\">Cryptanalysis of the Legendre PRF and Generalizations<\/a>, ToSC 2020<br \/>\nThe paper improves previous attacks on the Legendre PRF. In particular the authors <span>broke <\/span><span>three concrete instances of the PRF proposed by the Ethereum foundation.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/2976749.2978332\">ACM CCS<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Pseudorandom functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fprfs%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Multiparty Computation page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fmpc%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;LowMC&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;lowmc&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong>Martin Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, Michael Zohner.<\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2016\/687\">Ciphers for MPC and FHE<\/a>, EUROCRYPT 2015.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]LowMC is a family of flexible block ciphers based on an SPN structure defined over F_2. It is designed to be used in the context of an MPC protocol, ZK or HE scheme.<\/p>\n<p>To reduce its multiplicative complexity, LowMC leaves part of the substitution layer as the identity mapping; reducing the number of Sboxes applied in parallel. It then introduces a high degree of diffusion by using pseudorandomly generated binary matrices in the linear layer in order to reach the claimed security.[\/vc_column_text][us_image image=&#8221;1141&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_image image=&#8221;1408&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]The authors propose a wide range of different instantiations corresponding to 80, 128, and 256-bit security.[\/vc_column_text][us_image image=&#8221;1406&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Authors:<\/strong> Fukang Liu, Santanu Sarkar, Gaoli Wang, Willi Meier, Takanori Isobe<br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2022\/019\">Algebraic Meet-in-the-Middle Attack on LowMC<\/a>, ASIACRYPT 2022<br \/>\nThis paper proposes an algebraic meet-in-the-middle attack on LowMC, reducing the memory and time complexities over previous attacks that retrieve the full key from a differential trail. As a consequence, some LowMC instances could be broken for the first time.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]The authors report on experiments when evaluating LowMC with MPC protocols and with FHE.[\/vc_column_text][vc_column_text]In the case of MPC, they provide GMW benchmarking results in the semi-honest setting for a single block and for multiple blocks in parallel to encrypt 12.8 Mbit of data. The security parameters are set to 80-bit for lightweight security and to 128-bit for long-term security. The experiments are run on two desktop PCs, each equipped with an Intel Haswell i7-4770K CPU with 3.5 GHz and 16GB of RAM, that are connected by Gigabit LAN.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1410&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1411&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; size=&#8221;us_600_600&#8243; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]For FHE, they implement LowMC using the holomorphic encryption library HELib.[\/vc_column_text][us_image image=&#8221;1403&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2016\/687\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-662-46800-5_17\">Springer<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Block Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fblock-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Fully Homomorphic Encryption page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Ffhe%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Multi Party Computation page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fmpc%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;MARVELlous designs&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;marvellous-1&#8243;][us_text text=&#8221;Friday&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22font-size%22%3A%2232px%22%2C%22margin-bottom%22%3A%221cm%22%7D%7D&#8221; el_id=&#8221;friday&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong>Tomer Ashur, Siemen Dhooghe.<\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2018\/1098\">MARVELlous: a STARK-Friendly Family of Cryptographic Primitives<\/a>, 2018<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Friday is a hash function based on the Merkle-Damg\u00e5rd construction and instantiated with Jarvis as its compression function. It is designed to be a STARK-friendly hash function.<\/p>\n<p>Together with Jarvis, it served as a basis for the Rescue and Vision families of ZK-friendly primitives.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1687&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; size=&#8221;us_600_600&#8243; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Authors: <\/strong>Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard L\u00fcftenegger, Christian Rechberger, and Markus Schofnegger<br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2019\/419\">Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC<\/a>, ASIACRYPT 2019<br \/>\nIt is shown that Friday is particularly vulnerable to Gr\u00f6bner basis attacks.<\/li>\n<\/ul>\n<p>[\/vc_column_text][us_image image=&#8221;1721&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2018\/1098\">ePrint<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Hash Functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fhash-functions%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero-Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;large&#8221; show_line=&#8221;1&#8243;][us_text text=&#8221;Jarvis&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22font-size%22%3A%2232px%22%2C%22margin-bottom%22%3A%221cm%22%7D%7D&#8221; el_id=&#8221;jarvis&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong>Tomer Ashur, Siemen Dhooghe.<\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2018\/1098\">MARVELlous: a STARK-Friendly Family of Cryptographic Primitives<\/a>, 2018<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Jarvis is a block cipher defined over the large finite field F_(2^n), over only one branch. Its purpose is to be very STARK-friendly. Its design is directly inspired from the AES. Specifically, it uses the x^(-1) Sbox, which translates directly to low-degree equations for the STARK proof system (x^2 S(x) = x).<\/p>\n<p>Another noteworthy idea is that its affine layer is defined as the composition of B^(-1) and C, where B and C are both low-degree polynomials. That way, C o B^(-1) has a large algebraic degree, but B^(-1) and C separately account for low-degree equations in the STARK model.<\/p>\n<p>Together with Friday, Jarvis served as a basis for the Rescue and Vision families of ZK-friendly primitives.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1506&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Authors: <\/strong>Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard L\u00fcftenegger, Christian Rechberger, and Markus Schofnegger<br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2019\/419\">Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC<\/a>, ASIACRYPT 2019<br \/>\nIt is shown that Jarvis is particularly vulnerable to Gr\u00f6bner basis attacks.<\/li>\n<\/ul>\n<p>[\/vc_column_text][us_image image=&#8221;1720&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Instances<\/strong><\/h4>\n<p>Four instances are defined in the paper, and their numbers of rounds are equal to those of the AES for the same key size (although in the case of Jarvis, it is also the message block size). The instances are:<\/p>\n<ul>\n<li>Jarvis-128, with 10 rounds.<\/li>\n<li>Jarvis-160, with 11 rounds.<\/li>\n<li>Jarvis-192, with 12 rounds.<\/li>\n<li>Jarvis-256, with 14 rounds<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2018\/1098\">ePrint<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Block Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fblock-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero-Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Marvellous designs and variants&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;marvellous-2&#8243;][vc_row_inner][vc_column_inner][vc_column_text]Marvellous designs originally refer to Rescue and Vision. The design strategy relies on an SPN construction defined over F_q^m , where q is either a prime number or a power of 2. The construction is decomposed by steps such that one round is given by two steps. Then each step is composed of the addition of a key and round constant, the multiplication by an MDS matrix, and one S-box that is different depending on the step: a first S-box is applied on even steps and a second one is applied on odd steps.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;large&#8221; show_line=&#8221;1&#8243;][us_text text=&#8221;Rescue&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22font-size%22%3A%2232px%22%2C%22margin-bottom%22%3A%221cm%22%7D%7D&#8221; el_id=&#8221;rescue&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"affiliation\"><span class=\"authorName\">Abdelrahaman Aly, Tomer Ashur, Eli Ben-Sasson, Siemen Dhooghe, Alan Szepieniec.<\/span><\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/8695\">Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols<\/a>, TOSC 2020.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Rescue is a ZK-friendly block cipher that has the particularity of using both a low degree S-box and its inverse. Indeed, each round of Rescue, consists of two steps: while the first one involves an S-box, the second one uses its inverse. The idea is that two consecutive steps together form a high-degree, algebraically complex operation in both ways &#8211; &#8220;forward&#8221; and &#8220;backward&#8221; &#8211; but can be modeled in a SNARK proof system such as R1CS with a few low-degree constraints.<\/p>\n<p>Together with Vision, it is a successor of Jarvis and Friday, and thus is a member of the &#8220;Marvellous family&#8221;.<\/p>\n<p>More up-to-date versions of Rescue exist: the one defined in Rescue-Prime, and Rescue-Prime Optimized.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1505&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Authors: <\/strong>Aur\u00e9lien Boeuf, Anne Canteaut, L\u00e9o Perrin<br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/11288\">Propagation of Subspaces in Primitives with Monomial Sboxes: Applications to Rescue and Variants of the AES<\/a>, ToSC 2023<br \/>\nThey show the existence of weak round constants although it is unclear how this affects the security of real instances.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>Code to implement Rescue and Vision is given in <a href=\"https:\/\/github.com\/KULeuven-COSIC\/Marvellous\">https:\/\/github.com\/KULeuven-COSIC\/Marvellous<\/a>.[\/vc_column_text][us_image image=&#8221;1525&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_image image=&#8221;1526&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_image image=&#8221;1527&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/8695\">ToSC<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/KULeuven-COSIC\/Marvellous\">github repository<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Block Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fblock-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero-Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;large&#8221; show_line=&#8221;1&#8243;][us_text text=&#8221;Rescue-Prime&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22font-size%22%3A%2232px%22%2C%22margin-bottom%22%3A%221cm%22%7D%7D&#8221; el_id=&#8221;rescue-prime&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"affiliation\"><span class=\"authorName\">Alan Szepieniec, Tomer Ashur, Siemen Dhooghe.<\/span><\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2020\/1143\">Rescue-Prime: a Standard Specification (SoK)<\/a>, 2020<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Rescue\u2013Prime is a family of ZK-friendly sponge hash functions based on the Rescue family of block ciphers. It uses a slightly different family of permutations &#8211; called Rescue-XLIX, pronounced Rescue-fourty-nine\u00a0 &#8211; from those defined in the original Marvellous paper. Specifically, the round constants are derived differently, the security margin is lowered, and the order of Sboxes is flipped.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1688&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; size=&#8221;us_600_600&#8243; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Feprint.iacr.org%2F2020%2F1143.pdf%23figure.1.1%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Authors: <\/strong>Augustin Bariant, Cl\u00e9mence Bouvier, Ga\u00ebtan Leurent, L\u00e9o Perrin<br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/9850\">Algebraic Attacks against Some Arithmetization-Oriented Primitives<\/a>, ToSC 2022<br \/>\nThe authors show that it is possible to bypass one round (two steps) when building a system to solve the CICO problem.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2020\/1143\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/www.esat.kuleuven.be\/cosic\/sites\/rescue\/\">website<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/KULeuven-COSIC\/Marvellous\">github repository<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Hash Functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fhash-functions%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero-Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;large&#8221; show_line=&#8221;1&#8243;][us_text text=&#8221;Rescue-Prime Optimized&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22font-size%22%3A%2232px%22%2C%22margin-bottom%22%3A%221cm%22%7D%7D&#8221; el_id=&#8221;rescue-prime-optimized&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"affiliation\"><span class=\"affiliation\"><span class=\"authorName\">Tomer Ashur, <\/span><\/span><\/span><span class=\"authorName\">Al Kindi, <\/span><span class=\"authorName\">Willi Meier<\/span><span class=\"affiliation\">, <\/span><span class=\"affiliation\"><span class=\"authorName\">Alan Szepieniec, Bobbin Threadbare.<\/span><\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2022\/1577\">Rescue-Prime Optimized<\/a>, 2022<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Rescue-Prime Optimized denotes two hash functions based on Rescue-Prime and optimized for native hashing in a STARK virtual machine such as Miden.<\/p>\n<p>These two instances (achieving respectively 128 and 160 bits of security) are specifically defined over the finite field F_p is the Goldilocks prime number 2^64 &#8211; 2^32 + 1, the same field as the virtual machine.<\/p>\n<p>Notable differences are that the order of layers is changed &#8211; now, the permutation starts with the affine layer &#8211; and that the number of rounds is further reduced: 7 rounds for both instances.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1689&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; size=&#8221;us_600_600&#8243; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Feprint.iacr.org%2F2022%2F1577.pdf%23figure.1%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>A reference implementation is given at <a href=\"https:\/\/github.com\/ASDiscreteMathematics\/rpo\/tree\/master\">https:\/\/github.com\/ASDiscreteMathematics\/rpo\/tree\/master<\/a>.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2022\/1577\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/ASDiscreteMathematics\/rpo\">github repository<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Hash Functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fhash-functions%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero-Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;large&#8221; show_line=&#8221;1&#8243;][us_text text=&#8221;Vision&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22font-size%22%3A%2232px%22%2C%22margin-bottom%22%3A%221cm%22%7D%7D&#8221; el_id=&#8221;vision&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"affiliation\"><span class=\"authorName\">Abdelrahaman Aly, Tomer Ashur, Eli Ben-Sasson, Siemen Dhooghe, Alan Szepieniec.<\/span><\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/8695\">Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols<\/a>, TOSC 2020.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Vision is a family of STARK-friendly block ciphers, defined over F_(2^n), much like its direct predecessor, Jarvis. Unlike Jarvis, however, it is is defined for more than one branch. Thus, the full state can be seen as an element in (F_(2^n))^m.<\/p>\n<p>Much like Jarvis, it uses both affine functions of low algebraic degree and affine functions whose inverse has a low algebraic degree &#8211; namely, B and B^(-1), where B has a low algebraic degree. Then, much like Rescue, the composition of two steps is algebraically complex, but can be modeled with a few low-degree equations in a STARK setting.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1504&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]Code to implement Vision is given in <a href=\"https:\/\/github.com\/KULeuven-COSIC\/Marvellous\">https:\/\/github.com\/KULeuven-COSIC\/Marvellous<\/a>. Two instances are proposed by the authors: Vision Mark 1 (n = 8, m = 16) and Vision Mark II (n = 128, m = 4).[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/8695\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/KULeuven-COSIC\/Marvellous\">github repository<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Block Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fblock-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero-Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;large&#8221; show_line=&#8221;1&#8243;][us_text text=&#8221;Vision Mark-32&#8243; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22font-size%22%3A%2232px%22%2C%22margin-bottom%22%3A%221cm%22%7D%7D&#8221; el_id=&#8221;vision-mark32&#8243;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"affiliation\"><span class=\"authorName\">Tomer Ashur, Mohammad Mahzoun, Jim Posen, Danilo \u0160ija\u010di\u0107<\/span><\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2024\/633\">Vision Mark-32: ZK-Friendly Hash Function Over Binary Tower Fields<\/a>, 2024<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Vision Mark-32 is a sponge hash function using an instance of the Vision family of block ciphers, specifically designed to be used in Binius, a hardware-optimized SNARK defined over binary fields. In particular, compared to Vision, the number of rounds is reduced (8 rounds, each one with 2 steps) and the authors define a specific, efficient MDS matrix.<\/p>\n<p>The underlying permutation used in Vision Mark-32 is defined over F_(2^32), with m=24 state elements and a capacity c=8.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1690&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Feprint.iacr.org%2F2024%2F633.pdf%23figure.1%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2024\/633\">ePrint<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Hash Functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fhash-functions%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero-Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;large&#8221; show_line=&#8221;1&#8243;][us_text text=&#8221;XHash8 and XHash12&#8243; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22font-size%22%3A%2232px%22%2C%22margin-bottom%22%3A%221cm%22%7D%7D&#8221; el_id=&#8221;xhash&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"affiliation\"><span class=\"authorName\">Tomer Ashur, Amit Singh Bhati, Al Kindi, Mohammad Mahzoun, L\u00e9o Perrin<br \/>\n<\/span><\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2023\/1045\">XHash: Efficient STARK-friendly Hash Functions<\/a>, 2023<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text]XHash8 and XHash12 are STARK-friendly sponge hash functions, and a further-improved iteration of Rescue-Prime Optimized. The underlying permutations are defined over F_p where p is the Goldilocks prime number p = 2^64 &#8211; 2^32 + 1, with m=12 state elements.<\/p>\n<p>On top of the x^7 and x^(1\/7) Sboxes, XHash8 and XHash12 also apply Sboxes on full words, as shown in the figures: the X^7 map in the extension field F_(p^3). Furthermore, XHash8 is the more &#8220;aggressive&#8221; version, with sparser x^(1\/7) rounds. Both permutations consist of 7 rounds of 4 steps each.<\/p>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1550&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1551&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Author: <\/strong>L\u00e9o Perrin<br \/>\n<strong>Title: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2024\/605\">Security Analysis of XHASH8\/12<\/a>, 2024<br \/>\nThe author proposes a generalization of the FreeLunch approach and argue that both XHash8 and XHash12 are safe against such attacks under some reasonable conjecture.<\/li>\n<li><strong>Authors: <\/strong><span class=\"authorName\">Vincent Rijmen<\/span><br \/>\n<strong>Title: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2024\/656\">Cryptanalytic Audit of the XHash Sponge Function and its Components<\/a>, 2024<br \/>\nThe author revisits the security analysis of the designers, elaborates on some details, and extends the analysis in various directions. The extended analysis mostly confirms the designers\u2019 statements and does not lead to any new attacks.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2023\/1045\">ePrint<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Hash Functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fhash-functions%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero-Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;MiMC&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;mimc&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong>Martin Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen.<\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2016\/492\">MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity<\/a>, ASIACRYPT 2016<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]MiMC (Minimal Multiplicative Complexity) refers to a family of ciphers and hash functions over large finite fields. Its simple &#8211; yet elegant &#8211; design has served as the inspiration of several other designs such as <a href=\"https:\/\/stap-zoo.com\/all-stap-primitives\/#gmimc\">GMiMC<\/a> and the <a href=\"https:\/\/stap-zoo.com\/all-stap-primitives\/#poseidon-variants\">Poseidon<\/a>-family.<\/p>\n<p>We give the following descriptions for a finite field GF(2^n). Note that GF(p) for an odd prime p is also allowed, and is similarly defined. Let d and n be integers such that the power function X &#8211;&gt; X^d is a permutation over GF(2^n) (d = 3 is typically used). Let furthermore K denote a secret key and C a round constant, both elements in GF(2^n). Then the i-th round function F_{K,i}: GF(2^n) &#8211;&gt; GF(2^n) at the core of MiMC is given by F_{K,i}(X) = (X + K + C_i)^d. The encryption function MiMC-n\/n is realized by iterating this round function r times, as shown below. The number of rounds are chosen as r = Ceiling(n\/log_2(d)), to avoid attacks exploiting a low algebraic degree.[\/vc_column_text][us_image image=&#8221;1508&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]A second encryption variant, Feistel-MiMC or MiMC-2n\/n, uses the above function as part of a Feistel network, and the number of rounds are suggested to be r = 2*Ceiling(n\/log_2(d)).<\/p>\n<p>Either of the encryption variants (i.e., Feistel or non-Feistel) can be turned into a permutation by setting the secret key to 0. This permutation is then used in the sponge-framework to construct variants of the hash functions MiMChash.[\/vc_column_text][us_image image=&#8221;1715&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]The MiMC family has been the target of significant cryptanalytic efforts since its inception. A successful attack against the Feistel-MiMC cipher was discovered by Bonnetain, who exploited a weakness in the application of a weak key-schedule used in the Feistel framework. This attack does not extend to the MiMC-n\/n cipher, nor does it seem to affect the hash functions instanciated by Feistel-MiMC.<\/p>\n<p>Beyond that, the initial security analysis concluded that a relatively large number of rounds was needed to provide security against attacks exploiting a low algebraic degree, such as interpolation and higher-order differential attacks. Many of the ensuing works of cryptanalysis have further explored the algebraic behaviour of MiMC-variants, particularly the MiMC-n\/n cipher over binary fields. While this has led to further refinement of algebraic attacks against MiMC &#8211; even some successful &#8220;academic attacks&#8221; &#8211; their data complexities remain too large to be considered a realistic threat. We provide a non-exhaustive list of analytical works in the following.<\/p>\n<ul>\n<li><strong>Author:<\/strong> Xavier Bonnetain<br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2019\/951\">Collisions on Feistel-MiMC and univariate GMiMC<\/a>, 2019<br \/>\nThis note shows a collision property in Feistel-MiMC that reduces key-recovery to a collision attack that can be performed in 2^{n\/2} operations.<\/li>\n<li><strong>Authors:<\/strong> <span class=\"authorName\">Chaoyun Li and Bart Preneel<\/span><br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2019\/812\">Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree<\/a>, SAC 2019<br \/>\nThe authors of this work develop interpolation attacks on MiMC-n\/n with low memory requirements. While this does not break the full round parameters recommended for MiMC, it disproves an interesting claim on whether the number of rounds can be reduced under realistic assumptions on available memory to an attacker.<\/li>\n<li><strong>Authors:<\/strong> <span class=\"authorName\">Maria Eichlseder, Lorenzo Grassi, Reinhard L\u00fcftenegger, Morten \u00d8ygarden, Christian Rechberger, Markus Schofnegger, and Qingju Wang<\/span><br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2020\/182\">An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC<\/a>, ASIACRYPT 2020<br \/>\nThe paper explores distinguishers based on higher-order differentials on MiMC-n\/n over binary fields. A key-recovery attack faster than brute-force is also presented, though the requirement of 2^{n-1}<br \/>\nchosen ciphertext decryptions are too large for the attack to be a threat in practice. None of the results affect MiMC over prime fields.<\/li>\n<li><strong>Authors:<\/strong> <span class=\"authorName\">Cl\u00e9mence Bouvier, Anne Canteaut and L\u00e9o Perrin.<\/span><br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2022\/366\">On the Algebraic Degree of Iterated Power Functions<\/a>, Designs, Codes and Cryptography 2022.<br \/>\nThis article provides an extensive study of the algebraic degree growth of MiMC-n\/n over binary fields. The authors derive both upper and lower bounds on this degree, providing further confidence in the security of MiMC against algebraic attacks. These results also improve upon the attacks of Eichlseder et al., particularly reducing the data complexity of the aforementioned key-recovery attack to 2^{n-4} in some cases.<\/li>\n<li><strong>Authors:<\/strong> <span class=\"authorName\">Jiamin Cui, Kai Hu, Meiqin Wang and Puwen Wei.<\/span><br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2022\/1210\">On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC<\/a>, ASIACRYPT 2022.<br \/>\nThis work continues the exploration of degree growth of different MiMC variants. The paper particularly expands our understanding of Feistel-MiMC, as well as MiMC-n\/n with more general exponent d, and provides improved zero-sum distinguishers for several cases in these directions.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-662-53887-6_7\">Springer<\/a><\/li>\n<li><a href=\"https:\/\/eprint.iacr.org\/2016\/492\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/youtu.be\/871blvRw1-M?list=PLeeS-3Ml-rppDjfK04FycLtO4eepufgwr\">presentation<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Block Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fblock-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Hash functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fhash-functions%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Multi Party Computation page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fmpc%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Monolith&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;monolith&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"affiliation\"><span class=\"authorName\">Lorenzo Grassi, Dmitry Khovratovich, Reinhard L\u00fcftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch.<\/span><\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2023\/1025\">Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations<\/a>, ToSC 2024<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Monolith is a family of permutations that can be used as sponge or compression functions and that are defined for prime fields Fp where p = 2^{64} &#8211; 2^{32} + 1 or p = 2^{31} &#8211; 1.[\/vc_column_text][us_image image=&#8221;1502&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_separator size=&#8221;small&#8221;][vc_column_text]The authors propose in particular Kintsugi, a design strategy to construct nonlinear layers of high algebraic degree that allow both a fast native implementations and an efficient circuit description for ZK applications.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]The names of the components of a Monolith round are inspired by those of <a href=\"#reinforcedconcrete\">Reinforced Concrete<\/a>: Bricks (Feistel Type-3 construction with square mappings), Concrete (multiplication by a circulant MDS matrix) and Bars (layer of look-up based on the Kintsugi design strategy).[\/vc_column_text][us_image image=&#8221;1501&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][us_separator size=&#8221;small&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]The authors compare the performance of Monolith with other primitives for plain and in circuit implementations.[\/vc_column_text][us_separator size=&#8221;small&#8221;][us_image image=&#8221;1592&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1503&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2023\/1025\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/extgit.iaik.tugraz.at\/krypto\/zkfriendlyhashzoo\/-\/tree\/master\">github repository<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Hash Functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fhash-functions%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero-Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Poseidon variants&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;poseidon-variants&#8221;][us_text text=&#8221;HadesMiMC&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22font-size%22%3A%2232px%22%2C%22margin-bottom%22%3A%221cm%22%7D%7D&#8221; el_id=&#8221;hades-mimc&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"affiliation\"><span class=\"authorName\">Lorenzo Grassi, Reinhard L\u00fcftenegger, Christian Rechberger, Dragos Rotaru, Markus Schofnegger.<\/span><\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2019\/1107\"><span dir=\"ltr\" role=\"presentation\">On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy<\/span><\/a>, EUROCRYPT 2020.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]The Hades design strategy refers to an SPN construction utilizing two different round functions. It starts and ends with full rounds, R_F, which applies S-boxes along every branch as usual. The middle part consists of partial rounds, R_P, which applies S-boxes to only a limited number of branches.[\/vc_column_text][us_image image=&#8221;1558&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][vc_column_text]HadesMiMC specifically refers to a family of keyed permutations which can be used to construct block ciphers and hash functions. It utilizes the <a href=\"https:\/\/stap-zoo.com\/all-stap-primitives\/#mimc\">MiMC<\/a> S-box along with the Hades design strategy. The motivation of this choice is that the partial rounds allows for decreasing the number of multiplications per encrypted bit, without compromising on the algebraic degree of the primitive.<\/p>\n<p>Variants of the HadesMiMC hash function, most notably Poseidon\/Poseidon2, have proved particularly popular due to its efficiency in ZK settings.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1556&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]HadesMiMC and its variants &#8211; particularly the Poseidon hash functions &#8211; have received significant cryptanalytic attention. Some weak instances that were pointed out by Beyne et al., and Keller-Rosemarin have been addressed in an updated version of the HadesMiMC article on ePrint.<\/p>\n<ul>\n<li><strong>Authors:\u00a0<\/strong>Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Ga\u00ebtan Leurent, Mar\u00eda Naya-Plasencia, L\u00e9o Perrin, Yu Sasaki, Yosuke Todo, and Friedrich Wiemer.<br \/>\n<strong>Title: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2020\/188\">Out of Oddity &#8211; New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems<\/a>, CRYPTO 2020.<br \/>\nThis paper describes zero-sum distinguishers of low complexity of full-round variants of the HadesMiMC permutations. Preimage attacks against some variants of Poseidon are also presented.<\/li>\n<li><strong>Authors: <\/strong>Nathan Keller and Asaf Rosemarin.<br \/>\n<strong>Title:\u00a0<\/strong><a href=\"https:\/\/eprint.iacr.org\/2020\/179\">Mind the Middle Layer: The HADES Design Strategy Revisited<\/a>, EUROCRYPT 2021.<br \/>\nThis work explores the linear layers used in HadesMiMC and points to severe weaknesses if these are not chosen properly.<\/li>\n<li><strong>Authors:\u00a0<\/strong>Carlos Cid, Lorenzo Grassi, Aldo Gunsing, Reinhard L\u00fcftenegger, Christian Rechberger and Markus Schofnegger.<br \/>\n<strong>Title:\u00a0<\/strong><a href=\"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/9530\">Influence of the Linear Layer on the Algebraic Degree in SP-Networks<\/a>, ToSC 2022<br \/>\nThis article derives improved bounds on the algebraic degree of HadesMiMC constructions, and explore the impact of the linear layer on this degree.<\/li>\n<li><strong>Authors:\u00a0<\/strong>Augustin Bariant, Cl\u00e9mence Bouvier, Ga\u00ebtan Leurent and L\u00e9o Perrin<br \/>\n<strong>Title:\u00a0<\/strong><a href=\"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/9850\">Algebraic Attacks against Some Arithmetization-Oriented Primitives<\/a>, ToSC 2022.<br \/>\nThis paper shows a method for bypassing two rounds in an algebraic attack on Poseidon. While this does not directly contradict the original security claim of HadesMiMC, it breaks some security claims used in the 2021-2022 ZK Hash Bounties offered by the Ethereum Foundation.<\/li>\n<li><strong>Authors: <\/strong>Tomer Ashur, Thomas Buschman and Mohammad Mahzoun<br \/>\n<strong>Title:\u00a0<\/strong><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-981-97-5028-3_12\">Algebraic Cryptanalysis of the HADES Design Strategy: Application to Poseidon and Poseidon2<\/a>, ACISP 2024.<br \/>\nThis paper explores Gr\u00f6bner basis attacks against hash function variants of HadesMiMC (Poseidon and Poseidon2). It challenges aspects of the security arguments of HadesMiMC against these algebraic attacks, particularly in extremely high security settings (&gt;= 384-bit security).<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][us_image image=&#8221;1557&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-45724-2_23\">Springer<\/a><\/li>\n<li><a href=\"https:\/\/eprint.iacr.org\/2019\/1107\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/youtu.be\/pMejVNn3rj0?list=PLeeS-3Ml-rpp-srdkwAWDA9hlvEyOZCcx\">presentation<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Block Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fblock-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Hash functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fhash-functions%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Multi Party Computation page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fmpc%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;large&#8221; show_line=&#8221;1&#8243;][us_text text=&#8221;Neptune&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22font-size%22%3A%2232px%22%2C%22margin-bottom%22%3A%221cm%22%7D%7D&#8221; el_id=&#8221;neptune&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong>Lorenzo Grassi, <span class=\"authorName\">Silvia Onofri<\/span><span class=\"affiliation\">, <span class=\"authorName\">Marco Pedicini, Luca Sozzi.<\/span><\/span><\/li>\n<li><strong>Article:\u00a0<\/strong><a href=\"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/9849\">Invertible Quadratic Non-Linear Layers for MPC-\/FHE-\/ZK-Friendly Schemes over Fp^n : Application to Poseidon<\/a>, TOSC 2022.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner][vc_column_text]<span>Neptune is<\/span><span> a variant of the sponge <\/span><span>hash function <\/span><span>Poseidon with a different<\/span><span> non-linear layer. The main difference relies on the fact that the power map x \u21a6x^d is replaced by a concatenation of independent S-Boxes defined over F_p^2 via the Lai-Massey construction. For internal rounds, the non-linear layer of the remains unchanged (the power map x \u21a6x^d) and the matrix that instantiates the linear layer is different from the one proposed for external rounds.<\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]The authors observe that the multiplicative complexity of Neptune is always smaller than the one of Poseidon.[\/vc_column_text][us_separator size=&#8221;small&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1727&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1726&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/9849\">ToSC<\/a><\/li>\n<li><a href=\"https:\/\/extgit.iaik.tugraz.at\/krypto\/zkfriendlyhashzoo\/-\/tree\/master\">github repository<\/a><\/li>\n<li><a href=\"https:\/\/youtu.be\/XIY44ibmhxM?list=PLeeS-3Ml-rpod9ZTUNxz-zc2vF-JdTjXr\">presentation<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Hash Functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fhash-functions%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero-Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;large&#8221; show_line=&#8221;1&#8243;][us_text text=&#8221;Poseidon&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22font-size%22%3A%2232px%22%2C%22margin-bottom%22%3A%221cm%22%7D%7D&#8221; el_id=&#8221;poseidon&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"authorName\">Lorenzo Grassi, <\/span><span class=\"authorName\">Dmitry Khovratovich, <\/span><span class=\"authorName\">Christian Rechberger, <\/span><span class=\"authorName\">Arnab Roy, <\/span><span class=\"authorName\">Markus Schofnegger.<\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2019\/458\">Poseidon: A New Hash Function for Zero-Knowledge Proof Systems<\/a>, USENIX 2021.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Poseidon is a family of hash functions based on the HADES design strategy over prime fields. The primitive is composed of two different types of rounds: full rounds have m S-box per round while partial rounds have only one S-box and m &#8211; 1 identity functions. The S-box is a power function x^d, where d is small.[\/vc_column_text][us_image image=&#8221;1520&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1507&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]We refer to the cryptanalysis section on HadesMiMC which also extends to Poseidon. Note that the updated version of the Poseidon article on ePrint takes into consideration the cryptanalysis of Beyne et al., Keller-Rosemarin and Ashur-Buschman-Mahzoun.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1524&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_separator size=&#8221;small&#8221;][us_image image=&#8221;1521&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; width=&#8221;1\/2&#8243;][us_image image=&#8221;1523&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_separator size=&#8221;small&#8221;][us_image image=&#8221;1522&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/extgit.iaik.tugraz.at\/krypto\/zkfriendlyhashzoo\/-\/tree\/master\">github repository<\/a><\/li>\n<li><a href=\"https:\/\/youtu.be\/hUx3WpDV_l0\">presentation<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Hash Functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fhash-functions%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero-Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;large&#8221; show_line=&#8221;1&#8243;][us_text text=&#8221;Poseidon2&#8243; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22font-size%22%3A%2232px%22%2C%22margin-bottom%22%3A%221cm%22%7D%7D&#8221; el_id=&#8221;poseidon2&#8243;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"authorName\">Lorenzo Grassi, <\/span><span class=\"authorName\">Dmitry Khovratovich, <\/span><span class=\"authorName\">Markus Schofnegger.<\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2023\/323\">Poseidon2: A Faster Version of the Poseidon Hash Function<\/a>, AFRICACRYPT 2023.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Poseidon2 is a more efficient version of Poseidon that has been recently proposed. While Poseidon is a sponge hash function, Poseidon2 can be either a sponge or a compression function depending on the use case.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1532&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]We refer to the cryptanalysis section on HadesMiMC which extends to Poseidon2. Note that the authors of Poseidon2 have taken these issues into consideration.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][us_image image=&#8221;1533&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2023\/323\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/HorizenLabs\/poseidon2\">github repository<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Hash Functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fhash-functions%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero-Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Rain&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;rain&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong>Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, and Greg Zaverucha<\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2021\/692\">Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto<\/a>, ACM CCS 2022<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner][vc_column_text]RAIN (Random Affine Inverse Nyberg-inspired) is an MPC-friendly cipher that shows several similarities to MiMC, Jarvis and Vision. However note that RAIN is not a classical block cipher, and is only intended to be used for a MPC-in-the-Head proof system.<\/p>\n<p>A way of seeing Rain is as an iteration of a larger variant of the AES S-box using a more unstructured affine mapping.<\/p>\n<p>[\/vc_column_text][us_image image=&#8221;1714&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_separator size=&#8221;small&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Authors:<\/strong> Fukang Liu, Mohammad Mahzoun, Morten \u00d8ygarden, Willi Meier<br \/>\n<strong>Title: <\/strong><a href=\"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/11284\">Algebraic Attacks on RAIN and AIM Using Equivalent Representations<\/a>, ToSC 2023<br \/>\nBy finding an equivalent representation of 2 rounds of RAIN the authors can break 2 rounds with the 128\/192\/256-bit key in only 2<sup>111<\/sup>\/2<sup>170<\/sup>\/2<sup>225<\/sup> bit operations.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2021\/692\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3559353\">ACM CCS<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Block Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fblock-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Multi Party Computation page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fmpc%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Rasta variants&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;rasta-variants&#8221;][us_text text=&#8221;Dasta&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22font-size%22%3A%2232px%22%2C%22margin-bottom%22%3A%221cm%22%7D%7D&#8221; el_id=&#8221;dasta&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"affiliation\"><span class=\"authorName\">Phil Hebborn, Gregor Leander.<br \/>\n<\/span><\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/8696\">Dasta \u2013 Alternative Linear Layer for Rasta<\/a>, TOSC 2020.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner][vc_column_text]Dasta is a variant of Rasta where the unique linear layers are not generated from a PRNG but rather follow a fixed schedule. This is accomplished by doing cyclic rotations on various parts of the cipher state before multiplying with a fixed matrix. The cyclic rotations depend both on block counter and round number, ensuring linear transformations do not repeat.[\/vc_column_text][us_separator size=&#8221;small&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1595&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; size=&#8221;medium&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1596&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Authors:<\/strong> Fukang Liu, Santanu Sarkar, Willi Meier, and Takanori Isobe<br \/>\n<strong>Title: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2021\/474\">Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations<\/a>, ASIACRYPT 2021<br \/>\nLowers security margin to one round for Rasta and Dasta, reveal that Dasta is more vulnerable to attack than Rasta.<\/li>\n<li><strong>Authors: <\/strong>Lorenzo Grassi, Fukang Liu, Christian Rechberger, Fabian Schmid, Roman Walch, Qingju Wang<br \/>\n<strong>Title: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2024\/791\">Minimize the Randomness in Rasta-Like Designs: How Far Can We Go?<\/a>, SAC 2024<br \/>\nStudies to which extent linear transformations in Rasta-like designs need to be random before security is affected.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]The designers have implemented Dasta and compared execution time and throughput against Rasta.[\/vc_column_text][us_separator size=&#8221;small&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1598&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1597&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/8696\">ToSC<\/a><\/li>\n<li><a href=\"https:\/\/youtu.be\/IKbKeHjWbwM?list=PLeeS-3Ml-rpoMnOmgkIJAvZj0zZ8sx6NL\">presentation<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Stream Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fstream-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Fully Homomorphic Encryption page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Ffhe%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;large&#8221; show_line=&#8221;1&#8243;][us_text text=&#8221;Fasta&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22font-size%22%3A%2232px%22%2C%22margin-bottom%22%3A%221cm%22%7D%7D&#8221; el_id=&#8221;fasta&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"affiliation\"><span class=\"authorName\">Carlos Cid, John Petter Indr\u00f8y, H\u00e5vard Raddum.<br \/>\n<\/span><\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2021\/1205\">FASTA &#8211; a stream cipher for fast FHE evaluation<\/a>, CT-RSA 2022.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Fasta is another variant of Rasta, designed to be used together with the BGV homomorphic encryption scheme. The block size is larger than in Rasta, and the block is split into five words, each corresponding to a BGV ciphertext. The unique affine transformations are designed to use only xors and cyclic rotations, which are fast operations in BGV.[\/vc_column_text][us_separator size=&#8221;small&#8221;][us_image image=&#8221;1637&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; size=&#8221;medium&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1636&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; size=&#8221;us_600_600&#8243; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_separator size=&#8221;small&#8221;][us_image image=&#8221;1634&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; size=&#8221;medium&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]The designers have implemented Fasta, and compared the time to generate key stream under FHE encryption to Rasta.[\/vc_column_text][us_image image=&#8221;1635&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; size=&#8221;us_600_600&#8243; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2021\/1205\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-95312-6_19\">Springer<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Stream Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fstream-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Fully Homomorphic Encryption page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Ffhe%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;large&#8221; show_line=&#8221;1&#8243;][us_text text=&#8221;Masta&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22font-size%22%3A%2232px%22%2C%22margin-bottom%22%3A%221cm%22%7D%7D&#8221; el_id=&#8221;masta&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"affiliation\"><span class=\"authorName\">Jincheol Ha, Seongkwang Kim, Wonseok Choi, Jooyoung Lee, Dukjae Moon, Hyojin Yoon, Jihoon Cho.<\/span><\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9240936\">Masta: An HE-Friendly Cipher Using Modular Arithmetic<\/a>, IEEE 2020.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner][vc_column_text]<span style=\"font-weight: 400;\">Masta is a variant of Rasta where the plaintext and key stream elements are in a finite field F_t instead of single bits. This fits well with FHE instances where the plaintext space is larger than F_2. The block size of Masta consists of n elements of F_t, and the linear transformations are designed to be multiplications over F_{t^n}, realized as multiplication with an nxn matrix over F_t.<\/span>[\/vc_column_text][us_separator size=&#8221;small&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1528&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1529&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Authors: <span style=\"font-weight: 400;\">Weizhe Wang, Deng Tang<\/span><\/strong><br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2024\/1005\"><span style=\"font-weight: 400;\">Differential Fault Attack on HE-Friendly Stream Ciphers: Masta, Pasta and Elisabeth<\/span><\/a><br \/>\n<span style=\"font-weight: 400;\">Differential fault injection attack that recovers the secret key in Masta using one word of key stream and a single fault injection.<\/span><a href=\"https:\/\/eprint.iacr.org\/2024\/791\"><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/a><\/li>\n<li><strong>Authors:<\/strong> <span style=\"font-weight: 400;\">Aikata Aikata, Ahaan Dabholkar, Dhiman Saha, Sujoy Sinha Roy<\/span><br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2024\/041\"><span style=\"font-weight: 400;\">SASTA: Ambushing Hybrid Homomorphic Encryption with a Single Fault<\/span><\/a><a href=\"https:\/\/eprint.iacr.org\/2024\/791\"><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/a><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Differential fault injection attack that recovers <\/span><\/span>the secret key in Masta using a single fault injection.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<span style=\"font-weight: 400;\">The designers have implemented Masta and compared its throughput to Rasta under various parameter choices.<\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;small&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1530&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1531&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9240936\">IEEE<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Stream Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fstream-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Fully Homomorphic Encryption page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Ffhe%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;large&#8221; show_line=&#8221;1&#8243;][us_text text=&#8221;Pasta&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22font-size%22%3A%2232px%22%2C%22margin-bottom%22%3A%221cm%22%7D%7D&#8221; el_id=&#8221;pasta&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"affiliation\"><span class=\"authorName\">Christoph Dobraunig, Lorenzo Grassi, Lukas Helminger, Christian Rechberger, Markus Schofnegger, Roman Walch.<br \/>\n<\/span><\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2021\/731\">Pasta: A Case for Hybrid Homomorphic Encryption<\/a>, TCHES 2023.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner][vc_column_text]<span style=\"font-weight: 400;\">Pasta is a Rasta variant designed with basic plaintext elements in a finite field F_p, similar to Masta. The cipher block consists of several F_p-elements that are split into two tracks, where only the output of one track is used as key stream. Pasta uses two different non-linear operations, none of them being the Chi-transformation found in the other variants.<\/span>[\/vc_column_text][us_separator size=&#8221;small&#8221;][us_image image=&#8221;1641&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][us_separator size=&#8221;small&#8221;][us_image image=&#8221;1642&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; size=&#8221;us_600_600&#8243; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Authors: <span style=\"font-weight: 400;\">Weizhe Wang, Deng Tang<\/span><\/strong><br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2024\/1005\"><span style=\"font-weight: 400;\">Differential Fault Attack on HE-Friendly Stream Ciphers: Masta, Pasta and Elisabeth<\/span><\/a><span style=\"font-weight: 400;\">, 2024<br \/>\nDifferential fault injection attack that breaks Pasta with three word-based faults injected into the encryption. The time complexity is 2^{85} or higher.<\/span><\/li>\n<li><strong>Authors:<\/strong> <span style=\"font-weight: 400;\">Lorenzo Grassi, Fukang Liu, Christian Rechberger, Fabian Schmid, Roman Walch, Qingju Wang<\/span><br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2024\/791\"><span style=\"font-weight: 400;\">Minimize the Randomness in Rasta-Like Designs: How Far Can We Go?<\/span><\/a><span style=\"font-weight: 400;\">, SAC 2024<br \/>\nProposes a version of Pasta (Pasta_v2), where only the first linear transformation in the encryption algorithm is random, and all others are fixed.<\/span><\/li>\n<li><strong>Authors:<\/strong> <span style=\"font-weight: 400;\">Aikata Aikata, Ahaan Dabholkar, Dhiman Saha, Sujoy Sinha Roy<\/span><br \/>\n<strong>Title:<\/strong> <a href=\"https:\/\/eprint.iacr.org\/2024\/041\"><span style=\"font-weight: 400;\">SASTA: Ambushing Hybrid Homomorphic Encryption with a Single Fault<\/span><\/a>,<span style=\"font-weight: 400;\"> 2024<br \/>\nDifferential fault injection attack that recovers the secret key in Pasta by injecting a fault in one word.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<span style=\"font-weight: 400;\">The designers have implemented Pasta in the FHE library SEAL and compared its runtime to HERA and Masta.<\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;small&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1643&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1644&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2021\/731\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/10956\">TCHES<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/IAIK\/hybrid-HE-framework\">github repository<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Stream Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fstream-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Fully Homomorphic Encryption page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Ffhe%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;large&#8221; show_line=&#8221;1&#8243;][us_text text=&#8221;Rasta&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22font-size%22%3A%2232px%22%2C%22margin-bottom%22%3A%221cm%22%7D%7D&#8221; el_id=&#8221;rasta&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"affiliation\"><span class=\"authorName\">Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger.<\/span><\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2018\/181\">Rasta: A cipher with low ANDdepth and few ANDs per bit<\/a>, CRYPTO 2018<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Rasta is a stream cipher designed to be used in the context of FHE and MPC. It is designed to have a low multiplicative depth for computing the key stream. The non-linear layer uses the Chi-transformation with multiplicative depth 1, while every linear layer is generated from a counter and only used once during key stream generation.[\/vc_column_text][us_image image=&#8221;1534&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1535&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Authors:<\/strong> Fukang Liu, Santanu Sarkar, Willi Meier, and Takanori Isobe<br \/>\n<strong>Title: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2021\/474\">Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations<\/a>, ASIACRYPT 2021<br \/>\nBreaks 2 out of 3 versions of Agrasta, lowers security margin to one round for Rasta.<\/li>\n<li><strong>Authors: <\/strong>Fukang Liu, Santanu Sarkar, Willi Meier, and Takanori Isobe<br \/>\n<strong>Title: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2022\/399\">The Inverse of Chi and Its Applications to Rasta-like Ciphers<\/a>, Journal of Cryptology 2022<br \/>\nGives formula for the inverse of Chi used in Rasta, leading to more exploitable equations for attacking Rasta.<\/li>\n<li><strong>Authors: <\/strong>R Radheshwar, Meenakshi Kansal, Pierrick M\u00e9aux, Dibyendu Roy<br \/>\n<strong>Title: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2023\/322\">Differential Fault Attack on Rasta and FiLIP_DSM<\/a>, IEEE 2023<br \/>\nGives fault injection attack on Rasta, by only injecting one bit fault in the initial state.<\/li>\n<li><strong>Authors: <\/strong>Lorenzo Grassi, Fukang Liu, Christian Rechberger, Fabian Schmid, Roman Walch, Qingju Wang<br \/>\n<strong>Title: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2024\/791\">Minimize the Randomness in Rasta-Like Designs: How Far Can We Go?<\/a>, SAC 2024<br \/>\nStudies to which extent linear transformations in Rasta-like designs need to be random before security is affected.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]The designers have implemented the homomorphic circuit of Rasta using the BGV scheme in HElib, and compared the time used to some other FHE-friendly ciphers.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1536&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1537&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-96884-1_22\">Springer<\/a><\/li>\n<li><a href=\"https:\/\/eprint.iacr.org\/2018\/181\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/iaikkrypto\/rasta\">github repository<\/a><\/li>\n<li><a href=\"https:\/\/youtu.be\/_L8a3BCAWAE?list=PLeeS-3Ml-rpow5_f-xDdn1WcedTf2xiri\">presentation<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Stream Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fstream-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Fully Homomorphic Encryption page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Ffhe%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Reinforced Concrete&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;reinforcedconcrete&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers:\u00a0<\/strong>Lorenzo Grassi, Dmitry Khovratovich, Reinhard L\u00fcftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch.<\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2021\/1038\">Reinforced Concrete: A Fast Hash Function for Verifiable Computation<\/a>, ACM CCS 2022.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Reinforced Concrete is the first design proposed for ZKP based on look-up tables. This primitive operates on three prime field elements. The authors provide in particular concrete instances for large prime fields Fp where p is the order of the curves BLS381 and BN254 (around 256 bits).<\/p>\n<p>Reinforced Concrete uses three different layers: Concrete, Bricks, and Bar. The Concrete layer corresponds to the multiplication by the circulant matrix (2,1,1) and addition of constants. Then, the Bricks layer is a non-linear permutation inspired by the one used in <a href=\"#griffin\">Griffin<\/a>. This layer provides security against statistical attacks. Finally, lookup tables are used for the Bar layer that is applied only once in the middle on the Reinforced Concrete permutation. This layer provides resistance of the scheme to algebraic attacks.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1495&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]The authors propose a comparison of Reinforced Concrete with other ZK-friendly primitives and with traditional ones.[\/vc_column_text][us_image image=&#8221;1593&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li style=\"text-align: left;\"><a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3548606.3560686\">ACM CCS<\/a><\/li>\n<li><a href=\"https:\/\/eprint.iacr.org\/2021\/1038\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/extgit.iaik.tugraz.at\/krypto\/zkfriendlyhashzoo\/-\/tree\/master\">github repository<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Hash Functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fhash-functions%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero-Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Rubato&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;rubato&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong><span class=\"authorName\">Jincheol Ha, <\/span><span class=\"authorName\">Seongkwang Kim, <\/span><span class=\"authorName\">Byeonghak Lee, <\/span><span class=\"authorName\">Jooyoung Lee, <\/span><span class=\"authorName\">Mincheol Son.<\/span><\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2022\/537\">Rubato: Noisy Ciphers for Approximate Homomorphic Encryption<\/a>, EUROCRYPT 2022.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Rubato is a family of noisy ciphers designed for a transciphering framework for approximate FHE. It introduces Gaussian noise to a symmetric cipher of low algebraic degree, significantly reducing the multiplicative complexity compared to existing HE-friendly ciphers, and allowing very few rounds to achieve security. As such, Rubato offers a cost-effective trade-off between Learning With Errors (LWE) encryption and conventional symmetric encryption.[\/vc_column_text][us_image image=&#8221;1546&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Its design is similar to HERA, but differs in that while HERA operates over a field F_p for prime p, Rubato relaxes this condition to a ring Z_q for any 25- or 26-bit integer q.[\/vc_column_text][us_image image=&#8221;1678&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Cryptanalysis<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Authors: <\/strong>Lorenzo Grassi<span class=\"affiliation\">, <\/span><span class=\"authorName\">Irati Manterola Ayala<\/span><span class=\"affiliation\">, <\/span><span class=\"authorName\">Martha Norberg Hovd<\/span><span class=\"affiliation\">, <\/span><span class=\"authorName\">Morten \u00d8ygarden<\/span><span class=\"affiliation\">, <\/span><span class=\"authorName\">H\u00e5vard Raddum<\/span><span class=\"affiliation\">, <\/span><span class=\"authorName\">Qingju Wang<\/span><br \/>\n<strong>Title: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2023\/822\">Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato<\/a>, CRYPTO 2023<br \/>\nKey recovery attack on full Rubato for at least 25% of the possible choices for q with additional experimental data. In its weakest instance, the secret key can be successfully recovered with time complexity 2^57 using less than 250.000 known key stream elements and less than 25 GB of memory<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;small&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1547&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1548&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][us_image image=&#8221;1549&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-06944-4_20\">Springer<\/a><\/li>\n<li><a href=\"https:\/\/eprint.iacr.org\/2022\/537\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=TE_sYzJtZQc\">presentation<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/KAIST-CryptLab\/Rubato\">github &#8211; client side<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/KAIST-CryptLab\/RtF-Transciphering\">github &#8211; server side<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Stream Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fstream-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Fully Homomorphic Encryption page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Ffhe%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Small-pSquare&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;small-psquare&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers:\u00a0<\/strong>Lorenzo Grassi, Lo\u00efc Masure, Pierrick M\u00e9aux, Thorben Moos, Fran\u00e7ois-Xavier Standaert.<\/li>\n<li><strong>Article: <\/strong> <a href=\"https:\/\/eprint.iacr.org\/2024\/431\">Generalized Feistel Ciphers for Efficient Prime Field Masking<\/a>, EUROCRYPT 2024.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]This tweakable block cipher is intended to be easy to mask using arithmetic masking rather than Boolean masking, meaning that it is MPC-friendly.<\/p>\n<p>It is a generalized Feistel network operating on four branches, each consisting of four sub-branches. Each sub-branch is then an integer modulo 127. The Feistel function is depicted in the following figure. The key material is injected into the state every four Feistel rounds, four rounds thus forming a <em>step<\/em>. Somewhat counter-intuitively, the master key is simply added into the state at the start of each step, and it is the tweak that undergoes non-trivial non-linear operations.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1696&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;small&#8221;][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2024\/431\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/youtu.be\/Drur1KX3SuA?list=PLeeS-3Ml-rppRdblehgxgW2na2PqkyfCj\">Presentation<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Block Ciphers page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fblock-ciphers%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Multi Party Computation page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fmpc%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Tip5 variants&#8221; tab_link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%231a1a1a%22%2C%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221; el_id=&#8221;tip5-variants&#8221;][us_text text=&#8221;Tip4 and Tip4&#8242;&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22font-size%22%3A%2232px%22%2C%22margin-bottom%22%3A%221cm%22%7D%7D&#8221; el_id=&#8221;tip4&#8243;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong>Robin Salen.<\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/toposware.com\/paper_tip5.pdf\">Two additional instantiations from the Tip5 hash function construction<\/a>, 2023<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]While Tip5 is targeting a security level of 160 bits the two variants, called Tip4 and Tip4\u2019, achieve 128 bits of security.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1538&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][us_separator size=&#8221;small&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][us_image image=&#8221;1539&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][us_image image=&#8221;1540&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][us_image image=&#8221;1541&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/toposware.com\/paper_tip5.pdf\">paper<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Hash Functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fhash-functions%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero-Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][us_separator size=&#8221;large&#8221; show_line=&#8221;1&#8243;][us_text text=&#8221;Tip5&#8243; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23219ebc%22%2C%22font-size%22%3A%2232px%22%2C%22margin-bottom%22%3A%221cm%22%7D%7D&#8221; el_id=&#8221;tip5&#8243;][vc_column_text]<\/p>\n<ul>\n<li><strong>Designers: <\/strong>Alan Szepieniec, Alexander Lemmens, Jan Ferdinand Sauer, Bobbin Threadbare, Al-Kindi.<\/li>\n<li><strong>Article: <\/strong><a href=\"https:\/\/eprint.iacr.org\/2023\/107\">The Tip5 Hash Function for Recursive STARKs<\/a>, 2023<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]Tip5 is a hash function specifically designed to be efficient over the Goldilocks field Fp with p = 2^64 &#8211; 2^32 + 1.<br \/>\nThe non-linear layer is composed of two types of S-boxes: S, is taken from a lookup table, and T is the classical power function x^d (here d = 7). Among the 16 branches, 4 are of the first type S, and 12 of the second type T.<br \/>\nThe overall construction is a 5-round SPN with a circulant MDS matrix as linear layer. Note that the linear layer and the round constants are derived from the ASCII string \u201cTip5\u201d.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_image image=&#8221;1493&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;small&#8221;][vc_column_text]<\/p>\n<h4><strong>Implementation<\/strong><\/h4>\n<p>[\/vc_column_text][vc_column_text]The authors propose a comparison with Rescue-Prime and Poseidon.[\/vc_column_text][us_image image=&#8221;1494&#8243; meta=&#8221;1&#8243; align=&#8221;center&#8221; size=&#8221;us_600_600&#8243; link=&#8221;%7B%22url%22%3A%22%22%7D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][us_separator size=&#8221;large&#8221;][us_popup content_bgcolor=&#8221;_content_text&#8221; content_textcolor=&#8221;_header_middle_bg&#8221; btn_label=&#8221;Useful links&#8221; align=&#8221;center&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/eprint.iacr.org\/2023\/107\">ePrint<\/a><\/li>\n<li><a href=\"https:\/\/youtu.be\/o_mgebT96ao\">presentation<\/a><\/li>\n<\/ul>\n<p>[\/us_popup][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Hash Functions page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fhash-functions%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][us_separator size=&#8221;large&#8221;][us_btn label=&#8221;Back to Zero-Knowledge page&#8221; link=&#8221;%7B%22url%22%3A%22https%3A%2F%2Fstap-zoo.com%2Fzk%2F%22%7D&#8221; align=&#8221;center&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_content_bg_alt%22%7D%7D&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Section&#8221;][\/vc_tta_section][vc_tta_section title=&#8221;Section&#8221;][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row height=&#8221;medium&#8221; us_bg_overlay_color=&#8221;#f5f5f5&#8243; us_shape_show_bottom=&#8221;1&#8243; us_shape_color_bottom=&#8221;#ffffff&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22%23f5f5f5%22%7D%7D&#8221;][vc_column width=&#8221;5\/6&#8243;][vc_column_text css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22%23023047%22%7D%7D&#8221;] List of STAP primitives [\/vc_column_text][us_separator][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][vc_row height=&#8221;small&#8221; color_scheme=&#8221;alternate&#8221; us_bg_overlay_color=&#8221;#ffffff&#8221; us_shape_show_top=&#8221;1&#8243; us_shape_color_top=&#8221;#ffffff&#8221; us_shape_flip_top=&#8221;1&#8243; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22_header_middle_bg%22%7D%7D&#8221;][vc_column link=&#8221;%7B%22url%22%3A%22%22%7D&#8221; css=&#8221;%7B%22default%22%3A%7B%22background-color%22%3A%22%23ffffff%22%7D%7D&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/12&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][us_separator size=&#8221;small&#8221;][vc_custom_heading text=&#8221;STAP Lounge&#8221; font_container=&#8221;tag:h2|font_size:42|text_align:center|color:%23219ebc&#8221; google_fonts=&#8221;font_family:ABeeZee%3Aregular%2Citalic|font_style:400%20regular%3A400%3Anormal&#8221;][vc_column_text css=&#8221;%7B%22default%22%3A%7B%22color%22%3A%22_footer_bg%22%7D%7D&#8221;] The STAP Zoo currently collects information about the following list of primitives: (BC = Block Ciphers, SC = Stream Ciphers, HF = Hash functions, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":13,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-1812","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/stap-wiki.fr\/index.php\/wp-json\/wp\/v2\/pages\/1812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stap-wiki.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/stap-wiki.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/stap-wiki.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stap-wiki.fr\/index.php\/wp-json\/wp\/v2\/comments?post=1812"}],"version-history":[{"count":0,"href":"https:\/\/stap-wiki.fr\/index.php\/wp-json\/wp\/v2\/pages\/1812\/revisions"}],"wp:attachment":[{"href":"https:\/\/stap-wiki.fr\/index.php\/wp-json\/wp\/v2\/media?parent=1812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}