all InfoSec news
Differential analysis of the ternary hash function Troika
Jan. 19, 2023, 9:12 p.m. |
IACR News www.iacr.org
ePrint Report: Differential analysis of the ternary hash function Troika
Christina Boura, Margot Funk, Yann Rotella
Troika is a sponge-based hash function designed by Kölbl, Tischhauser, Bogdanov and Derbez in 2019. Its specificity is that it is defined over $\mathbb{F}_3$ in order to be used inside IOTA’s distributed ledger but could also serve in all settings requiring the generation of ternary randomness. To be used in practice, Troika needs to be proven secure against state-of-the-art cryptanalysis. However, there are today …
analysis defined distributed distributed ledger eprint report function hash hash function ledger order practice randomness report settings
More from www.iacr.org / IACR News
Blink: An Optimal Proof of Proof-of-Work
1 day, 10 hours ago |
www.iacr.org
PN-based Attacks in the White-box Setting
1 day, 10 hours ago |
www.iacr.org
Succinct Functional Commitments for Circuits from k-Lin
1 day, 16 hours ago |
www.iacr.org
Levin–Kolmogorov Complexity is not in Linear Time
1 day, 16 hours ago |
www.iacr.org
Unstructured Inversions of New Hope
1 day, 16 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Principal Engineer - DLP Endpoint Security
@ Netskope | Bengaluru, Karnataka, India
Security Consultant (m/w/d)
@ Deutsche Telekom | Berlin, Deutschland
Security Engineer
@ IDEMIA | Haarlem, NL, 2031 CC
CyberSecurity Forensics and Incident Response Analyst
@ Bosch Group | Pittsburgh, PA, United States
Cyber MS MDR - Sr Associate
@ KPMG India | Bengaluru, Karnataka, India
Senior Lead Cybersecurity Architect-Threat modeling, Cryptography
@ JPMorgan Chase & Co. | India