all InfoSec news
The Tip5 Hash Function for Recursive STARKs
Jan. 28, 2023, 4:48 p.m. |
IACR News www.iacr.org
ePrint Report: The Tip5 Hash Function for Recursive STARKs
Alan Szepieniec, Alexander Lemmens, Jan Ferdinand Sauer, Bobbin Threadbare
This paper specifies a new arithmetization-oriented hash function called Tip5. It uses the SHARK design strategy with low-degree power maps in combination with lookup tables, and is tailored to the field with $p=2^{64}-2^{32}+1$ elements.
The context motivating this design is the recursive verification of STARKs. This context imposes particular design constraints, and therefore the hash function's arithmetization is discussed at length.
alan called constraints context design eprint report function hash hash function low maps power report shark strategy tables verification
More from www.iacr.org / IACR News
Probabilistically Checkable Arguments for all NP
1 day, 8 hours ago |
www.iacr.org
I-2421 – POST DOC IN SOFTWARE AND DATA SECURITY
2 days, 4 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Cybersecurity Triage Analyst
@ Peraton | Linthicum, MD, United States
Associate DevSecOps Engineer
@ LinQuest | Los Angeles, California, United States
DORA Compliance Program Manager
@ Resillion | Brussels, Belgium
Head of Workplace Risk and Compliance
@ Wise | London, United Kingdom