Markus Schofnegger

According to our database1, Markus Schofnegger authored at least 31 papers between 2018 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Poseidon2b: A Binary Field Version of Poseidon2.
IACR Cryptol. ePrint Arch., 2025

Skyscraper: Fast Hashing on Big Primes.
IACR Cryptol. ePrint Arch., 2025

Cache Timing Leakages in Zero-Knowledge Protocols.
Proceedings of the 7th Conference on Advances in Financial Technologies, 2025

2024
Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations.
IACR Trans. Symmetric Cryptol., 2024

2023
Hash Functions Monolith for ZK Applications: May the Speed of SHA-3 be With You.
IACR Cryptol. ePrint Arch., 2023

From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Poseidon2: A Faster Version of the Poseidon Hash Function.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2023, 2023

2022
The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over Fnp Preimage Attack on Full Grendel.
IACR Trans. Symmetric Cryptol., 2022

Influence of the Linear Layer on the Algebraic Degree in SP-Networks.
IACR Trans. Symmetric Cryptol., 2022

A New Feistel Approach Meets Fluid-SPN: Griffin for Zero-Knowledge Applications.
IACR Cryptol. ePrint Arch., 2022

Small MACs from Small Permutations.
IACR Cryptol. ePrint Arch., 2022

Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Reinforced Concrete: A Fast Hash Function for Verifiable Computation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer.
IACR Trans. Symmetric Cryptol., 2021

The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over (F_p)^n.
IACR Cryptol. ePrint Arch., 2021

Practical Key Recovery Attacks on FlexAEAD.
IACR Cryptol. ePrint Arch., 2021

Pasta: A Case for Hybrid Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2021

Reinforced Concrete: Fast Hash Function for Zero Knowledge Proofs and Verifiable Computation.
IACR Cryptol. ePrint Arch., 2021

Poseidon: A New Hash Function for Zero-Knowledge Proof Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Weak Linear Layers in Word-Oriented Partial SPN and HADES-Like Ciphers.
IACR Cryptol. ePrint Arch., 2020

Higher-Order Differentials of Ciphers with Low-Degree S-Boxes.
IACR Cryptol. ePrint Arch., 2020

Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems.
IACR Cryptol. ePrint Arch., 2019

Algebraic Cryptanalysis of Variants of Frit.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

Forgery Attacks on FlexAE and FlexAEAD.
Proceedings of the Cryptography and Coding - 17th IMA International Conference, 2019

Feistel Structures for MPC, and More.
Proceedings of the Computer Security - ESORICS 2019, 2019

Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Algebraic Cryptanalysis of Frit.
IACR Cryptol. ePrint Arch., 2018


  Loading...