Sponge function

Known as: Cryptographic sponge, Sponge (disambiguation), Sponge hash 
In cryptography, a sponge function or sponge construction is a class of algorithms with finite internal state that take an input bit stream of any… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2006-2018
051020062018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Since Keccak was selected as SHA-3 hash function by NIST, it has attracted considerable attention from cryptographic researchers… (More)
  • table 1
  • table 2
  • table 3
  • figure 1
  • figure 2
Is this relevant?
2016
2016
We present the Bash family of hashing algorithms based on the sponge paradigm. A core element of this family is the Bash-f sponge… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2014
2014
In this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak) against algebraic attacks. This… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2014
2014
In this paper we mount the cube attack on the Keccak sponge function. The cube attack, formally introduced in 2008, is an… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2014
2014
The Sponge function is known to achieve 2 security, where c is its capacity. This bound was carried over to keyed variants of the… (More)
  • table 1
  • figure 1
  • figure 2
Is this relevant?
2011
2011
Sponge functions were introduced by Bertoni et al. as an alternative to the classical Merkle-Damgård design. Many hash function… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2011
2011
The advantage in differentiating the sponge construction from a random oracle is upper bounded by N22−(c+1), with N the number of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2010
2010
This paper proposes a new construction for the generation of pseudo-random numbers. The construction is based on sponge functions… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
In this paper we prove that the sponge construction introduced in [4] is indifferentiable from a random oracle when being used… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?