Paper Analyses

In-depth breakdowns of cryptographic papers with formal definitions, proof reconstructions, and implementations.

Each paper page includes formal definitions extracted and explained, step-by-step proof reconstructions, code implementations in Lean 4, and cross-references to related work.

Our Vision

cryptography.academy is an open knowledge base that links definitions to definitions, formulas to formulas, and proofs to the precise results they depend on — across the entire cryptographic literature. Formalizations are progressively machine-checked in Lean 4. Read the full vision statement.

This project is and will always be free. No profit is made, no knowledge will ever be sold, and there will never be a paywall. The entire source code is publicly available.

Attribution & Copyright Notice

The paper content reproduced on this site belongs entirely to the original authors. Nothing is claimed as original work by BaDaaS or any contributor. Each page reproduces the paper for educational and academic study purposes, augmented with formal definitions in Lean 4 and explanatory annotations. We act in good faith to make verified knowledge freely accessible to everyone on the Internet.

We respect intellectual property and welcome any feedback. Always cite the original publications. Canonical sources are linked at the top of every paper page. If you are an author and would like your paper removed or amended, please open an issue. We will never add a paywall or charge for any content.

Papers (114)

Showing 114 of 114 papers

The Algebraic CheapLunch: Extending FreeLunch Attacks on Arithmetization-Oriented Primitives Beyond CICO-1

2025Attacks and cryptanalysis

Antoine Bak, Augustin Bariant, Aurélien Boeuf, Pierre Briaud, Morten Øygarden, Atharva Phanse

Poseidon(2)b: Binary Field Versions of Poseidon/Poseidon2

2025Secret-key cryptography

Lorenzo Grassi, Dmitry Khovratovich, Katharina Koschatko, Christian Rechberger, Markus Schofnegger, Verena Schröppel, Zhuo Wu

Poseidon and Neptune: Gröbner Basis Cryptanalysis Exploiting Subspace Trails

2025Attacks and cryptanalysis

Lorenzo Grassi, Katharina Koschatko, Christian Rechberger

Breaking Poseidon Challenges with Graeffe Transforms and Complexity Analysis by FFT Lower Bounds

2025Attacks and cryptanalysis

Ziyu Zhao, Jintai Ding

Attacking Poseidon via Graeffe-Based Root-Finding over NTT-Friendly Fields

2025Attacks and cryptanalysis

Antonio Sanso, Giuseppe Vitto

Groebner Basis Cryptanalysis of Anemoi

2025Attacks and cryptanalysis

Luca Campa, Arnab Roy

Improved Resultant Attack against Arithmetization-Oriented Primitives

2025Attacks and cryptanalysis

Augustin Bariant, Aurélien Boeuf, Pierre Briaud, Maël Hostettler, Morten Øygarden, Håvard Raddum

KZH-Fold: Accountable Voting from Sublinear Accumulation

2025Foundations

George Kadianakis, Arantxa Zapico, Hossein Hafezi, Benedikt Bünz

Blaze: Fast SNARKs from Interleaved RAA Codes

2024Cryptographic protocols

Martijn Brehm, Binyi Chen, Ben Fisch, Nicolas Resch, Ron D. Rothblum, Hadas Zeilberger

A Note on Ligero and Logarithmic Randomness

2024Foundations

Guillermo Angeris, Alex Evans, Gyumin Roh

A note on the G-FFT

2024Applications

Ulrich Haböck

Modelling Ciphers with Overdefined Systems of Quadratic Equations: Application to Friday, Vision, RAIN and Biscuit

2024Attacks and cryptanalysis

Fukang Liu, Mohammad Mahzoun, Willi Meier

Vision Mark-32: ZK-Friendly Hash Function Over Binary Tower Fields

2024Implementation

Tomer Ashur, Mohammad Mahzoun, Jim Posen, Danilo Šijačić

Security Analysis of XHASH8/12

2024Secret-key cryptography

Léo Perrin

Polylogarithmic Proofs for Multilinears over Binary Towers

2024Cryptographic protocols

Benjamin E. Diamond, Jim Posen

The Algebraic Freelunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives

2024Attacks and cryptanalysis

Augustin Bariant, Aurélien Boeuf, Axel Lemoine, Irati Manterola Ayala, Morten Øygarden, Léo Perrin, Håvard Raddum

Circle STARKs

2024Cryptographic protocols

Ulrich Haböck, David Levit, Shahar Papini

Succinct Arguments over Towers of Binary Fields

2023Cryptographic protocols

Benjamin E. Diamond, Jim Posen

Proof-Carrying Data from Multi-folding Schemes

2023Foundations

Zibo Zhou, Zongyang Zhang, Zhiyu Zhang, Jin Dong

XHash: Efficient STARK-friendly Hash Function

2023Secret-key cryptography

Tomer Ashur, Amit Singh Bhati, Al Kindi, Mohammad Mahzoun, Léo Perrin

Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations

2023Secret-key cryptography

Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch

Algebraic Cryptanalysis of HADES Design Strategy: Application to POSEIDON and Poseidon2

2023Attacks and cryptanalysis

Tomer Ashur, Thomas Buschman, Mohammad Mahzoun

SAFE: Sponge API for Field Elements

2023Implementation

JP Aumasson, Dmitry Khovratovich, Bart Mennink, Porçu Quine

TurboSHAKE

2023Secret-key cryptography

Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Benoît Viguier

Poseidon2: A Faster Version of the Poseidon Hash Function

2023Cryptographic protocols

Lorenzo Grassi, Dmitry Khovratovich, Markus Schofnegger

The Tip5 Hash Function for Recursive STARKs

2023Secret-key cryptography

Alan Szepieniec, Alexander Lemmens, Jan Ferdinand Sauer, Bobbin Threadbare, Al-Kindi

Rescue-Prime Optimized

2022Secret-key cryptography

Tomer Ashur, Al Kindi, Willi Meier, Alan Szepieniec, Bobbin Threadbare

Multivariate lookups based on logarithmic derivatives

2022Cryptographic protocols

Ulrich Haböck

An efficient verifiable state for zk-EVM and beyond from the Anemoi hash function

2022Applications

Jianwei Liu, Harshad Patil, Akhil Sai Peddireddy, Kevin Singh, Haifeng Sun, Huachuang Sun, Weikeng Chen

flookup: Fractional decomposition-based lookups in quasi-linear time independent of table size

2022Cryptographic protocols

Ariel Gabizon, Dmitry Khovratovich

A summary on the FRI low degree test

2022Cryptographic protocols

Ulrich Haböck

Caulk+: Table-independent lookup arguments

2022Cryptographic protocols

Jim Posen, Assimakis A. Kattis

New Design Techniques for Efficient Arithmetization-Oriented Hash Functions:Anemoi Permutations and Jive Compression Mode

2022Secret-key cryptography

Clémence Bouvier, Pierre Briaud, Pyrros Chaidos, Léo Perrin, Robin Salen, Vesselin Velichkov, Danny Willems

New optimization techniques for PlonK’s arithmetization

2022Public-key cryptography

Miguel Ambrona, Anne-Laure Schmitt, Raphael R. Toledo, Danny Willems

Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications

2022Secret-key cryptography

Lorenzo Grassi, Yonglin Hao, Christian Rechberger, Markus Schofnegger, Roman Walch, Qingju Wang

EcGFp5: a Specialized Elliptic Curve

2022Public-key cryptography

Thomas Pornin

Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes over $\\mathbb F_p^n$

2021Secret-key cryptography

Lorenzo Grassi, Silvia Onofri, Marco Pedicini, Luca Sozzi

fflonk: a Fast-Fourier inspired verifier efficient version of PlonK

2021Cryptographic protocols

Ariel Gabizon, Zachary J. Williamson

Reinforced Concrete: A Fast Hash Function for Verifiable Computation

2021Secret-key cryptography

Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch

On the Use of the Legendre Symbol in Symmetric Cipher Design

2021Secret-key cryptography

Alan Szepieniec

Darlin: Recursive Proofs using Marlin

2021Cryptographic protocols

Ulrich Haböck, Alberto Garoffolo, Daniele Di Benedetto

Rescue-Prime: a Standard Specification (SoK)

2020Secret-key cryptography

Alan Szepieniec, Tomer Ashur, Siemen Dhooghe

On the security of the Rescue hash function

2020Secret-key cryptography

Tim Beyne, Anne Canteaut, Gregor Leander, María Naya-Plasencia, Léo Perrin, Friedrich Wiemer

Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer

2020Secret-key cryptography

Lorenzo Grassi, Christian Rechberger, Markus Schofnegger

Constructing hidden order groups using genus three Jacobians

2020Foundations

Steve Thakur

plookup: A simplified polynomial protocol for lookup tables

2020Uncategorized

Ariel Gabizon, Zachary J. Williamson

Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems

2020Secret-key cryptography

Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer

Mind the Middle Layer: The HADES Design Strategy Revisited

2020Secret-key cryptography

Nathan Keller, Asaf Rosemarin

On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy

2019Secret-key cryptography

Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, Dragos Rotaru, Markus Schofnegger

Recursive Proof Composition without a Trusted Setup

2019Cryptographic protocols

Sean Bowe, Jack Grigg, Daira Hopwood

PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge

2019Uncategorized

Ariel Gabizon, Zachary J. Williamson, Oana Ciobotaru

Collisions on Feistel-MiMC and univariate GMiMC

2019Secret-key cryptography

Xavier Bonnetain

A Key-Independent Distinguisher for 6-round AES in an Adaptive Setting

2019Secret-key cryptography

Navid Ghaedi Bardeh

A Short Note on a Weight Probability Distribution Related to SPNs

2019Secret-key cryptography

Sondre Rønjom

The Exchange Attack: How to Distinguish Six Rounds of AES with $2^{88.2}$ chosen plaintexts

2019Secret-key cryptography

Navid Ghaedi Bardeh, Sondre Rønjom

Extended Truncated-differential Distinguishers on Round-reduced AES

2019Secret-key cryptography

Zhenzhen Bao, Jian Guo, Eik List

Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm

2019Secret-key cryptography

Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher

AuroraLight: Improved prover efficiency and SRS size in a Sonic-like system

2019Uncategorized

Ariel Gabizon

Spartan: Efficient and general-purpose zkSNARKs without trusted setup

2019Cryptographic protocols

Srinath Setty

Poseidon: A New Hash Function for Zero-Knowledge Proof Systems

2019Cryptographic protocols

Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, Markus Schofnegger

Feistel Structures for MPC, and More

2019Secret-key cryptography

Martin R. Albrecht, Lorenzo Grassi, Leo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger

DEEP-FRI: Sampling Outside the Box Improves Soundness

2019Foundations

Eli Ben-Sasson, Lior Goldberg, Swastik Kopparty, Shubhangi Saraf

Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC

2018Secret-key cryptography

Itai Dinur, Daniel Kales, Angela Promitzer, Sebastian Ramacher, Christian Rechberger

Simple Verifiable Delay Functions

2018Foundations

Krzysztof Pietrzak

Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES

2018Secret-key cryptography

Lorenzo Grassi, Christian Rechberger

Improvements to the Linear Operations of LowMC: A Faster Picnic

2017Implementation

Daniel Kales, Léo Perrin, Angela Promitzer, Sebastian Ramacher, Christian Rechberger

Scalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model

2017Cryptographic protocols

Sean Bowe, Ariel Gabizon, Ian Miers

Mixture Differential Cryptanalysis and Structural Truncated Differential Attacks on round-reduced AES

2017Secret-key cryptography

Lorenzo Grassi

The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS

2016Secret-key cryptography

Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim

Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori

2016Implementation

Amir Moradi, Tobias Schneider

Invariant Subspace Attack Against Full Midori64

2015Secret-key cryptography

Jian Guo, Jérémy Jean, Ivica Nikolić, Kexin Qiao, Yu Sasaki, Siang Meng Sim

Complete addition formulas for prime order elliptic curves

2015Public-key cryptography

Joost Renes, Craig Costello, Lejla Batina

Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers

2015Secret-key cryptography

Thomas Peyrin, Yannick Seurin

Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case

2015Uncategorized

Taechan Kim, Razvan Barbulescu

Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version)

2015Secret-key cryptography

Anne Canteaut, Sébastien Duval, Gaëtan Leurent

SIMON and SPECK: Block Ciphers for the Internet of Things

2015Secret-key cryptography

Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers

Verifiable computation using multiple provers

2014Foundations

Andrew J. Blumberg, Justin Thaler, Victor Vu, Michael Walfish

Scalable Zero Knowledge via Cycles of Elliptic Curves

2014Cryptographic protocols

Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza

FFT-Based Key Recovery for the Integral Attack

2014Secret-key cryptography

Yosuke Todo

SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge

2013Cryptographic protocols

Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, Madars Virza

The SIMON and SPECK Families of Lightweight Block Ciphers

2013Secret-key cryptography

Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers

Time-Optimal Interactive Proofs for Circuit Evaluation

2013Foundations

Justin Thaler

How to Run Turing Machines on Encrypted Data

2013Uncategorized

Shafi Goldwasser, Yael Kalai, Raluca Ada Popa, Vinod Vaikuntanathan, Nickolai Zeldovich

Improved ``Partial Sums"-based Square Attack on AES

2012Secret-key cryptography

Michael Tunstall

Implementing Pairings at the 192-bit Security Level

2012Implementation

Diego F. Aranha, Laura Fuentes-Castañeda, Edward Knapp, Alfred Menezes, Francisco Rodríguez-Henríquez

Duplexing the sponge: single-pass authenticated encryption and other applications

2011Foundations

Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche

Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings

2011Uncategorized

Craig Costello, Kristin Lauter, Michael Naehrig

Linear Hulls with Correlation Zero and Linear Cryptanalysis of Block Ciphers

2011Secret-key cryptography

Andrey Bogdanov, Vincent Rijmen

Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers

2009Cryptographic protocols

Rosario Gennaro, Craig Gentry, Bryan Parno

On the Security of UOV

2009Public-key cryptography

Jean-Charles Faugère, Ludovic Perret

Optimal Irreducible Polynomials for GF(2^m) Arithmetic

2007Implementation

Michael Scott

Probability distributions of Correlation and Differentials in Block Ciphers

2005Secret-key cryptography

Joan Daemen, Vincent Rijmen

Pairing-Friendly Elliptic Curves of Prime Order

2005Public-key cryptography

Paulo S. L. M. Barreto, Michael Naehrig

Password-Based Authenticated Key Exchange in the Three-Party Setting

2004Cryptographic protocols

Michel Abdalla, Pierre-Alain Fouque, David Pointcheval

Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel

2002Uncategorized

D. Page

Elliptic curves suitable for pairing based cryptography

2003Public-key cryptography

Friederike Brezing, Annegret Weng

On Small Characteristic Algebraic Tori in Pairing-Based Cryptography

2004Uncategorized

R. Granger, D. Page, M. Stam

Request for Review of Key Wrap Algorithms

2004Secret-key cryptography

Morris Dworkin

Ordinary abelian varieties having small embedding degree

2004Public-key cryptography

Steven D. Galbraith, J. McKee, P. Valenca

Efficient Pairing Computation on Supersingular Abelian Varieties

2004Public-key cryptography

Paulo S. L. M. Barreto, Steven Galbraith, Colm O hEigeartaigh, Michael Scott

Scaling security in pairing-based protocols

2005Public-key cryptography

Michael Scott

On Computing Products of Pairings

2006Implementation

R Granger, N. P. Smart

Multiplication and Squaring on Pairing-Friendly Fields

2006Uncategorized

Augusto Jun Devegili, Colm Ó~hÉigeartaigh, Michael Scott, Ricardo Dahab

Another Look at Square Roots and Traces (and Quadratic Equations) in Fields of Even Characteristic

2007Uncategorized

Roberto Avanzi

Security Reductions of the Second Round SHA-3 Candidates

2010Secret-key cryptography

Elena Andreeva, Bart Mennink, Bart Preneel

Squaring in cyclotomic subgroups

2010Public-key cryptography

Koray Karabina

Two Simple Code-Verification Voting Protocols

2011Applications

Helger Lipmaa

On the Efficient Implementation of Pairing-Based Protocols

2011Implementation

Michael Scott

Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs

2011Uncategorized

Shafi Goldwasser, Huijia Lin, Aviad Rubinstein

Functional Encryption: New Perspectives and Lower Bounds

2012Public-key cryptography

Shweta Agrawal, Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee

Enforcing Language Semantics Using Proof-Carrying Data

2013Applications

Stephen Chong, Eran Tromer, Jeffrey A. Vaughan

Zero Knowledge Protocols from Succinct Constraint Detection

2016Foundations

Eli Ben-Sasson, Alessandro Chiesa, Michael A. Forbes, Ariel Gabizon, Michael Riabzev, Nicholas Spooner

Zero-Knowledge Proofs of Proximity

2017Foundations

Itay Berman, Ron D. Rothblum, Vinod Vaikuntanathan

Baloo: Nearly Optimal Lookup Arguments

2022Cryptographic protocols

Arantxa Zapico, Ariel Gabizon, Dmitry Khovratovich, Mary Maller, Carla Ràfols