1. 1. Overview
    1. 1.1. Curriculum
    2. 1.2. motivation
  2. 2. Poseidon
    1. 2.1. Construction
    2. 2.2. Scalar Field
    3. 2.3. Sponge
    4. 2.4. Permutation
    5. 2.5. S-Boxes
    6. 2.6. Linear Layer
    7. 2.7. Round Constants
  3. 3. Security
    1. 3.1. Linear Cryptanalysis
    2. 3.2. Differential Cryptanalysis
    3. 3.3. Algebraic Cryptanalysis
    4. 3.4. New Ideas for attacks
  4. 4. Resources
    1. 4.1. Blogs and Code
    2. 4.2. Videos and talks
    3. 4.3. People and courses

Poseidon Journal

People and courses