{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T05:57:20Z","timestamp":1763704640231,"version":"3.45.0"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,26]]},"DOI":"10.1109\/iccad66269.2025.11240995","type":"proceedings-article","created":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:39:34Z","timestamp":1763663974000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Gotta Hash \u2019Em All! Accelerating Hash Functions for Zero-Knowledge Proof Applications"],"prefix":"10.1109","author":[{"given":"Nojan","family":"Sheybani","sequence":"first","affiliation":[{"name":"University of California San Diego"}]},{"given":"Tengkai","family":"Gong","sequence":"additional","affiliation":[{"name":"University of California San Diego"}]},{"given":"Anees","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Arizona State University"}]},{"given":"Nges Brian","family":"Njungle","sequence":"additional","affiliation":[{"name":"Arizona State University"}]},{"given":"Michel","family":"Kinsy","sequence":"additional","affiliation":[{"name":"Arizona State University"}]},{"given":"Farinaz","family":"Koushanfar","sequence":"additional","affiliation":[{"name":"University of California San Diego"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.15"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2011.2160052"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DAC56929.2023.10247798"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00448"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485379"},{"key":"ref6","first-page":"501","article-title":"Mystique: Efficient conversions for zero-knowledge proofs with applications to machine learning","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Weng"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3575693.3575711"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA52012.2021.00040"},{"key":"ref9","article-title":"Scalable, transparent, and post-quantum secure computational integrity","author":"Ben-Sasson","year":"2018","journal-title":"Cryptology ePrint Archive"},{"key":"ref10","article-title":"Efficient (non-) membership tree from multicollision-resistance with applications to zero-knowledge proofs","author":"Petkus","year":"2024","journal-title":"Cryptology ePrint Archive"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15985-5_13"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2003.1206214"},{"year":"2022","key":"ref13","article-title":"Systemization of knowledge: Zk-friendly hash functions"},{"key":"ref14","article-title":"Rescue-prime: a standard specification (sok)","author":"Szepieniec","year":"2020","journal-title":"Cryptology ePrint Archive"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38548-3_19"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560686"},{"key":"ref17","article-title":"zk-snarks: a gentle introduction","author":"Nitulescu","year":"2020","journal-title":"Ecole Normale Superieure"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484595"},{"key":"ref19","first-page":"1043","article-title":"Brakedown: Linear-time and post-quantum snarks for r1cs","volume":"2021","author":"Golovnev","year":"2021","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref20","article-title":"zktree: A zero-knowledge recursion tree with zkp membership proofs","author":"Deng","year":"2023","journal-title":"Cryptology ePrint Archive"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CAIBDA53561.2021.00026"},{"key":"ref22","first-page":"1025","article-title":"Hash functions monolith for zk applications: May the speed of sha-3 be with you","volume":"2023","author":"Grassi","year":"2023","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref23","first-page":"519","article-title":"Poseidon: A new hash function for {Zero-Knowledge} proof systems","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Grassi"},{"year":"2023","key":"ref24","article-title":"What\u2019s the deal with hash functions in zero knowledge?"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_7"},{"key":"ref26","article-title":"plookup: A simplified polynomial protocol for lookup tables","author":"Gabizon","year":"2020","journal-title":"Cryptology ePrint Archive"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03326-2_20"},{"article-title":"A review of zk-snarks","year":"2022","author":"Chen","key":"ref28"},{"key":"ref29","article-title":"GitHub - datenlord\/TRIDENT: A Hardware Implemented Poseidon Hasher \u2014 github.com"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.1145\/3676536.3676809","article-title":"Amaze: Accelerated mimc hardware architecture for zero-knowledge applications on the edge","volume-title":"2024 ACM\/IEEE International Conference on Computer-Aided Design (ICCAD)","author":"Ahmed"},{"article-title":"Zk hash bounties","year":"2024","author":"Bounties","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_22"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48116-5_23"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i3.194-220"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO61859.2024.00035"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1049\/el:19940949"},{"issue":"9","key":"ref37","article-title":"Sponge functions","volume-title":"ECRYPT hash workshop","volume":"2007","author":"Bertoni"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-71070-4_3"},{"year":"2021","key":"ref39","article-title":"Hash functions for zero-knowledge applications zoo"}],"event":{"name":"2025 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)","start":{"date-parts":[[2025,10,26]]},"location":"Munich, Germany","end":{"date-parts":[[2025,10,30]]}},"container-title":["2025 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11240608\/11240621\/11240995.pdf?arnumber=11240995","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T05:47:18Z","timestamp":1763704038000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11240995\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,26]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/iccad66269.2025.11240995","relation":{},"subject":[],"published":{"date-parts":[[2025,10,26]]}}}