====== PRIMATEs ====== ===== The Algorithm ===== * Author(s): Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Florian Mendel, Bart Mennink, Nicky Mouha, Qingju Wang, Kan Yasuda * CAESAR submission: [[http://competitions.cr.yp.to/round1/primatesv1.pdf|PRIMATEs]] * [[http://competitions.cr.yp.to/round1/primates-ordering.txt|Proposal ordering]] * Web: [[http://primates.ae/|primates.ae]] * [[https://maps.google.com/maps?q=50.862243,+4.686151&num=1&t=m&z=18&iwloc=A|Location]] ===== Cryptanalysis ===== ^ Type ^ Target ^ Reference ^ | Fault attack | APE-80 | Saha, Kuila and Chowdhury [[https://groups.google.com/forum/#!topic/crypto-competitions/gpVX3DIlnSc|on mailing list]] | | Key-recovery | Reduced-round APE (core reduced to 8 rounds) | Minaud ([[https://drive.google.com/file/d/0Bxp3rqwoHZKhQ2s3WlZBZkJ5LUE/edit?pli=1|external link]]) | | Chocolate-winning attack | APE | Rogaway ([[http://web.cs.ucdavis.edu/~rogaway/beer.pdf|external link]]) | | Forgery | APE with variable-length nonces (not in specification!) | Wu and Tjuawinata on [[https://groups.google.com/forum/#!searchin/crypto-competitions/ape/crypto-competitions/I8A3EmytW6A/AdLJmywBHnAJ|Cryptographic Competitions]] |