====== References ======
This page contains references to published third-party analysis.
@misc{:ref:caesar:cryptoeprint2015212,
author = {Christof Beierle and Philipp Jovanovic and Martin M. Lauridsen and Gregor Leander and Christian Rechberger},
title = {Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows},
howpublished = {Cryptology ePrint Archive, Report 2015/212},
year = {2015},
note = {\url{http://eprint.iacr.org/}},
}
@misc{:ref:caesar:cryptoeprint2015134,
author = {Pierre Karpman},
title = {From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions},
howpublished = {Cryptology ePrint Archive, Report 2015/134},
year = {2015},
note = {\url{http://eprint.iacr.org/}},
}
@incollection{:ref:caesar:todoAokiProest,
year={2014},
isbn={978-3-319-12279-3},
booktitle={Cryptology and Network Security},
volume={8813},
series={Lecture Notes in Computer Science},
editor={Gritzalis, Dimitris and Kiayias, Aggelos and Askoxylakis, Ioannis},
doi={10.1007/978-3-319-12280-9_5},
title={FFT Key Recovery for Integral Attack},
url={http://dx.doi.org/10.1007/978-3-319-12280-9_5},
publisher={Springer International Publishing},
keywords={Block cipher; Integral attack; Fast Fourier Transform; Fast Walsh-Hadamard Transform; Prøst; CLEFIA; AES},
author={Todo, Yosuke and Aoki, Kazumaro},
pages={64-81},
language={English}
}
@misc{:ref:caesar:screamWeakKeys,
author = {Gregor Leander and Brice Minaud and Sondre Rønjom},
title = {A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro},
howpublished = {Cryptology ePrint Archive, Report 2015/068},
year = {2015},
note = {\url{http://eprint.iacr.org/}},
}
@misc{:ref:caesar:marble-forgery,
TITLE = {{Forgery and Key-Recovery Attacks on CAESAR Candidate Marble}},
AUTHOR = {Fuhr, Thomas and Leurent, Ga{\"e}tan and Suder, Valentin},
URL = {https://hal.inria.fr/hal-01102031},
YEAR = {2015},
MONTH = Jan,
KEYWORDS = {forgery ; Marble ; key-recovery ; CAESAR competition ; authenticated encryption},
HAL_ID = {hal-01102031},
HAL_VERSION = {v2},
}
@misc{:ref:caesar:lu-copa,
author = {Jiqiang Lu},
title = {On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack},
howpublished = {Cryptology ePrint Archive, Report 2015/079},
year = {2015},
note = {\url{http://eprint.iacr.org/}},
}
@misc{:ref:caesar:asconIaik,
title = {Cryptanalysis of {Ascon}},
author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl\"{a}ffer},
howpublished = {Cryptology ePrint Archive, Report 2015/030; extended version of CT-RSA 2015},
year = {2015},
note = {\url{http://eprint.iacr.org/2015/030}},
url = "http://eprint.iacr.org/2015/030",
}
@unpublished{:ref:caesar:leurenthal01017048,
TITLE = {{Differential Forgery Attack against LAC}},
AUTHOR = {Leurent, Ga{\"e}tan},
URL = {https://hal.inria.fr/hal-01017048},
NOTE = {Presented at DIAC 2014},
YEAR = {2014},
MONTH = Jul,
HAL_ID = {hal-01017048},
HAL_VERSION = {v1},
}
@misc{:ref:caesar:cryptoeprint2014931,
author = {Thomas Peyrin and Siang Meng Sim and Lei Wang and Guoyan Zhang},
title = {Cryptanalysis of JAMBU},
howpublished = {Cryptology ePrint Archive, Report 2014/931},
year = {2014},
note = {\url{http://eprint.iacr.org/}},
}
@misc{:ref:caesar:cryptoeprint2014251,
author = {Guy Barwell},
title = {Forgery on Stateless CMCC},
howpublished = {Cryptology ePrint Archive, Report 2014/251},
year = {2014},
note = {\url{http://eprint.iacr.org/}},
url = "http://eprint.iacr.org/2014/251"
}
@misc{:ref:caesar:sablierFeng,
author = {Xiutao Feng and Fan Zhang},
title = {A practical state recovery attack on the stream cipher Sablier v1}
url = "http://www.amss.ac.cn/xwdt/kydt/201404/t20140409_4087622.html"
}
@misc{:ref:caesar:cryptoeprint2014226,
author = {Mohamed Ahmed Abdelraheem and Andrey Bogdanov and Elmar Tischhauser},
title = {Weak-Key Analysis of POET},
howpublished = {Cryptology ePrint Archive, Report 2014/226},
year = {2014},
note = {\url{http://eprint.iacr.org/}},
url = "http://eprint.iacr.org/2014/226"
}
@misc{:ref:caesar:cryptoeprint2014325,
author = {Xiutao FENG, Fan ZHANG and Hui WANG},
title = {A practical forgery and state recovery attack on the authenticated cipher PANDA-s},
howpublished = {Cryptology ePrint Archive, Report 2014/325},
year = {2014},
note = {\url{http://eprint.iacr.org/}},
url = "http://eprint.iacr.org/2014/325"
}
@misc{:ref:caesar:screamForgerySimWang,
author = {Siang Meng Sim and Lei Wang},
title = {Practical Forgery Attacks on SCREAM and iSCREAM},
year = {2014},
note = {\url{http://www1.spms.ntu.edu.sg/~syllab/m/images/b/b3/ForgeryAttackonSCREAM.pdf}},
url = "http://www1.spms.ntu.edu.sg/~syllab/m/images/b/b3/ForgeryAttackonSCREAM.pdf"
}
@misc{:ref:caesar:piCipherLeurent,
author = {Gaëtan Leurent},
title = {Tag Second-preimage Attack against π-cipher},
year = {2014},
note = {\url{http://hal.inria.fr/hal-00966794}},
url = "http://hal.inria.fr/hal-00966794"
}
@misc{:ref:caesar:cryptoeprint2014217,
author = {Yu Sasaki and Lei Wang},
title = {A Forgery Attack against PANDA-s},
howpublished = {Cryptology ePrint Archive, Report 2014/217},
year = {2014},
note = {\url{http://eprint.iacr.org/}},
url = "http://eprint.iacr.org/2014/217"
}
@misc{:ref:caesar:cryptoeprint2014218,
author = {Yu Sasaki and Lei Wang},
title = {A Practical Universal Forgery Attack against PAES-8},
howpublished = {Cryptology ePrint Archive, Report 2014/218},
year = {2014},
note = {\url{http://eprint.iacr.org/}},
url = "http://eprint.iacr.org/2014/218"
}
@misc{:ref:caesar:paesJeanNicolic,
author = {Jérémy Jean and Ivica Nikolić},
title = {Using AES Round Symmetries to Distinguish PAES},
year = {2014},
note = {\url{http://www1.spms.ntu.edu.sg/~syllab/m/images/6/6e/Using_AES_Round_Symmetries_to_Distinguish_PAES.pdf}},
url = "http://www1.spms.ntu.edu.sg/~syllab/m/images/6/6e/Using_AES_Round_Symmetries_to_Distinguish_PAES.pdf"
}
@misc{:ref:caesar:cryptoeprint2014197,
author = {Jian Guo and Jérémy Jean and Thomas Peyrin and Wang Lei},
title = {Breaking POET Authentication with a Single Query},
howpublished = {Cryptology ePrint Archive, Report 2014/197},
year = {2014},
note = {\url{http://eprint.iacr.org/}},
url = "http://eprint.iacr.org/2014/197"
}
@misc{:ref:caesar:keyrecoveryAVALANCHEv1,
author = {Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser},
title = {Cryptanalysis of AVALANCHEv1},
year = {2014},
howpublished = {Cryptographic Competitions Mailing List},
note = {\url{http://martinlauridsen.info/pub/avalanchev1.pdf}},
url = "http://martinlauridsen.info/pub/avalanchev1.pdf"
}
@misc{:ref:caesar:NandiCobraForgery,
author = {Mridul Nandi},
title = {Forging Attack on COBRA Mode},
year = {2014},
howpublished = {Cryptographic Competitions Mailing List}
}
@misc{:ref:caesar:wheestInria,
author = {Anne Canteaut and Gaëtan Leurent},
title = {Distinguishing and Key-recovery Attacks against Wheesht},
year = {2014},
howpublished = {Cryptographic Competitions Mailing List}
}
@misc{:ref:caesar:CalicoForgeryIaik,
author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl\"{a}ffer},
title = {Forgery and Key Recovery Attacks on Calico},
year = {2014},
howpublished = {Cryptographic Competitions Mailing List},
note = {\url{http://ascon.iaik.tugraz.at/files/analysis_calico.pdf}},
url = "http://ascon.iaik.tugraz.at/files/analysis_calico.pdf"
}