User Tools

Site Tools


π-cipher

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Last revision Both sides next revision
π-cipher [29/04/2014 12:20:18]
stek [The Algorithm]
π-cipher [15/12/2014 12:35:31]
mmeh [Cryptanalysis]
Line 12: Line 12:
 | Tag second-preimage attack, $\omega = 32$ | $2^{16}$ | $2^{15}$ | $2^{31}$ | Leurent [(:​ref:​caesar:​piCipherLeurent)] | | Tag second-preimage attack, $\omega = 32$ | $2^{16}$ | $2^{15}$ | $2^{31}$ | Leurent [(:​ref:​caesar:​piCipherLeurent)] |
 | Tag second-preimage attack, $\omega = 64$ | $2^{22}$ | $2^{23}$ | $2^{45}$ | Leurent [(:​ref:​caesar:​piCipherLeurent)] | | Tag second-preimage attack, $\omega = 64$ | $2^{22}$ | $2^{23}$ | $2^{45}$ | Leurent [(:​ref:​caesar:​piCipherLeurent)] |
 +| Forgery due to padding weakness | | | | Fuhr and Leurent on [[https://​groups.google.com/​forum/#​!topic/​crypto-competitions/​5pLxzTpfc8Q|Cryptographic Competitions]] |
 ~~REFNOTES~~ ~~REFNOTES~~
  
π-cipher.txt · Last modified: 15/12/2014 12:36:40 by mmeh