This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | Last revision Both sides next revision | ||
π-cipher [29/04/2014 12:20:18] stek [The Algorithm] |
π-cipher [15/12/2014 12:35:31] mmeh [Cryptanalysis] |
||
---|---|---|---|
Line 12: | Line 12: | ||
| Tag second-preimage attack, $\omega = 32$ | $2^{16}$ | $2^{15}$ | $2^{31}$ | Leurent [(:ref:caesar:piCipherLeurent)] | | | Tag second-preimage attack, $\omega = 32$ | $2^{16}$ | $2^{15}$ | $2^{31}$ | Leurent [(:ref:caesar:piCipherLeurent)] | | ||
| Tag second-preimage attack, $\omega = 64$ | $2^{22}$ | $2^{23}$ | $2^{45}$ | Leurent [(:ref:caesar:piCipherLeurent)] | | | Tag second-preimage attack, $\omega = 64$ | $2^{22}$ | $2^{23}$ | $2^{45}$ | Leurent [(:ref:caesar:piCipherLeurent)] | | ||
+ | | Forgery due to padding weakness | | | | Fuhr and Leurent on [[https://groups.google.com/forum/#!topic/crypto-competitions/5pLxzTpfc8Q|Cryptographic Competitions]] | | ||
~~REFNOTES~~ | ~~REFNOTES~~ | ||