This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
calico [17/03/2014 12:28:42] stek created |
calico [29/04/2014 11:44:48] stek [The Algorithm] |
||
---|---|---|---|
Line 4: | Line 4: | ||
* Author(s): Christopher Taylor | * Author(s): Christopher Taylor | ||
* CAESAR submission: [[http://competitions.cr.yp.to/round1/calicov8.pdf|Calico]] | * CAESAR submission: [[http://competitions.cr.yp.to/round1/calicov8.pdf|Calico]] | ||
+ | * [[https://maps.google.com/maps?q=37.384617,-122.082682&num=1&t=m&z=13|Location]] | ||
===== Cryptanalysis ===== | ===== Cryptanalysis ===== | ||
+ | ^ Type ^ Nonce ^ Queries ^ Data ^ Time ^ Success probability ^ Reference ^ | ||
+ | | Forgery | | $1$ | | $1$ | $1$ | Dobraunig, Eichlseder, Mendel and Schläffer [(:ref:caesar:CalicoForgeryIaik)] [[https://groups.google.com/forum/#!topic/crypto-competitions/dxOid6p4MKg|(newsgroup link)]] | | ||
+ | | MAC key recovery | Respecting | $2^N$, $N \leq 64$ | $2^{128-N}$ | $2^{128-N}$ | $1$ | Dobraunig, Eichlseder, Mendel and Schläffer [(:ref:caesar:CalicoForgeryIaik)] [[https://groups.google.com/forum/#!topic/crypto-competitions/dxOid6p4MKg|(newsgroup link)]] | | ||
+ | |||
+ | ~~REFNOTES~~ | ||