skip to content
Authenticated Encryption Zoo
User Tools
Login
Site Tools
Tools
Show pagesource
Old revisions
Backlinks
Recent changes
Media Manager
Sitemap
Login
Recent changes
Media Manager
Sitemap
Trace:
•
panda
Sidebar
Navigation
AE Zoo frontpage
About the Zoo
Zoo guidelines
References
External links
The CAESAR competition
Google newsgroup
panda
This is an old revision of the document!
Table of Contents
PANDA
The Algorithm
Cryptanalysis
PANDA
The Algorithm
Author(s): Dingfeng Ye, Peng Wang, Lei Hu, Liping Wang, Yonghong Xie, Siwei Sun, Ping Wang
CAESAR submission:
PANDA
Location
Cryptanalysis
Type
Queries
Data
Computations
Memory
Reference
Comment
Forgery
2
$2^{64}$
Sasaki and Wang
1)
PANDA-s
State recovery
$134$ KP
$2^{41}$
2
GB
Feng, Zhang and Wang
2)
PANDA-s
Forgery
$134$ KP
$2^{41}$
2
GB
Feng, Zhang and Wang
3)
PANDA-s
1)
A Forgery Attack against PANDA-s
2)
,
3)
A practical forgery and state recovery attack on the authenticated cipher PANDA-s
panda.1400145214.txt.gz
· Last modified: 15/05/2014 09:13:34 by
mmeh
Page Tools
Show pagesource
Old revisions
Backlinks
Back to top