User Tools

Site Tools


poet

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
poet [17/03/2014 12:04:36]
stek
poet [15/12/2014 13:14:50] (current)
mmeh [The Algorithm]
Line 3: Line 3:
 ===== The Algorithm ===== ===== The Algorithm =====
   * Author(s): Farzaneh Abed, Scott Fluhrer, John Foley, Christian Forler, Eik List, Stefan Lucks, David McGrew, Jakob Wenzel   * Author(s): Farzaneh Abed, Scott Fluhrer, John Foley, Christian Forler, Eik List, Stefan Lucks, David McGrew, Jakob Wenzel
 +  * FSE 2014 Pre-proceedings version only accessible to conference participants.  ​
   * CAESAR submission: [[http://​competitions.cr.yp.to/​round1/​poetv101.pdf|POET]]   * CAESAR submission: [[http://​competitions.cr.yp.to/​round1/​poetv101.pdf|POET]]
 +  * [[http://​competitions.cr.yp.to/​round1/​poet-ordering.txt|Proposal ordering]]
 +  * Most recent: [[http://​www.uni-weimar.de/​fileadmin/​user/​fak/​medien/​professuren/​Mediensicherheit/​Research/​Publications/​poet_v1.3.pdf|POET v 1.3]]
 +  * [[https://​maps.google.com/​maps?​q=50.975616,​11.329628&​num=1&​t=m&​z=17|Location]]
  
-Blablabal awtwa wat  +===== Notes ===== 
-===== Cryptanalysis ​=====+The proposal POET-G using polynomial hashing for the epsilon-AXU has been withdrawn following the attack by Abdelraheem et al.
  
-^ Type of Analysis ​Number of Queries ^ Reference ^ +===== Cryptanalysis ===== 
-Ciphertext ​Forgery | 1 | [(ref:​caesar:​poet)] +^ Type ^ Queries ^ Reference ​^ Comment ​
 +Forgery ​ | 1 | Guo, Jean, Peyrin and Lei[(ref:​caesar:​cryptoeprint2014197)] | Applied to FSE pre-proceedings version | 
 +| Weak-key analysis and universal forgery |  | Abdelraheem,​ Bogdanov and Tischhauser[(:​ref:​caesar:​cryptoeprint2014226)] | Applicable to POET-G |
  
 ~~REFNOTES~~ ~~REFNOTES~~
  
  
poet.1395057876.txt.gz · Last modified: 17/03/2014 12:04:36 by stek