Type | Target | Reference |
---|---|---|
Fault attack | APE-80 | Saha, Kuila and Chowdhury on mailing list |
Key-recovery | Reduced-round APE (core reduced to 8 rounds) | Minaud (external link) |
Chocolate-winning attack | APE | Rogaway (external link) |
Forgery | APE with variable-length nonces (not in specification!) | Wu and Tjuawinata on Cryptographic Competitions |