This page contains references to published third-party analysis.
@misc{:ref:caesar:cryptoeprint2015212, author = {Christof Beierle and Philipp Jovanovic and Martin M. Lauridsen and Gregor Leander and Christian Rechberger}, title = {Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows}, howpublished = {Cryptology ePrint Archive, Report 2015/212}, year = {2015}, note = {\url{http://eprint.iacr.org/}}, }
@misc{:ref:caesar:cryptoeprint2015134, author = {Pierre Karpman}, title = {From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions}, howpublished = {Cryptology ePrint Archive, Report 2015/134}, year = {2015}, note = {\url{http://eprint.iacr.org/}}, }
@incollection{:ref:caesar:todoAokiProest, year={2014}, isbn={978-3-319-12279-3}, booktitle={Cryptology and Network Security}, volume={8813}, series={Lecture Notes in Computer Science}, editor={Gritzalis, Dimitris and Kiayias, Aggelos and Askoxylakis, Ioannis}, doi={10.1007/978-3-319-12280-9_5}, title={FFT Key Recovery for Integral Attack}, url={http://dx.doi.org/10.1007/978-3-319-12280-9_5}, publisher={Springer International Publishing}, keywords={Block cipher; Integral attack; Fast Fourier Transform; Fast Walsh-Hadamard Transform; Prøst; CLEFIA; AES}, author={Todo, Yosuke and Aoki, Kazumaro}, pages={64-81}, language={English} }
@misc{:ref:caesar:screamWeakKeys, author = {Gregor Leander and Brice Minaud and Sondre Rønjom}, title = {A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro}, howpublished = {Cryptology ePrint Archive, Report 2015/068}, year = {2015}, note = {\url{http://eprint.iacr.org/}}, }
@misc{:ref:caesar:marble-forgery, TITLE = {{Forgery and Key-Recovery Attacks on CAESAR Candidate Marble}}, AUTHOR = {Fuhr, Thomas and Leurent, Ga{\"e}tan and Suder, Valentin}, URL = {https://hal.inria.fr/hal-01102031}, YEAR = {2015}, MONTH = Jan, KEYWORDS = {forgery ; Marble ; key-recovery ; CAESAR competition ; authenticated encryption}, HAL_ID = {hal-01102031}, HAL_VERSION = {v2}, }
@misc{:ref:caesar:lu-copa, author = {Jiqiang Lu}, title = {On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack}, howpublished = {Cryptology ePrint Archive, Report 2015/079}, year = {2015}, note = {\url{http://eprint.iacr.org/}}, }
@misc{:ref:caesar:asconIaik, title = {Cryptanalysis of {Ascon}}, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl\"{a}ffer}, howpublished = {Cryptology ePrint Archive, Report 2015/030; extended version of CT-RSA 2015}, year = {2015}, note = {\url{http://eprint.iacr.org/2015/030}}, url = "http://eprint.iacr.org/2015/030", }
@unpublished{:ref:caesar:leurenthal01017048, TITLE = {{Differential Forgery Attack against LAC}}, AUTHOR = {Leurent, Ga{\"e}tan}, URL = {https://hal.inria.fr/hal-01017048}, NOTE = {Presented at DIAC 2014}, YEAR = {2014}, MONTH = Jul, HAL_ID = {hal-01017048}, HAL_VERSION = {v1}, }
@misc{:ref:caesar:cryptoeprint2014931, author = {Thomas Peyrin and Siang Meng Sim and Lei Wang and Guoyan Zhang}, title = {Cryptanalysis of JAMBU}, howpublished = {Cryptology ePrint Archive, Report 2014/931}, year = {2014}, note = {\url{http://eprint.iacr.org/}}, }
@misc{:ref:caesar:cryptoeprint2014251, author = {Guy Barwell}, title = {Forgery on Stateless CMCC}, howpublished = {Cryptology ePrint Archive, Report 2014/251}, year = {2014}, note = {\url{http://eprint.iacr.org/}}, url = "http://eprint.iacr.org/2014/251" }
@misc{:ref:caesar:sablierFeng, author = {Xiutao Feng and Fan Zhang}, title = {A practical state recovery attack on the stream cipher Sablier v1} url = "http://www.amss.ac.cn/xwdt/kydt/201404/t20140409_4087622.html" }
@misc{:ref:caesar:cryptoeprint2014226, author = {Mohamed Ahmed Abdelraheem and Andrey Bogdanov and Elmar Tischhauser}, title = {Weak-Key Analysis of POET}, howpublished = {Cryptology ePrint Archive, Report 2014/226}, year = {2014}, note = {\url{http://eprint.iacr.org/}}, url = "http://eprint.iacr.org/2014/226" }
@misc{:ref:caesar:cryptoeprint2014325, author = {Xiutao FENG, Fan ZHANG and Hui WANG}, title = {A practical forgery and state recovery attack on the authenticated cipher PANDA-s}, howpublished = {Cryptology ePrint Archive, Report 2014/325}, year = {2014}, note = {\url{http://eprint.iacr.org/}}, url = "http://eprint.iacr.org/2014/325" }
@misc{:ref:caesar:screamForgerySimWang, author = {Siang Meng Sim and Lei Wang}, title = {Practical Forgery Attacks on SCREAM and iSCREAM}, year = {2014}, note = {\url{http://www1.spms.ntu.edu.sg/~syllab/m/images/b/b3/ForgeryAttackonSCREAM.pdf}}, url = "http://www1.spms.ntu.edu.sg/~syllab/m/images/b/b3/ForgeryAttackonSCREAM.pdf" }
@misc{:ref:caesar:piCipherLeurent, author = {Gaëtan Leurent}, title = {Tag Second-preimage Attack against π-cipher}, year = {2014}, note = {\url{http://hal.inria.fr/hal-00966794}}, url = "http://hal.inria.fr/hal-00966794" }
@misc{:ref:caesar:cryptoeprint2014217, author = {Yu Sasaki and Lei Wang}, title = {A Forgery Attack against PANDA-s}, howpublished = {Cryptology ePrint Archive, Report 2014/217}, year = {2014}, note = {\url{http://eprint.iacr.org/}}, url = "http://eprint.iacr.org/2014/217" }
@misc{:ref:caesar:cryptoeprint2014218, author = {Yu Sasaki and Lei Wang}, title = {A Practical Universal Forgery Attack against PAES-8}, howpublished = {Cryptology ePrint Archive, Report 2014/218}, year = {2014}, note = {\url{http://eprint.iacr.org/}}, url = "http://eprint.iacr.org/2014/218" }
@misc{:ref:caesar:paesJeanNicolic, author = {Jérémy Jean and Ivica Nikolić}, title = {Using AES Round Symmetries to Distinguish PAES}, year = {2014}, note = {\url{http://www1.spms.ntu.edu.sg/~syllab/m/images/6/6e/Using_AES_Round_Symmetries_to_Distinguish_PAES.pdf}}, url = "http://www1.spms.ntu.edu.sg/~syllab/m/images/6/6e/Using_AES_Round_Symmetries_to_Distinguish_PAES.pdf" }
@misc{:ref:caesar:cryptoeprint2014197, author = {Jian Guo and Jérémy Jean and Thomas Peyrin and Wang Lei}, title = {Breaking POET Authentication with a Single Query}, howpublished = {Cryptology ePrint Archive, Report 2014/197}, year = {2014}, note = {\url{http://eprint.iacr.org/}}, url = "http://eprint.iacr.org/2014/197" }
@misc{:ref:caesar:keyrecoveryAVALANCHEv1, author = {Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser}, title = {Cryptanalysis of AVALANCHEv1}, year = {2014}, howpublished = {Cryptographic Competitions Mailing List}, note = {\url{http://martinlauridsen.info/pub/avalanchev1.pdf}}, url = "http://martinlauridsen.info/pub/avalanchev1.pdf" }
@misc{:ref:caesar:NandiCobraForgery, author = {Mridul Nandi}, title = {Forging Attack on COBRA Mode}, year = {2014}, howpublished = {Cryptographic Competitions Mailing List} }
@misc{:ref:caesar:wheestInria, author = {Anne Canteaut and Gaëtan Leurent}, title = {Distinguishing and Key-recovery Attacks against Wheesht}, year = {2014}, howpublished = {Cryptographic Competitions Mailing List} }
@misc{:ref:caesar:CalicoForgeryIaik, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl\"{a}ffer}, title = {Forgery and Key Recovery Attacks on Calico}, year = {2014}, howpublished = {Cryptographic Competitions Mailing List}, note = {\url{http://ascon.iaik.tugraz.at/files/analysis_calico.pdf}}, url = "http://ascon.iaik.tugraz.at/files/analysis_calico.pdf" }