User Tools

Site Tools


refnotes:caesar

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
Next revision Both sides next revision
refnotes:caesar [17/03/2014 11:57:15]
stek created
refnotes:caesar [24/03/2015 09:51:43]
mmeh
Line 1: Line 1:
 ====== References ====== ====== References ======
  
-On this page you can define commonly used notes for [[doku>​plugin:​refnotes|RefNotes plugin]]Every note is defined as collection of data //fields//. There are number of ways to organize the note definitions:​+This page contains references to published third-party analysis.
  
-  * Group a number of notes into single data table (//​sheet//​). The first row of the table is used to specify which field the corresponding column contains. +<​code ​bibtex
-  * Use separate table for each note (//card//). The table should have two columns where the first column is used to specify the field names. +@incollection{:ref:​caesar:​todo-aoki-proest,​ 
-  * Define notes using [[wp>​BibTeX]] syntax. BibTeX entries have to be wrapped into a ''​<​code>​''​ section. The key of BibTeX entry serves as name of the note. The namespace can be either specified as part of the key or in a separate comment (see example below) for all entries that follow. +year={2014},​ 
-  * Store one note per page as [[doku>​plugin:data|Data plugin]] entry. This way the notes are stored ​in a databasewhich allows to make queries against the bibliography data, for examplesee all books of a certain authorUnfortunately Data plugin allows only one ''​dataentry''​ section per page.+isbn={978-3-319-12279-3},​ 
 +booktitle={Cryptology and Network Security},​ 
 +volume={8813},​ 
 +series={Lecture Notes in Computer Science}, 
 +editor={GritzalisDimitris and Kiayias, Aggelos and Askoxylakis,​ Ioannis}, 
 +doi={10.1007/​978-3-319-12280-9_5},​ 
 +title={FFT Key Recovery ​for Integral Attack}, 
 +url={http://​dx.doi.org/​10.1007/​978-3-319-12280-9_5},​ 
 +publisher={Springer International Publishing},​ 
 +keywords={Block cipher; Integral attack; Fast Fourier Transform; Fast Walsh-Hadamard Transform; Prøst; CLEFIA; AES}, 
 +author={Todo,​ Yosuke and Aoki, Kazumaro},​ 
 +pages={64-81},​ 
 +language={English} 
 +
 +</​code>​
  
-For sheets ​and cards plugin does not make a distinction between normal table cells and header cells. The field name cells are identified only based on their content. The names are case insensitive ​and can also be specified using locale-specific labelsBibTeX and ''​dataentry''​ sections support only field namesThe full list of field names is provided in [[doku>plugin:​refnotes:​refdb|reference database documentation]].+<code bibtex>​ 
 +@misc{:​ref:​caesar:​screamWeakKeys,​ 
 +    author = {Gregor Leander ​and Brice Minaud ​and Sondre Rønjom}, 
 +    title = {A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM ​and Zorro}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2015/​068},​ 
 +    year = {2015}, 
 +    note = {\url{http://​eprint.iacr.org/}}, 
 +
 +</code>
  
 +<code bibtex>
 +@misc{:​ref:​caesar:​marble-forgery,​
 +  TITLE = {{Forgery and Key-Recovery Attacks on CAESAR Candidate Marble}},
 +  AUTHOR = {Fuhr, Thomas and Leurent, Ga{\"​e}tan and Suder, Valentin},
 +  URL = {https://​hal.inria.fr/​hal-01102031},​
 +  YEAR = {2015},
 +  MONTH = Jan,
 +  KEYWORDS = {forgery ; Marble ; key-recovery ; CAESAR competition ; authenticated encryption},​
 +  HAL_ID = {hal-01102031},​
 +  HAL_VERSION = {v2},
 +}
 +</​code>​
 +<code bibtex>
 +@misc{:​ref:​caesar:​lu-copa,​
 +    author = {Jiqiang Lu},
 +    title = {On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack},
 +    howpublished = {Cryptology ePrint Archive, Report 2015/079},
 +    year = {2015},
 +    note = {\url{http://​eprint.iacr.org/​}},​
 +}
 +</​code>​
 +<code bibtex>
 +@misc{:​ref:​caesar:​asconIaik,​
 +  title = {Cryptanalysis of {Ascon}},
 +  author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl\"​{a}ffer},​
 +  howpublished = {Cryptology ePrint Archive, Report 2015/030; extended version of CT-RSA 2015},
 +  year = {2015},
 +  note = {\url{http://​eprint.iacr.org/​2015/​030}},​
 +  url = "​http://​eprint.iacr.org/​2015/​030",​
 +}
 +</​code>​
 +<code bibtex>
 +@unpublished{:​ref:​caesar:​leurenthal01017048,​
 +  TITLE = {{Differential Forgery Attack against LAC}},
 +  AUTHOR = {Leurent, Ga{\"​e}tan},​
 +  URL = {https://​hal.inria.fr/​hal-01017048},​
 +  NOTE = {Presented at DIAC 2014},
 +  YEAR = {2014},
 +  MONTH = Jul,
 +  HAL_ID = {hal-01017048},​
 +  HAL_VERSION = {v1},
 +}
 +</​code>​
 +<code bibtex>
 +@misc{:​ref:​caesar:​cryptoeprint2014931,​
 +    author = {Thomas Peyrin and Siang Meng Sim and Lei Wang and Guoyan Zhang},
 +    title = {Cryptanalysis of JAMBU},
 +    howpublished = {Cryptology ePrint Archive, Report 2014/931},
 +    year = {2014},
 +    note = {\url{http://​eprint.iacr.org/​}},​
 +}
 +</​code>​
 +<code bibtex>
 +@misc{:​ref:​caesar:​cryptoeprint2014251,​
 +    author = {Guy Barwell},
 +    title = {Forgery on Stateless CMCC},
 +    howpublished = {Cryptology ePrint Archive, Report 2014/251},
 +    year = {2014},
 +    note = {\url{http://​eprint.iacr.org/​}},​
 +    url = "​http://​eprint.iacr.org/​2014/​251"​
 +}
 +</​code>​
 +<code bibtex>
 +@misc{:​ref:​caesar:​sablierFeng,​
 +    author = {Xiutao Feng and Fan Zhang},
 +    title = {A practical state recovery attack on the stream cipher Sablier v1}
 +    url = "​http://​www.amss.ac.cn/​xwdt/​kydt/​201404/​t20140409_4087622.html"​
 +}
 +</​code>​
 +<code bibtex>
 +@misc{:​ref:​caesar:​cryptoeprint2014226,​
 +    author = {Mohamed Ahmed Abdelraheem and Andrey Bogdanov and Elmar Tischhauser},​
 +    title = {Weak-Key Analysis of POET},
 +    howpublished = {Cryptology ePrint Archive, Report 2014/226},
 +    year = {2014},
 +    note = {\url{http://​eprint.iacr.org/​}},​
 +    url = "​http://​eprint.iacr.org/​2014/​226"​
 +}
 +</​code>​
 +<code bibtex>
 +@misc{:​ref:​caesar:​cryptoeprint2014325,​
 +    author = {Xiutao FENG, Fan ZHANG and Hui WANG},
 +    title = {A practical forgery and state recovery attack on the authenticated cipher PANDA-s},
 +    howpublished = {Cryptology ePrint Archive, Report 2014/325},
 +    year = {2014},
 +    note = {\url{http://​eprint.iacr.org/​}},​
 +    url = "​http://​eprint.iacr.org/​2014/​325"​
 +}
 +</​code>​
 +<code bibtex>
 +@misc{:​ref:​caesar:​screamForgerySimWang,​
 +    author = {Siang Meng Sim and Lei Wang},
 +    title = {Practical Forgery Attacks on SCREAM and iSCREAM},
 +    year = {2014},
 +    note = {\url{http://​www1.spms.ntu.edu.sg/​~syllab/​m/​images/​b/​b3/​ForgeryAttackonSCREAM.pdf}},​
 +    url = "​http://​www1.spms.ntu.edu.sg/​~syllab/​m/​images/​b/​b3/​ForgeryAttackonSCREAM.pdf"​
 +}
 +</​code>​
  
-===== Note sheet example =====+<code bibtex>​ 
 +@misc{:​ref:​caesar:​piCipherLeurent,​ 
 +    author ​{Gaëtan Leurent}, 
 +    title {Tag Second-preimage Attack against π-cipher},​ 
 +    year {2014}, 
 +    note {\url{http://​hal.inria.fr/​hal-00966794}},​ 
 +    url "​http://​hal.inria.fr/​hal-00966794"​ 
 +
 +</​code>​
  
-^  Note name  ^  Note text  ^ +<code bibtex> 
-:ref:sample1 | sample reference. | +@misc{:ref:caesar:​cryptoeprint2014217,​ 
-:ref:sample2 | A sample reference with //some// **formatting**| +    author = {Yu Sasaki and Lei Wang}, 
-^ :​ref:​sample3 | A sample reference with a [[http://www.dokuwiki.org/|link.]] |+    title = {Forgery Attack against PANDA-s}, 
 +    ​howpublished = {Cryptology ePrint Archive, Report 2014/​217},​ 
 +    year = {2014}, 
 +    note = {\url{http://eprint.iacr.org/​}},​ 
 +    url = "http://eprint.iacr.org/2014/​217"​ 
 +
 +</​code>​
  
 +<code bibtex>
 +@misc{:​ref:​caesar:​cryptoeprint2014218,​
 +    author = {Yu Sasaki and Lei Wang},
 +    title = {A Practical Universal Forgery Attack against PAES-8},
 +    howpublished = {Cryptology ePrint Archive, Report 2014/218},
 +    year = {2014},
 +    note = {\url{http://​eprint.iacr.org/​}},​
 +    url = "​http://​eprint.iacr.org/​2014/​218"​
 +}
 +</​code>​
  
-===== Note card example ===== +<code bibtex> 
- +@misc{:ref:caesar:​paesJeanNicolic,​ 
-^ Note name ^  ​:ref:knuth-aop-2 ​ ^ +    ​author = {Jérémy Jean and Ivica Nikolić}, 
-^ Author ​   | Donald Knuth | +    title = {Using AES Round Symmetries to Distinguish PAES}
-^ Title     | The Art of Computer ProgrammingVolume 2: Seminumerical Algorithms | +    year = {2014}, 
-^ Edition ​  | Third Edition | +    note = {\url{http://​www1.spms.ntu.edu.sg/​~syllab/​m/​images/​6/​6e/​Using_AES_Round_Symmetries_to_Distinguish_PAES.pdf}},​ 
-^ Published | 1997 | +    url = "http://www1.spms.ntu.edu.sg/~syllab/m/​images/​6/​6e/​Using_AES_Round_Symmetries_to_Distinguish_PAES.pdf"​ 
-^ Publisher | Addison-Wesley | +} 
-^ Pages     | xiv + 762 pp| +</​code>​
-^ ISBN      | 0-201-89684-2 | +
-^ URL       ​| ​http://en.wikipedia.org/wiki/The_Art_of_Computer_Programming | +
- +
- +
-===== BibTeX example =====+
  
 <code bibtex> <code bibtex>
-@Comment{refnotes+@misc{:​ref:​caesar:​cryptoeprint2014197
-  ​namespace ​= "ref:prog"+    ​author = {Jian Guo and Jérémy Jean and Thomas Peyrin and Wang Lei}, 
 +    title = {Breaking POET Authentication with a Single Query}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​197},​ 
 +    year = {2014}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +    url = "http://​eprint.iacr.org/​2014/​197"
 } }
 +</​code>​
  
-@Book{GangOfFour+<code bibtex>​ 
-  author ​    ​"​Erich ​{Gamma} ​and Richard {Helm} ​and Ralph {Johnsonand John {Vlissides}"​+@misc{:​ref:​caesar:​keyrecoveryAVALANCHEv1
-  ​author-ref = "​Gamma,​ et al.",​ +    author = {Andrey Bogdanov ​and Martin M. Lauridsen ​and Elmar Tischhauser}, 
-  ​title      "​Design Patterns: Elements ​of Reusable Object-Oriented Software"​+    title = {Cryptanalysis ​of AVALANCHEv1}
-  ​publisher  ​"​Addison-Wesley"​+    ​year ​{2014}
-  ​year ​      1994+    ​howpublished ​{Cryptographic Competitions Mailing List}
-  ​address ​   ​= ​"​Reading,​ Mass."+    ​note {\url{http://​martinlauridsen.info/​pub/​avalanchev1.pdf}}
-  ​pages ​     = 395, +    url = "​http://​martinlauridsen.info/pub/avalanchev1.pdf"
-  isbn       = "​0-201-63361-2",​ +
-  ​url        = "​http://​en.wikipedia.org/wiki/Design_Patterns"+
 } }
 +</​code>​
  
-@Article{:ref:Knuth-LCE-1985+<code bibtex>​ 
-  ​author ​   ​= ​"​Donald Knuth"+@misc{:ref:caesar:​NandiCobraForgery
-  title     ​"​Deciphering a linear congruential encryption",​ +    ​author ​{Mridul Nandi}
-  journal ​  = "IEEE Transactions ​on Information Theory"​+    title = {Forging Attack ​on COBRA Mode}
-  ​volume ​   = "​31(1)",​ +    year = {2014}
-  ​year      1985+    ​howpublished ​{Cryptographic Competitions Mailing List}
-  ​month ​    "​Jan",​ +
-  publisher = "​IEEE",​ +
-  pages     = "​49-52",​ +
-  issn      = "​0018-9448",​ +
-  url       = "​http://​ieeexplore.ieee.org/​xpl/​articleDetails.jsp?​arnumber=1056997"​+
 } }
 </​code>​ </​code>​
  
-===== Dataentry example ===== +<​code ​bibtex
- +@misc{:ref:caesar:wheestInria,​ 
-The dataentry below is wrapped into ''​<​code>​''​ section to be properly presented in absence of [[doku>​plugin:​data|Data plugin]]. +    ​author = {Anne Canteaut and Gaëtan Leurent}
- +    title = {Distinguishing and Key-recovery Attacks against Wheesht}, 
-<​code>​ +    year = {2014}, 
----- dataentry refnotes ---- +    ​howpublished = {Cryptographic Competitions Mailing List} 
-note-name : :ref:prog:Hunt&​Thomas(1999) +}
-authors ​  : Andrew HuntDavid Thomas +
-title     : The Pragmatic Programmer: From Journeyman to Master +
-published : 1999 +
-publisher : Addison-Wesley Professional +
-pages     : 352 +
-isbn      : 0-201-61622-X +
-url       : http://​en.wikipedia.org/​wiki/​The_Pragmatic_Programmer +
-----+
 </​code>​ </​code>​
  
-====== References ====== 
- 
-This page contains references to all third party cryptanalysis. 
  
 <code bibtex> <code bibtex>
-@misc{:refnotes:cryptoeprint:2014:197+@misc{:ref:caesar:CalicoForgeryIaik
-    author = {Jian Guo and Jérémy Jean and Thomas Peyrin ​and Wang Lei}, +    author = {Christoph Dobraunig ​and Maria Eichlseder ​and Florian Mendel ​and Martin Schl\"{a}ffer}, 
-    title = {Breaking POET Authentication with Single Query}, +    ​title = {Forgery and Key Recovery Attacks on Calico},
-    ​howpublished ​= {Cryptology ePrint Archive, Report 2014/197},+
     year = {2014},     year = {2014},
-    note = {\url{http://​eprint.iacr.org/}},+    ​howpublished = {Cryptographic Competitions Mailing List}, 
 +    ​note = {\url{http://​ascon.iaik.tugraz.at/files/​analysis_calico.pdf}}, 
 +    url = "​http://​ascon.iaik.tugraz.at/​files/​analysis_calico.pdf"​
 } }
 </​code>​ </​code>​
  
refnotes/caesar.txt · Last modified: 24/03/2015 10:37:50 by mmeh