User Tools

Site Tools


refnotes:caesar

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Next revision Both sides next revision
refnotes:caesar [17/03/2014 12:01:39]
stek [References]
refnotes:caesar [18/02/2015 15:16:40]
mmeh
Line 1: Line 1:
 ====== References ====== ====== References ======
  
-On this page you can define commonly used notes for [[doku>​plugin:​refnotes|RefNotes plugin]]Every note is defined as collection of data //fields//. There are number of ways to organize the note definitions:​+This page contains references to published third-party analysis.
  
-  * Group a number ​of notes into single data table (//sheet//)The first row of the table is used to specify which field the corresponding column contains+<code bibtex>​ 
-  ​* Use separate table for each note (//card//)The table should have two columns where the first column is used to specify the field names+@misc{:​ref:​caesar:​screamWeakKeys,​ 
-  * Define notes using [[wp>BibTeX]] syntax. BibTeX entries have to be wrapped into a ''​<​code>​''​ sectionThe key of BibTeX entry serves as name of the note. The namespace can be either specified as part of the key or in a separate comment (see example below) for all entries that follow+    author = {Gregor Leander and Brice Minaud and Sondre Rønjom}, 
-  * Store one note per page as [[doku>plugin:data|Data plugin]] entryThis way the notes are stored in a databasewhich allows to make queries against ​the bibliography datafor examplesee all books of a certain ​author. ​Unfortunately Data plugin allows only one ''​dataentry''​ section per page.+    title = {A Generic Approach to Invariant Subspace Attacks: Cryptanalysis ​of Robin, iSCREAM and Zorro}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2015/068}, 
 +    year = {2015}, 
 +    note = {\url{http://eprint.iacr.org/}}, 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​marble-forgery,​ 
 +  TITLE = {{Forgery and Key-Recovery Attacks on CAESAR Candidate Marble}}, 
 +  AUTHOR = {Fuhr, Thomas and Leurent, Ga{\"​e}tan and Suder, Valentin},​ 
 +  URL = {https://​hal.inria.fr/​hal-01102031},​ 
 +  YEAR = {2015}, 
 +  MONTH = Jan, 
 +  KEYWORDS = {forgery ; Marble ; key-recovery ; CAESAR competition ; authenticated encryption},​ 
 +  HAL_ID = {hal-01102031},​ 
 +  HAL_VERSION = {v2}, 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​lu-copa,​ 
 +    author = {Jiqiang Lu}, 
 +    title = {On the Security ​of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2015/​079},​ 
 +    year = {2015}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​asconIaik,​ 
 +  title = {Cryptanalysis of {Ascon}}, 
 +  author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl\"​{a}ffer},​ 
 +  howpublished = {Cryptology ePrint Archive, Report 2015/030; extended version of CT-RSA 2015}, 
 +  year = {2015}, 
 +  note = {\url{http://eprint.iacr.org/2015/030}}, 
 +  url = "​http://​eprint.iacr.org/​2015/​030",​ 
 +
 +</code> 
 +<​code ​bibtex> 
 +@unpublished{:​ref:​caesar:​leurenthal01017048,​ 
 +  TITLE = {{Differential Forgery Attack against LAC}}, 
 +  AUTHOR = {Leurent, Ga{\"​e}tan},​ 
 +  URL = {https://​hal.inria.fr/​hal-01017048},​ 
 +  NOTE = {Presented at DIAC 2014}, 
 +  YEAR = {2014}, 
 +  MONTH = Jul, 
 +  HAL_ID = {hal-01017048},​ 
 +  HAL_VERSION = {v1}, 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2014931,​ 
 +    author = {Thomas Peyrin and Siang Meng Sim and Lei Wang and Guoyan Zhang}, 
 +    title = {Cryptanalysis ​of JAMBU}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​931},​ 
 +    year = {2014}, 
 +    ​note = {\url{http://​eprint.iacr.org/}}, 
 +
 +</code> 
 +<code bibtex>​ 
 +@misc{:ref:​caesar:​cryptoeprint2014251,​ 
 +    author = {Guy Barwell}, 
 +    title = {Forgery on Stateless CMCC}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​251},​ 
 +    year = {2014}, 
 +    note = {\url{http://​eprint.iacr.org/}}, 
 +    url = "​http://​eprint.iacr.org/​2014/​251"​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​sablierFeng,​ 
 +    author = {Xiutao Feng and Fan Zhang}, 
 +    title = {A practical state recovery attack on the stream cipher Sablier v1} 
 +    url = "​http://​www.amss.ac.cn/​xwdt/​kydt/​201404/​t20140409_4087622.html"​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2014226, 
 +    author = {Mohamed Ahmed Abdelraheem and Andrey Bogdanov and Elmar Tischhauser}, 
 +    title = {Weak-Key Analysis ​of POET}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​226},​ 
 +    year = {2014}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +    url = "​http://​eprint.iacr.org/​2014/​226"​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2014325,​ 
 +    ​author ​= {Xiutao FENG, Fan ZHANG and Hui WANG}, 
 +    title = {A practical forgery and state recovery attack on the authenticated cipher PANDA-s}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​325},​ 
 +    year = {2014}, 
 +    note = {\url{http://​eprint.iacr.org/}}, 
 +    url = "​http://​eprint.iacr.org/​2014/​325"​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​screamForgerySimWang,​ 
 +    author = {Siang Meng Sim and Lei Wang}, 
 +    title = {Practical Forgery Attacks on SCREAM and iSCREAM}, 
 +    year = {2014}, 
 +    note = {\url{http://​www1.spms.ntu.edu.sg/​~syllab/​m/​images/​b/​b3/​ForgeryAttackonSCREAM.pdf}},​ 
 +    url = "​http://​www1.spms.ntu.edu.sg/​~syllab/​m/​images/​b/​b3/​ForgeryAttackonSCREAM.pdf"​ 
 +
 +</​code>​
  
-For sheets and cards plugin does not make a distinction between normal table cells and header cellsThe field name cells are identified only based on their contentThe names are case insensitive and can also be specified using locale-specific labelsBibTeX and ''​dataentry''​ sections support only field namesThe full list of field names is provided in [[doku>plugin:​refnotes:​refdb|reference database documentation]].+<code bibtex>​ 
 +@misc{:​ref:​caesar:​piCipherLeurent,​ 
 +    author = {Gaëtan Leurent}, 
 +    title = {Tag Second-preimage Attack against π-cipher},​ 
 +    year = {2014}, 
 +    note = {\url{http://​hal.inria.fr/hal-00966794}},​ 
 +    url = "​http://​hal.inria.fr/​hal-00966794"​ 
 +
 +</code>
  
 +<code bibtex>
 +@misc{:​ref:​caesar:​cryptoeprint2014217,​
 +    author = {Yu Sasaki and Lei Wang},
 +    title = {A Forgery Attack against PANDA-s},
 +    howpublished = {Cryptology ePrint Archive, Report 2014/217},
 +    year = {2014},
 +    note = {\url{http://​eprint.iacr.org/​}},​
 +    url = "​http://​eprint.iacr.org/​2014/​217"​
 +}
 +</​code>​
  
-===== Note sheet example =====+<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2014218,​ 
 +    author ​{Yu Sasaki and Lei Wang}, 
 +    title {A Practical Universal Forgery Attack against PAES-8}, 
 +    howpublished ​{Cryptology ePrint Archive, Report 2014/​218},​ 
 +    year {2014}, 
 +    note {\url{http://​eprint.iacr.org/​}},​ 
 +    url "​http://​eprint.iacr.org/​2014/​218"​ 
 +
 +</​code>​
  
-^  Note name  ^  Note text  ^ +<code bibtex> 
-:ref:sample1 | A sample reference. | +@misc{:ref:caesar:​paesJeanNicolic,​ 
-^ :​ref:​sample2 | A sample reference with //some// **formatting**. | +    ​author = {Jérémy Jean and Ivica Nikolić}, 
-^ :​ref:​sample3 | A sample reference with a [[http://www.dokuwiki.org/|link.]] | +    title = {Using AES Round Symmetries to Distinguish PAES}, 
- +    year = {2014}, 
- +    note = {\url{http://www1.spms.ntu.edu.sg/​~syllab/m/​images/​6/​6e/​Using_AES_Round_Symmetries_to_Distinguish_PAES.pdf}}, 
-===== Note card example ===== +    ​url ​"http://www1.spms.ntu.edu.sg/​~syllab/​m/images/6/​6e/​Using_AES_Round_Symmetries_to_Distinguish_PAES.pdf"​ 
- +} 
-^ Note name ^  :​ref:​knuth-aop-2 ​ ^ +</​code>​
-^ Author ​   | Donald Knuth | +
-^ Title     | The Art of Computer Programming,​ Volume 2: Seminumerical Algorithms | +
-^ Edition ​  | Third Edition | +
-^ Published | 1997 | +
-^ Publisher | Addison-Wesley | +
-^ Pages     | xiv + 762 pp. | +
-^ ISBN      | 0-201-89684-2 | +
-^ URL       ​| ​http://en.wikipedia.org/wiki/The_Art_of_Computer_Programming | +
- +
- +
-===== BibTeX example =====+
  
 <code bibtex> <code bibtex>
-@Comment{refnotes+@misc{:​ref:​caesar:​cryptoeprint2014197
-  ​namespace ​= "ref:prog"+    ​author = {Jian Guo and Jérémy Jean and Thomas Peyrin and Wang Lei}, 
 +    title = {Breaking POET Authentication with a Single Query}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​197},​ 
 +    year = {2014}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +    url = "http://​eprint.iacr.org/​2014/​197"
 } }
 +</​code>​
  
-@Book{GangOfFour+<code bibtex>​ 
-  author ​    ​"​Erich ​{Gamma} ​and Richard {Helm} ​and Ralph {Johnsonand John {Vlissides}"​+@misc{:​ref:​caesar:​keyrecoveryAVALANCHEv1
-  ​author-ref = "​Gamma,​ et al.",​ +    author = {Andrey Bogdanov ​and Martin M. Lauridsen ​and Elmar Tischhauser}, 
-  ​title      "​Design Patterns: Elements ​of Reusable Object-Oriented Software"​+    title = {Cryptanalysis ​of AVALANCHEv1}
-  ​publisher  ​"​Addison-Wesley"​+    ​year ​{2014}
-  ​year ​      1994+    ​howpublished ​{Cryptographic Competitions Mailing List}
-  ​address ​   ​= ​"​Reading,​ Mass."+    ​note {\url{http://​martinlauridsen.info/​pub/​avalanchev1.pdf}}
-  ​pages ​     = 395, +    url = "​http://​martinlauridsen.info/pub/avalanchev1.pdf"
-  isbn       = "​0-201-63361-2",​ +
-  ​url        = "​http://​en.wikipedia.org/wiki/Design_Patterns"+
 } }
 +</​code>​
  
-@Article{:ref:Knuth-LCE-1985+<code bibtex>​ 
-  ​author ​   ​= ​"​Donald Knuth"+@misc{:ref:caesar:​NandiCobraForgery
-  title     ​"​Deciphering a linear congruential encryption",​ +    ​author ​{Mridul Nandi}
-  journal ​  = "IEEE Transactions ​on Information Theory"​+    title = {Forging Attack ​on COBRA Mode}
-  ​volume ​   = "​31(1)",​ +    year = {2014}
-  ​year      1985+    ​howpublished ​{Cryptographic Competitions Mailing List}
-  ​month ​    "​Jan",​ +
-  publisher = "​IEEE",​ +
-  pages     = "​49-52",​ +
-  issn      = "​0018-9448",​ +
-  url       = "​http://​ieeexplore.ieee.org/​xpl/​articleDetails.jsp?​arnumber=1056997"​+
 } }
 </​code>​ </​code>​
  
-===== Dataentry example ===== +<​code ​bibtex
- +@misc{:ref:caesar:wheestInria,​ 
-The dataentry below is wrapped into ''​<​code>​''​ section to be properly presented in absence of [[doku>​plugin:​data|Data plugin]]. +    ​author = {Anne Canteaut and Gaëtan Leurent}
- +    title = {Distinguishing and Key-recovery Attacks against Wheesht}, 
-<​code>​ +    year = {2014}, 
----- dataentry refnotes ---- +    ​howpublished = {Cryptographic Competitions Mailing List} 
-note-name : :ref:prog:Hunt&​Thomas(1999) +}
-authors ​  : Andrew HuntDavid Thomas +
-title     : The Pragmatic Programmer: From Journeyman to Master +
-published : 1999 +
-publisher : Addison-Wesley Professional +
-pages     : 352 +
-isbn      : 0-201-61622-X +
-url       : http://​en.wikipedia.org/​wiki/​The_Pragmatic_Programmer +
-----+
 </​code>​ </​code>​
  
-====== References ====== 
- 
-This page contains references to all third party cryptanalysis. 
  
 <code bibtex> <code bibtex>
-@misc{ref:​caesar:​cryptoeprint:​2014:​197+@misc{:ref:caesar:CalicoForgeryIaik
-    author = {Jian Guo and Jérémy Jean and Thomas Peyrin ​and Wang Lei}, +    author = {Christoph Dobraunig ​and Maria Eichlseder ​and Florian Mendel ​and Martin Schl\"{a}ffer}, 
-    title = {Breaking POET Authentication with Single Query}, +    ​title = {Forgery and Key Recovery Attacks on Calico},
-    ​howpublished ​= {Cryptology ePrint Archive, Report 2014/197},+
     year = {2014},     year = {2014},
-    note = {\url{http://​eprint.iacr.org/}},+    ​howpublished = {Cryptographic Competitions Mailing List}, 
 +    ​note = {\url{http://​ascon.iaik.tugraz.at/files/​analysis_calico.pdf}}, 
 +    url = "​http://​ascon.iaik.tugraz.at/​files/​analysis_calico.pdf"​
 } }
 </​code>​ </​code>​
  
refnotes/caesar.txt · Last modified: 24/03/2015 10:37:50 by mmeh