User Tools

Site Tools


refnotes:caesar

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revision Both sides next revision
refnotes:caesar [17/03/2014 12:02:34]
stek [References]
refnotes:caesar [24/03/2015 10:37:04]
mmeh
Line 1: Line 1:
 ====== References ====== ====== References ======
  
-On this page you can define commonly used notes for [[doku>​plugin:​refnotes|RefNotes plugin]]Every note is defined as collection of data //fields//. There are number of ways to organize the note definitions:​+This page contains references to published third-party analysis.
  
-  * Group a number of notes into single data table (//​sheet//​). The first row of the table is used to specify which field the corresponding column contains+<code bibtex>​ 
-  * Use separate table for each note (//card//)The table should have two columns where the first column is used to specify the field names+@misc{:​ref:​caesar:​cryptoeprint2015212,​ 
-  * Define notes using [[wp>​BibTeX]] syntax. BibTeX entries have to be wrapped into a ''​<​code>​''​ section. The key of BibTeX entry serves as name of the note. The namespace can be either specified as part of the key or in a separate comment (see example below) for all entries that follow. +    author = {Christof Beierle and Philipp Jovanovic and Martin MLauridsen and Gregor Leander and Christian Rechberger},​ 
-  * Store one note per page as [[doku>​plugin:​data|Data plugin]] entry. This way the notes are stored in a database, which allows to make queries against the bibliography data, for example, see all books of a certain author. Unfortunately Data plugin allows only one ''​dataentry''​ section per page.+    title = {Analyzing Permutations ​for AES-like Ciphers: Understanding ShiftRows},​ 
 +    howpublished = {Cryptology ePrint Archive, Report 2015/​212},​ 
 +    year = {2015}, 
 +    ​note = {\url{http://eprint.iacr.org/}}, 
 +} 
 +</code>
  
-For sheets and cards plugin does not make a distinction between normal table cells and header cells. The field name cells are identified only based on their content. The names are case insensitive and can also be specified using locale-specific labelsBibTeX and ''​dataentry''​ sections support only field namesThe full list of field names is provided in [[doku>plugin:​refnotes:​refdb|reference database documentation]].+<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2015134,​ 
 +    author = {Pierre Karpman}, 
 +    title = {From Related-Key Distinguishers to Related-Key-Recovery ​on Even-Mansour Constructions},​ 
 +    howpublished = {Cryptology ePrint Archive, Report 2015/​134},​ 
 +    year = {2015}, 
 +    note = {\url{http://​eprint.iacr.org/}}, 
 +
 +</code>
  
 +<code bibtex>
 +@incollection{:​ref:​caesar:​todo-aoki-proest,​
 +year={2014},​
 +isbn={978-3-319-12279-3},​
 +booktitle={Cryptology and Network Security},
 +volume={8813},​
 +series={Lecture Notes in Computer Science},
 +editor={Gritzalis,​ Dimitris and Kiayias, Aggelos and Askoxylakis,​ Ioannis},
 +doi={10.1007/​978-3-319-12280-9_5},​
 +title={FFT Key Recovery for Integral Attack},
 +url={http://​dx.doi.org/​10.1007/​978-3-319-12280-9_5},​
 +publisher={Springer International Publishing},​
 +keywords={Block cipher; Integral attack; Fast Fourier Transform; Fast Walsh-Hadamard Transform; Prøst; CLEFIA; AES},
 +author={Todo,​ Yosuke and Aoki, Kazumaro},
 +pages={64-81},​
 +language={English}
 +}
 +</​code>​
  
-===== Note sheet example =====+<code bibtex>​ 
 +@misc{:​ref:​caesar:​screamWeakKeys,​ 
 +    author ​{Gregor Leander and Brice Minaud and Sondre Rønjom}, 
 +    title {A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro}, 
 +    howpublished ​{Cryptology ePrint Archive, Report 2015/​068},​ 
 +    year {2015}, 
 +    note {\url{http://​eprint.iacr.org/​}},​ 
 +
 +</​code>​
  
- Note name   Note text  ^ +<code bibtex>​ 
-:ref:sample1 | A sample reference| +@misc{:​ref:​caesar:​marble-forgery,​ 
-:ref:sample2 | A sample reference with //some// **formatting**| +  TITLE = {{Forgery and Key-Recovery Attacks on CAESAR Candidate Marble}}, 
-:ref:sample3 | sample reference with a [[http://www.dokuwiki.org/|link.]] |+  AUTHOR = {Fuhr, Thomas and Leurent, Ga{\"​e}tan and Suder, Valentin},​ 
 +  URL = {https://​hal.inria.fr/​hal-01102031},​ 
 +  YEAR = {2015}, 
 +  MONTH = Jan, 
 +  KEYWORDS = {forgery ; Marble ; key-recovery ; CAESAR competition ; authenticated encryption},​ 
 +  HAL_ID = {hal-01102031},​ 
 +  HAL_VERSION = {v2}, 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:ref:caesar:​lu-copa,​ 
 +    author = {Jiqiang Lu}, 
 +    title = {On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2015/​079},​ 
 +    year = {2015}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +
 +</​code>​ 
 +<code bibtex> 
 +@misc{:ref:caesar:​asconIaik,​ 
 +  title = {Cryptanalysis of {Ascon}}, 
 +  author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl\"​{a}ffer},​ 
 +  howpublished = {Cryptology ePrint Archive, Report 2015/030; extended version of CT-RSA 2015}, 
 +  year = {2015}, 
 +  note = {\url{http://eprint.iacr.org/2015/​030}},​ 
 +  url = "​http://​eprint.iacr.org/​2015/​030",​ 
 +
 +</​code>​ 
 +<code bibtex> 
 +@unpublished{:ref:caesar:​leurenthal01017048,​ 
 +  TITLE = {{Differential Forgery Attack against LAC}}, 
 +  AUTHOR = {Leurent, Ga{\"​e}tan},​ 
 +  URL = {https://​hal.inria.fr/​hal-01017048},​ 
 +  NOTE = {Presented at DIAC 2014}, 
 +  YEAR = {2014}, 
 +  MONTH = Jul, 
 +  HAL_ID = {hal-01017048},​ 
 +  HAL_VERSION = {v1}, 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2014931,​ 
 +    author = {Thomas Peyrin and Siang Meng Sim and Lei Wang and Guoyan Zhang}, 
 +    title = {Cryptanalysis of JAMBU}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​931},​ 
 +    year = {2014}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2014251,​ 
 +    author = {Guy Barwell}, 
 +    title = {Forgery on Stateless CMCC}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​251},​ 
 +    year = {2014}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +    url = "​http://​eprint.iacr.org/​2014/​251"​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​sablierFeng,​ 
 +    author = {Xiutao Feng and Fan Zhang}, 
 +    title = {practical state recovery attack on the stream cipher Sablier v1} 
 +    url = "http://www.amss.ac.cn/​xwdt/​kydt/​201404/​t20140409_4087622.html"​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2014226,​ 
 +    author = {Mohamed Ahmed Abdelraheem and Andrey Bogdanov and Elmar Tischhauser},​ 
 +    title = {Weak-Key Analysis of POET}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​226},​ 
 +    year = {2014}, 
 +    note = {\url{http://​eprint.iacr.org/}}, 
 +    url = "​http://​eprint.iacr.org/​2014/​226"​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2014325,​ 
 +    author = {Xiutao FENG, Fan ZHANG and Hui WANG}, 
 +    title = {A practical forgery and state recovery attack on the authenticated cipher PANDA-s}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​325},​ 
 +    year = {2014}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +    url = "​http://​eprint.iacr.org/​2014/​325"​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​screamForgerySimWang,​ 
 +    author = {Siang Meng Sim and Lei Wang}, 
 +    title = {Practical Forgery Attacks on SCREAM and iSCREAM}, 
 +    year = {2014}, 
 +    note = {\url{http://​www1.spms.ntu.edu.sg/​~syllab/​m/​images/​b/​b3/​ForgeryAttackonSCREAM.pdf}},​ 
 +    url = "​http://​www1.spms.ntu.edu.sg/​~syllab/​m/​images/​b/​b3/​ForgeryAttackonSCREAM.pdf"​ 
 +
 +</​code>​
  
 +<code bibtex>
 +@misc{:​ref:​caesar:​piCipherLeurent,​
 +    author = {Gaëtan Leurent},
 +    title = {Tag Second-preimage Attack against π-cipher},
 +    year = {2014},
 +    note = {\url{http://​hal.inria.fr/​hal-00966794}},​
 +    url = "​http://​hal.inria.fr/​hal-00966794"​
 +}
 +</​code>​
  
-===== Note card example =====+<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2014217,​ 
 +    author ​{Yu Sasaki and Lei Wang}, 
 +    title {A Forgery Attack against PANDA-s}, 
 +    howpublished ​{Cryptology ePrint Archive, Report 2014/​217},​ 
 +    year {2014}, 
 +    note {\url{http://​eprint.iacr.org/​}},​ 
 +    url "​http://​eprint.iacr.org/​2014/​217"​ 
 +
 +</​code>​
  
-^ Note name ^  ​:ref:knuth-aop-2 ​ ^ +<code bibtex>​ 
-^ Author ​   | Donald Knuth | +@misc{:ref:caesar:​cryptoeprint2014218,​ 
-^ Title     | The Art of Computer ProgrammingVolume 2: Seminumerical Algorithms | +    ​author = {Yu Sasaki and Lei Wang}, 
-^ Edition ​  | Third Edition | +    title = {A Practical Universal Forgery Attack against PAES-8}
-^ Published | 1997 | +    ​howpublished = {Cryptology ePrint Archive, Report 2014/218}, 
-^ Publisher | Addison-Wesley | +    year = {2014}, 
-^ Pages     | xiv + 762 pp| +    note = {\url{http://​eprint.iacr.org/​}},​ 
-^ ISBN      | 0-201-89684-2 | +    url = "http://eprint.iacr.org/2014/​218"​ 
-^ URL       ​| ​http://en.wikipedia.org/wiki/The_Art_of_Computer_Programming |+
 +</code>
  
- +<code bibtex> 
-===== BibTeX example =====+@misc{:​ref:​caesar:​paesJeanNicolic,​ 
 +    author ​{Jérémy Jean and Ivica Nikolić},​ 
 +    title {Using AES Round Symmetries to Distinguish PAES}, 
 +    year {2014}, 
 +    note {\url{http://​www1.spms.ntu.edu.sg/​~syllab/​m/​images/​6/​6e/​Using_AES_Round_Symmetries_to_Distinguish_PAES.pdf}},​ 
 +    url "​http://​www1.spms.ntu.edu.sg/​~syllab/​m/​images/​6/​6e/​Using_AES_Round_Symmetries_to_Distinguish_PAES.pdf"​ 
 +
 +</​code>​
  
 <code bibtex> <code bibtex>
-@Comment{refnotes+@misc{:​ref:​caesar:​cryptoeprint2014197
-  ​namespace ​= "ref:prog"+    ​author = {Jian Guo and Jérémy Jean and Thomas Peyrin and Wang Lei}, 
 +    title = {Breaking POET Authentication with a Single Query}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​197},​ 
 +    year = {2014}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +    url = "http://​eprint.iacr.org/​2014/​197"
 } }
 +</​code>​
  
-@Book{GangOfFour+<code bibtex>​ 
-  author ​    ​"​Erich ​{Gamma} ​and Richard {Helm} ​and Ralph {Johnsonand John {Vlissides}"​+@misc{:​ref:​caesar:​keyrecoveryAVALANCHEv1
-  ​author-ref = "​Gamma,​ et al.",​ +    author = {Andrey Bogdanov ​and Martin M. Lauridsen ​and Elmar Tischhauser}, 
-  ​title      "​Design Patterns: Elements ​of Reusable Object-Oriented Software"​+    title = {Cryptanalysis ​of AVALANCHEv1}
-  ​publisher  ​"​Addison-Wesley"​+    ​year ​{2014}
-  ​year ​      1994+    ​howpublished ​{Cryptographic Competitions Mailing List}
-  ​address ​   ​= ​"​Reading,​ Mass."+    ​note {\url{http://​martinlauridsen.info/​pub/​avalanchev1.pdf}}
-  ​pages ​     = 395, +    url = "​http://​martinlauridsen.info/pub/avalanchev1.pdf"
-  isbn       = "​0-201-63361-2",​ +
-  ​url        = "​http://​en.wikipedia.org/wiki/Design_Patterns"+
 } }
 +</​code>​
  
-@Article{:ref:Knuth-LCE-1985+<code bibtex>​ 
-  ​author ​   ​= ​"​Donald Knuth"+@misc{:ref:caesar:​NandiCobraForgery
-  title     ​"​Deciphering a linear congruential encryption",​ +    ​author ​{Mridul Nandi}
-  journal ​  = "IEEE Transactions ​on Information Theory"​+    title = {Forging Attack ​on COBRA Mode}
-  ​volume ​   = "​31(1)",​ +    year = {2014}
-  ​year      1985+    ​howpublished ​{Cryptographic Competitions Mailing List}
-  ​month ​    "​Jan",​ +
-  publisher = "​IEEE",​ +
-  pages     = "​49-52",​ +
-  issn      = "​0018-9448",​ +
-  url       = "​http://​ieeexplore.ieee.org/​xpl/​articleDetails.jsp?​arnumber=1056997"​+
 } }
 </​code>​ </​code>​
  
-===== Dataentry example ===== +<​code ​bibtex
- +@misc{:ref:caesar:wheestInria,​ 
-The dataentry below is wrapped into ''​<​code>​''​ section to be properly presented in absence of [[doku>​plugin:​data|Data plugin]]. +    ​author = {Anne Canteaut and Gaëtan Leurent}
- +    title = {Distinguishing and Key-recovery Attacks against Wheesht}, 
-<​code>​ +    year = {2014}, 
----- dataentry refnotes ---- +    ​howpublished = {Cryptographic Competitions Mailing List} 
-note-name : :ref:prog:Hunt&​Thomas(1999) +}
-authors ​  : Andrew HuntDavid Thomas +
-title     : The Pragmatic Programmer: From Journeyman to Master +
-published : 1999 +
-publisher : Addison-Wesley Professional +
-pages     : 352 +
-isbn      : 0-201-61622-X +
-url       : http://​en.wikipedia.org/​wiki/​The_Pragmatic_Programmer +
-----+
 </​code>​ </​code>​
  
-====== References ====== 
- 
-This page contains references to all third party cryptanalysis. 
  
 <code bibtex> <code bibtex>
-@misc{:​ref:​caesar:​poet+@misc{:​ref:​caesar:​CalicoForgeryIaik
-    author = {Jian Guo and Jérémy Jean and Thomas Peyrin ​and Wang Lei}, +    author = {Christoph Dobraunig ​and Maria Eichlseder ​and Florian Mendel ​and Martin Schl\"{a}ffer}, 
-    title = {Breaking POET Authentication with Single Query}, +    ​title = {Forgery and Key Recovery Attacks on Calico},
-    ​howpublished ​= {Cryptology ePrint Archive, Report 2014/197},+
     year = {2014},     year = {2014},
-    note = {\url{http://​eprint.iacr.org/}},+    ​howpublished = {Cryptographic Competitions Mailing List}, 
 +    ​note = {\url{http://​ascon.iaik.tugraz.at/files/​analysis_calico.pdf}}, 
 +    url = "​http://​ascon.iaik.tugraz.at/​files/​analysis_calico.pdf"​
 } }
 </​code>​ </​code>​
  
refnotes/caesar.txt · Last modified: 24/03/2015 10:37:50 by mmeh