User Tools

Site Tools


refnotes:caesar

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revision Both sides next revision
refnotes:caesar [25/03/2014 09:33:34]
stek
refnotes:caesar [24/03/2015 10:37:04]
mmeh
Line 1: Line 1:
 ====== References ====== ====== References ======
  
-This page contains references to all third party cryptanalysis.+This page contains references to published ​third-party analysis. 
 + 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2015212,​ 
 +    author = {Christof Beierle and Philipp Jovanovic and Martin M. Lauridsen and Gregor Leander and Christian Rechberger},​ 
 +    title = {Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows},​ 
 +    howpublished = {Cryptology ePrint Archive, Report 2015/​212},​ 
 +    year = {2015}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +
 +</​code>​ 
 + 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2015134,​ 
 +    author = {Pierre Karpman}, 
 +    title = {From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions},​ 
 +    howpublished = {Cryptology ePrint Archive, Report 2015/​134},​ 
 +    year = {2015}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +
 +</​code>​ 
 + 
 +<code bibtex>​ 
 +@incollection{:​ref:​caesar:​todo-aoki-proest,​ 
 +year={2014},​ 
 +isbn={978-3-319-12279-3},​ 
 +booktitle={Cryptology and Network Security},​ 
 +volume={8813},​ 
 +series={Lecture Notes in Computer Science}, 
 +editor={Gritzalis,​ Dimitris and Kiayias, Aggelos and Askoxylakis,​ Ioannis}, 
 +doi={10.1007/​978-3-319-12280-9_5},​ 
 +title={FFT Key Recovery for Integral Attack}, 
 +url={http://​dx.doi.org/​10.1007/​978-3-319-12280-9_5},​ 
 +publisher={Springer International Publishing},​ 
 +keywords={Block cipher; Integral attack; Fast Fourier Transform; Fast Walsh-Hadamard Transform; Prøst; CLEFIA; AES}, 
 +author={Todo,​ Yosuke and Aoki, Kazumaro},​ 
 +pages={64-81},​ 
 +language={English} 
 +
 +</​code>​ 
 + 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​screamWeakKeys,​ 
 +    author = {Gregor Leander and Brice Minaud and Sondre Rønjom}, 
 +    title = {A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2015/​068},​ 
 +    year = {2015}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +
 +</​code>​ 
 + 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​marble-forgery,​ 
 +  TITLE = {{Forgery and Key-Recovery Attacks on CAESAR Candidate Marble}}, 
 +  AUTHOR = {Fuhr, Thomas and Leurent, Ga{\"​e}tan and Suder, Valentin},​ 
 +  URL = {https://​hal.inria.fr/​hal-01102031},​ 
 +  YEAR = {2015}, 
 +  MONTH = Jan, 
 +  KEYWORDS = {forgery ; Marble ; key-recovery ; CAESAR competition ; authenticated encryption},​ 
 +  HAL_ID = {hal-01102031},​ 
 +  HAL_VERSION = {v2}, 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​lu-copa,​ 
 +    author = {Jiqiang Lu}, 
 +    title = {On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2015/​079},​ 
 +    year = {2015}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​asconIaik,​ 
 +  title = {Cryptanalysis of {Ascon}}, 
 +  author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl\"​{a}ffer},​ 
 +  howpublished = {Cryptology ePrint Archive, Report 2015/030; extended version of CT-RSA 2015}, 
 +  year = {2015}, 
 +  note = {\url{http://​eprint.iacr.org/​2015/​030}},​ 
 +  url = "​http://​eprint.iacr.org/​2015/​030",​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@unpublished{:​ref:​caesar:​leurenthal01017048,​ 
 +  TITLE = {{Differential Forgery Attack against LAC}}, 
 +  AUTHOR = {Leurent, Ga{\"​e}tan},​ 
 +  URL = {https://​hal.inria.fr/​hal-01017048},​ 
 +  NOTE = {Presented at DIAC 2014}, 
 +  YEAR = {2014}, 
 +  MONTH = Jul, 
 +  HAL_ID = {hal-01017048},​ 
 +  HAL_VERSION = {v1}, 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2014931,​ 
 +    author = {Thomas Peyrin and Siang Meng Sim and Lei Wang and Guoyan Zhang}, 
 +    title = {Cryptanalysis of JAMBU}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​931},​ 
 +    year = {2014}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2014251,​ 
 +    author = {Guy Barwell}, 
 +    title = {Forgery on Stateless CMCC}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​251},​ 
 +    year = {2014}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +    url = "​http://​eprint.iacr.org/​2014/​251"​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​sablierFeng,​ 
 +    author = {Xiutao Feng and Fan Zhang}, 
 +    title = {A practical state recovery attack on the stream cipher Sablier v1} 
 +    url = "​http://​www.amss.ac.cn/​xwdt/​kydt/​201404/​t20140409_4087622.html"​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2014226,​ 
 +    author = {Mohamed Ahmed Abdelraheem and Andrey Bogdanov and Elmar Tischhauser},​ 
 +    title = {Weak-Key Analysis of POET}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​226},​ 
 +    year = {2014}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +    url = "​http://​eprint.iacr.org/​2014/​226"​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2014325,​ 
 +    author = {Xiutao FENG, Fan ZHANG and Hui WANG}, 
 +    title = {A practical forgery and state recovery attack on the authenticated cipher PANDA-s}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​325},​ 
 +    year = {2014}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +    url = "​http://​eprint.iacr.org/​2014/​325"​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​screamForgerySimWang,​ 
 +    author = {Siang Meng Sim and Lei Wang}, 
 +    title = {Practical Forgery Attacks on SCREAM and iSCREAM}, 
 +    year = {2014}, 
 +    note = {\url{http://​www1.spms.ntu.edu.sg/​~syllab/​m/​images/​b/​b3/​ForgeryAttackonSCREAM.pdf}},​ 
 +    url = "​http://​www1.spms.ntu.edu.sg/​~syllab/​m/​images/​b/​b3/​ForgeryAttackonSCREAM.pdf"​ 
 +
 +</​code>​ 
 + 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​piCipherLeurent,​ 
 +    author = {Gaëtan Leurent}, 
 +    title = {Tag Second-preimage Attack against π-cipher},​ 
 +    year = {2014}, 
 +    note = {\url{http://​hal.inria.fr/​hal-00966794}},​ 
 +    url = "​http://​hal.inria.fr/​hal-00966794"​ 
 +
 +</​code>​ 
 <code bibtex> <code bibtex>
 @misc{:​ref:​caesar:​cryptoeprint2014217,​ @misc{:​ref:​caesar:​cryptoeprint2014217,​
Line 9: Line 168:
     year = {2014},     year = {2014},
     note = {\url{http://​eprint.iacr.org/​}},​     note = {\url{http://​eprint.iacr.org/​}},​
 +    url = "​http://​eprint.iacr.org/​2014/​217"​
 } }
 </​code>​ </​code>​
 +
 <code bibtex> <code bibtex>
 @misc{:​ref:​caesar:​cryptoeprint2014218,​ @misc{:​ref:​caesar:​cryptoeprint2014218,​
Line 18: Line 179:
     year = {2014},     year = {2014},
     note = {\url{http://​eprint.iacr.org/​}},​     note = {\url{http://​eprint.iacr.org/​}},​
 +    url = "​http://​eprint.iacr.org/​2014/​218"​
 +}
 +</​code>​
 +
 +<code bibtex>
 +@misc{:​ref:​caesar:​paesJeanNicolic,​
 +    author = {Jérémy Jean and Ivica Nikolić},
 +    title = {Using AES Round Symmetries to Distinguish PAES},
 +    year = {2014},
 +    note = {\url{http://​www1.spms.ntu.edu.sg/​~syllab/​m/​images/​6/​6e/​Using_AES_Round_Symmetries_to_Distinguish_PAES.pdf}},​
 +    url = "​http://​www1.spms.ntu.edu.sg/​~syllab/​m/​images/​6/​6e/​Using_AES_Round_Symmetries_to_Distinguish_PAES.pdf"​
 } }
 </​code>​ </​code>​
Line 34: Line 206:
 <code bibtex> <code bibtex>
 @misc{:​ref:​caesar:​keyrecoveryAVALANCHEv1,​ @misc{:​ref:​caesar:​keyrecoveryAVALANCHEv1,​
-    author = {Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser}+    author = {Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser},
     title = {Cryptanalysis of AVALANCHEv1},​     title = {Cryptanalysis of AVALANCHEv1},​
     year = {2014},     year = {2014},
-    howpublished = {Cryptographic ​Comptetitions ​Mailing List},+    howpublished = {Cryptographic ​Competitions ​Mailing List},
     note = {\url{http://​martinlauridsen.info/​pub/​avalanchev1.pdf}},​     note = {\url{http://​martinlauridsen.info/​pub/​avalanchev1.pdf}},​
     url = "​http://​martinlauridsen.info/​pub/​avalanchev1.pdf"​     url = "​http://​martinlauridsen.info/​pub/​avalanchev1.pdf"​
Line 44: Line 216:
  
 <code bibtex> <code bibtex>
-@misc{:​ref:​caesar:​nandi-cobra-forgery,+@misc{:​ref:​caesar:​NandiCobraForgery,
     author = {Mridul Nandi},     author = {Mridul Nandi},
     title = {Forging Attack on COBRA Mode},     title = {Forging Attack on COBRA Mode},
     year = {2014},     year = {2014},
-    howpublished = {Cryptographic ​Comptetitions ​Mailing List}+    howpublished = {Cryptographic ​Competitions ​Mailing List}
 } }
 </​code>​ </​code>​
  
 +<code bibtex>
 +@misc{:​ref:​caesar:​wheestInria,​
 +    author = {Anne Canteaut and Gaëtan Leurent},
 +    title = {Distinguishing and Key-recovery Attacks against Wheesht},
 +    year = {2014},
 +    howpublished = {Cryptographic Competitions Mailing List}
 +}
 +</​code>​
  
 +
 +<code bibtex>
 +@misc{:​ref:​caesar:​CalicoForgeryIaik,​
 +    author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl\"​{a}ffer},​
 +    title = {Forgery and Key Recovery Attacks on Calico},
 +    year = {2014},
 +    howpublished = {Cryptographic Competitions Mailing List},
 +    note = {\url{http://​ascon.iaik.tugraz.at/​files/​analysis_calico.pdf}},​
 +    url = "​http://​ascon.iaik.tugraz.at/​files/​analysis_calico.pdf"​
 +}
 +</​code>​
  
refnotes/caesar.txt · Last modified: 24/03/2015 10:37:50 by mmeh