User Tools

Site Tools


refnotes:caesar

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
refnotes:caesar [25/03/2014 09:33:34]
stek
refnotes:caesar [24/03/2015 10:37:50]
mmeh
Line 1: Line 1:
 ====== References ====== ====== References ======
  
-This page contains references to all third party cryptanalysis.+This page contains references to published ​third-party analysis. 
 + 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2015212,​ 
 +    author = {Christof Beierle and Philipp Jovanovic and Martin M. Lauridsen and Gregor Leander and Christian Rechberger},​ 
 +    title = {Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows},​ 
 +    howpublished = {Cryptology ePrint Archive, Report 2015/​212},​ 
 +    year = {2015}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +
 +</​code>​ 
 + 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2015134,​ 
 +    author = {Pierre Karpman}, 
 +    title = {From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions},​ 
 +    howpublished = {Cryptology ePrint Archive, Report 2015/​134},​ 
 +    year = {2015}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +
 +</​code>​ 
 + 
 +<code bibtex>​ 
 +@incollection{:​ref:​caesar:​todoAokiProest,​ 
 +year={2014},​ 
 +isbn={978-3-319-12279-3},​ 
 +booktitle={Cryptology and Network Security},​ 
 +volume={8813},​ 
 +series={Lecture Notes in Computer Science}, 
 +editor={Gritzalis,​ Dimitris and Kiayias, Aggelos and Askoxylakis,​ Ioannis}, 
 +doi={10.1007/​978-3-319-12280-9_5},​ 
 +title={FFT Key Recovery for Integral Attack}, 
 +url={http://​dx.doi.org/​10.1007/​978-3-319-12280-9_5},​ 
 +publisher={Springer International Publishing},​ 
 +keywords={Block cipher; Integral attack; Fast Fourier Transform; Fast Walsh-Hadamard Transform; Prøst; CLEFIA; AES}, 
 +author={Todo,​ Yosuke and Aoki, Kazumaro},​ 
 +pages={64-81},​ 
 +language={English} 
 +
 +</​code>​ 
 + 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​screamWeakKeys,​ 
 +    author = {Gregor Leander and Brice Minaud and Sondre Rønjom}, 
 +    title = {A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2015/​068},​ 
 +    year = {2015}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +
 +</​code>​ 
 + 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​marble-forgery,​ 
 +  TITLE = {{Forgery and Key-Recovery Attacks on CAESAR Candidate Marble}}, 
 +  AUTHOR = {Fuhr, Thomas and Leurent, Ga{\"​e}tan and Suder, Valentin},​ 
 +  URL = {https://​hal.inria.fr/​hal-01102031},​ 
 +  YEAR = {2015}, 
 +  MONTH = Jan, 
 +  KEYWORDS = {forgery ; Marble ; key-recovery ; CAESAR competition ; authenticated encryption},​ 
 +  HAL_ID = {hal-01102031},​ 
 +  HAL_VERSION = {v2}, 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​lu-copa,​ 
 +    author = {Jiqiang Lu}, 
 +    title = {On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2015/​079},​ 
 +    year = {2015}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​asconIaik,​ 
 +  title = {Cryptanalysis of {Ascon}}, 
 +  author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl\"​{a}ffer},​ 
 +  howpublished = {Cryptology ePrint Archive, Report 2015/030; extended version of CT-RSA 2015}, 
 +  year = {2015}, 
 +  note = {\url{http://​eprint.iacr.org/​2015/​030}},​ 
 +  url = "​http://​eprint.iacr.org/​2015/​030",​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@unpublished{:​ref:​caesar:​leurenthal01017048,​ 
 +  TITLE = {{Differential Forgery Attack against LAC}}, 
 +  AUTHOR = {Leurent, Ga{\"​e}tan},​ 
 +  URL = {https://​hal.inria.fr/​hal-01017048},​ 
 +  NOTE = {Presented at DIAC 2014}, 
 +  YEAR = {2014}, 
 +  MONTH = Jul, 
 +  HAL_ID = {hal-01017048},​ 
 +  HAL_VERSION = {v1}, 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2014931,​ 
 +    author = {Thomas Peyrin and Siang Meng Sim and Lei Wang and Guoyan Zhang}, 
 +    title = {Cryptanalysis of JAMBU}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​931},​ 
 +    year = {2014}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2014251,​ 
 +    author = {Guy Barwell}, 
 +    title = {Forgery on Stateless CMCC}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​251},​ 
 +    year = {2014}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +    url = "​http://​eprint.iacr.org/​2014/​251"​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​sablierFeng,​ 
 +    author = {Xiutao Feng and Fan Zhang}, 
 +    title = {A practical state recovery attack on the stream cipher Sablier v1} 
 +    url = "​http://​www.amss.ac.cn/​xwdt/​kydt/​201404/​t20140409_4087622.html"​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2014226,​ 
 +    author = {Mohamed Ahmed Abdelraheem and Andrey Bogdanov and Elmar Tischhauser},​ 
 +    title = {Weak-Key Analysis of POET}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​226},​ 
 +    year = {2014}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +    url = "​http://​eprint.iacr.org/​2014/​226"​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2014325,​ 
 +    author = {Xiutao FENG, Fan ZHANG and Hui WANG}, 
 +    title = {A practical forgery and state recovery attack on the authenticated cipher PANDA-s}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​325},​ 
 +    year = {2014}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +    url = "​http://​eprint.iacr.org/​2014/​325"​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​screamForgerySimWang,​ 
 +    author = {Siang Meng Sim and Lei Wang}, 
 +    title = {Practical Forgery Attacks on SCREAM and iSCREAM}, 
 +    year = {2014}, 
 +    note = {\url{http://​www1.spms.ntu.edu.sg/​~syllab/​m/​images/​b/​b3/​ForgeryAttackonSCREAM.pdf}},​ 
 +    url = "​http://​www1.spms.ntu.edu.sg/​~syllab/​m/​images/​b/​b3/​ForgeryAttackonSCREAM.pdf"​ 
 +
 +</​code>​ 
 + 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​piCipherLeurent,​ 
 +    author = {Gaëtan Leurent}, 
 +    title = {Tag Second-preimage Attack against π-cipher},​ 
 +    year = {2014}, 
 +    note = {\url{http://​hal.inria.fr/​hal-00966794}},​ 
 +    url = "​http://​hal.inria.fr/​hal-00966794"​ 
 +
 +</​code>​ 
 <code bibtex> <code bibtex>
 @misc{:​ref:​caesar:​cryptoeprint2014217,​ @misc{:​ref:​caesar:​cryptoeprint2014217,​
Line 9: Line 168:
     year = {2014},     year = {2014},
     note = {\url{http://​eprint.iacr.org/​}},​     note = {\url{http://​eprint.iacr.org/​}},​
 +    url = "​http://​eprint.iacr.org/​2014/​217"​
 } }
 </​code>​ </​code>​
 +
 <code bibtex> <code bibtex>
 @misc{:​ref:​caesar:​cryptoeprint2014218,​ @misc{:​ref:​caesar:​cryptoeprint2014218,​
Line 18: Line 179:
     year = {2014},     year = {2014},
     note = {\url{http://​eprint.iacr.org/​}},​     note = {\url{http://​eprint.iacr.org/​}},​
 +    url = "​http://​eprint.iacr.org/​2014/​218"​
 +}
 +</​code>​
 +
 +<code bibtex>
 +@misc{:​ref:​caesar:​paesJeanNicolic,​
 +    author = {Jérémy Jean and Ivica Nikolić},
 +    title = {Using AES Round Symmetries to Distinguish PAES},
 +    year = {2014},
 +    note = {\url{http://​www1.spms.ntu.edu.sg/​~syllab/​m/​images/​6/​6e/​Using_AES_Round_Symmetries_to_Distinguish_PAES.pdf}},​
 +    url = "​http://​www1.spms.ntu.edu.sg/​~syllab/​m/​images/​6/​6e/​Using_AES_Round_Symmetries_to_Distinguish_PAES.pdf"​
 } }
 </​code>​ </​code>​
Line 34: Line 206:
 <code bibtex> <code bibtex>
 @misc{:​ref:​caesar:​keyrecoveryAVALANCHEv1,​ @misc{:​ref:​caesar:​keyrecoveryAVALANCHEv1,​
-    author = {Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser}+    author = {Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser},
     title = {Cryptanalysis of AVALANCHEv1},​     title = {Cryptanalysis of AVALANCHEv1},​
     year = {2014},     year = {2014},
-    howpublished = {Cryptographic ​Comptetitions ​Mailing List},+    howpublished = {Cryptographic ​Competitions ​Mailing List},
     note = {\url{http://​martinlauridsen.info/​pub/​avalanchev1.pdf}},​     note = {\url{http://​martinlauridsen.info/​pub/​avalanchev1.pdf}},​
     url = "​http://​martinlauridsen.info/​pub/​avalanchev1.pdf"​     url = "​http://​martinlauridsen.info/​pub/​avalanchev1.pdf"​
Line 44: Line 216:
  
 <code bibtex> <code bibtex>
-@misc{:​ref:​caesar:​nandi-cobra-forgery,+@misc{:​ref:​caesar:​NandiCobraForgery,
     author = {Mridul Nandi},     author = {Mridul Nandi},
     title = {Forging Attack on COBRA Mode},     title = {Forging Attack on COBRA Mode},
     year = {2014},     year = {2014},
-    howpublished = {Cryptographic ​Comptetitions ​Mailing List}+    howpublished = {Cryptographic ​Competitions ​Mailing List}
 } }
 </​code>​ </​code>​
  
 +<code bibtex>
 +@misc{:​ref:​caesar:​wheestInria,​
 +    author = {Anne Canteaut and Gaëtan Leurent},
 +    title = {Distinguishing and Key-recovery Attacks against Wheesht},
 +    year = {2014},
 +    howpublished = {Cryptographic Competitions Mailing List}
 +}
 +</​code>​
  
 +
 +<code bibtex>
 +@misc{:​ref:​caesar:​CalicoForgeryIaik,​
 +    author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl\"​{a}ffer},​
 +    title = {Forgery and Key Recovery Attacks on Calico},
 +    year = {2014},
 +    howpublished = {Cryptographic Competitions Mailing List},
 +    note = {\url{http://​ascon.iaik.tugraz.at/​files/​analysis_calico.pdf}},​
 +    url = "​http://​ascon.iaik.tugraz.at/​files/​analysis_calico.pdf"​
 +}
 +</​code>​
  
refnotes/caesar.txt · Last modified: 24/03/2015 10:37:50 by mmeh