This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
refnotes:caesar [25/03/2014 11:56:27] mmeh |
refnotes:caesar [24/03/2015 10:37:50] (current) mmeh |
||
---|---|---|---|
Line 1: | Line 1: | ||
====== References ====== | ====== References ====== | ||
- | This page contains references to all third party cryptanalysis. | + | This page contains references to published third-party analysis. |
+ | |||
+ | <code bibtex> | ||
+ | @misc{:ref:caesar:cryptoeprint2015212, | ||
+ | author = {Christof Beierle and Philipp Jovanovic and Martin M. Lauridsen and Gregor Leander and Christian Rechberger}, | ||
+ | title = {Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows}, | ||
+ | howpublished = {Cryptology ePrint Archive, Report 2015/212}, | ||
+ | year = {2015}, | ||
+ | note = {\url{http://eprint.iacr.org/}}, | ||
+ | } | ||
+ | </code> | ||
+ | |||
+ | <code bibtex> | ||
+ | @misc{:ref:caesar:cryptoeprint2015134, | ||
+ | author = {Pierre Karpman}, | ||
+ | title = {From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions}, | ||
+ | howpublished = {Cryptology ePrint Archive, Report 2015/134}, | ||
+ | year = {2015}, | ||
+ | note = {\url{http://eprint.iacr.org/}}, | ||
+ | } | ||
+ | </code> | ||
+ | |||
+ | <code bibtex> | ||
+ | @incollection{:ref:caesar:todoAokiProest, | ||
+ | year={2014}, | ||
+ | isbn={978-3-319-12279-3}, | ||
+ | booktitle={Cryptology and Network Security}, | ||
+ | volume={8813}, | ||
+ | series={Lecture Notes in Computer Science}, | ||
+ | editor={Gritzalis, Dimitris and Kiayias, Aggelos and Askoxylakis, Ioannis}, | ||
+ | doi={10.1007/978-3-319-12280-9_5}, | ||
+ | title={FFT Key Recovery for Integral Attack}, | ||
+ | url={http://dx.doi.org/10.1007/978-3-319-12280-9_5}, | ||
+ | publisher={Springer International Publishing}, | ||
+ | keywords={Block cipher; Integral attack; Fast Fourier Transform; Fast Walsh-Hadamard Transform; Prøst; CLEFIA; AES}, | ||
+ | author={Todo, Yosuke and Aoki, Kazumaro}, | ||
+ | pages={64-81}, | ||
+ | language={English} | ||
+ | } | ||
+ | </code> | ||
+ | |||
+ | <code bibtex> | ||
+ | @misc{:ref:caesar:screamWeakKeys, | ||
+ | author = {Gregor Leander and Brice Minaud and Sondre Rønjom}, | ||
+ | title = {A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro}, | ||
+ | howpublished = {Cryptology ePrint Archive, Report 2015/068}, | ||
+ | year = {2015}, | ||
+ | note = {\url{http://eprint.iacr.org/}}, | ||
+ | } | ||
+ | </code> | ||
+ | |||
+ | <code bibtex> | ||
+ | @misc{:ref:caesar:marble-forgery, | ||
+ | TITLE = {{Forgery and Key-Recovery Attacks on CAESAR Candidate Marble}}, | ||
+ | AUTHOR = {Fuhr, Thomas and Leurent, Ga{\"e}tan and Suder, Valentin}, | ||
+ | URL = {https://hal.inria.fr/hal-01102031}, | ||
+ | YEAR = {2015}, | ||
+ | MONTH = Jan, | ||
+ | KEYWORDS = {forgery ; Marble ; key-recovery ; CAESAR competition ; authenticated encryption}, | ||
+ | HAL_ID = {hal-01102031}, | ||
+ | HAL_VERSION = {v2}, | ||
+ | } | ||
+ | </code> | ||
+ | <code bibtex> | ||
+ | @misc{:ref:caesar:lu-copa, | ||
+ | author = {Jiqiang Lu}, | ||
+ | title = {On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack}, | ||
+ | howpublished = {Cryptology ePrint Archive, Report 2015/079}, | ||
+ | year = {2015}, | ||
+ | note = {\url{http://eprint.iacr.org/}}, | ||
+ | } | ||
+ | </code> | ||
+ | <code bibtex> | ||
+ | @misc{:ref:caesar:asconIaik, | ||
+ | title = {Cryptanalysis of {Ascon}}, | ||
+ | author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl\"{a}ffer}, | ||
+ | howpublished = {Cryptology ePrint Archive, Report 2015/030; extended version of CT-RSA 2015}, | ||
+ | year = {2015}, | ||
+ | note = {\url{http://eprint.iacr.org/2015/030}}, | ||
+ | url = "http://eprint.iacr.org/2015/030", | ||
+ | } | ||
+ | </code> | ||
+ | <code bibtex> | ||
+ | @unpublished{:ref:caesar:leurenthal01017048, | ||
+ | TITLE = {{Differential Forgery Attack against LAC}}, | ||
+ | AUTHOR = {Leurent, Ga{\"e}tan}, | ||
+ | URL = {https://hal.inria.fr/hal-01017048}, | ||
+ | NOTE = {Presented at DIAC 2014}, | ||
+ | YEAR = {2014}, | ||
+ | MONTH = Jul, | ||
+ | HAL_ID = {hal-01017048}, | ||
+ | HAL_VERSION = {v1}, | ||
+ | } | ||
+ | </code> | ||
+ | <code bibtex> | ||
+ | @misc{:ref:caesar:cryptoeprint2014931, | ||
+ | author = {Thomas Peyrin and Siang Meng Sim and Lei Wang and Guoyan Zhang}, | ||
+ | title = {Cryptanalysis of JAMBU}, | ||
+ | howpublished = {Cryptology ePrint Archive, Report 2014/931}, | ||
+ | year = {2014}, | ||
+ | note = {\url{http://eprint.iacr.org/}}, | ||
+ | } | ||
+ | </code> | ||
+ | <code bibtex> | ||
+ | @misc{:ref:caesar:cryptoeprint2014251, | ||
+ | author = {Guy Barwell}, | ||
+ | title = {Forgery on Stateless CMCC}, | ||
+ | howpublished = {Cryptology ePrint Archive, Report 2014/251}, | ||
+ | year = {2014}, | ||
+ | note = {\url{http://eprint.iacr.org/}}, | ||
+ | url = "http://eprint.iacr.org/2014/251" | ||
+ | } | ||
+ | </code> | ||
+ | <code bibtex> | ||
+ | @misc{:ref:caesar:sablierFeng, | ||
+ | author = {Xiutao Feng and Fan Zhang}, | ||
+ | title = {A practical state recovery attack on the stream cipher Sablier v1} | ||
+ | url = "http://www.amss.ac.cn/xwdt/kydt/201404/t20140409_4087622.html" | ||
+ | } | ||
+ | </code> | ||
+ | <code bibtex> | ||
+ | @misc{:ref:caesar:cryptoeprint2014226, | ||
+ | author = {Mohamed Ahmed Abdelraheem and Andrey Bogdanov and Elmar Tischhauser}, | ||
+ | title = {Weak-Key Analysis of POET}, | ||
+ | howpublished = {Cryptology ePrint Archive, Report 2014/226}, | ||
+ | year = {2014}, | ||
+ | note = {\url{http://eprint.iacr.org/}}, | ||
+ | url = "http://eprint.iacr.org/2014/226" | ||
+ | } | ||
+ | </code> | ||
+ | <code bibtex> | ||
+ | @misc{:ref:caesar:cryptoeprint2014325, | ||
+ | author = {Xiutao FENG, Fan ZHANG and Hui WANG}, | ||
+ | title = {A practical forgery and state recovery attack on the authenticated cipher PANDA-s}, | ||
+ | howpublished = {Cryptology ePrint Archive, Report 2014/325}, | ||
+ | year = {2014}, | ||
+ | note = {\url{http://eprint.iacr.org/}}, | ||
+ | url = "http://eprint.iacr.org/2014/325" | ||
+ | } | ||
+ | </code> | ||
+ | <code bibtex> | ||
+ | @misc{:ref:caesar:screamForgerySimWang, | ||
+ | author = {Siang Meng Sim and Lei Wang}, | ||
+ | title = {Practical Forgery Attacks on SCREAM and iSCREAM}, | ||
+ | year = {2014}, | ||
+ | note = {\url{http://www1.spms.ntu.edu.sg/~syllab/m/images/b/b3/ForgeryAttackonSCREAM.pdf}}, | ||
+ | url = "http://www1.spms.ntu.edu.sg/~syllab/m/images/b/b3/ForgeryAttackonSCREAM.pdf" | ||
+ | } | ||
+ | </code> | ||
+ | |||
+ | <code bibtex> | ||
+ | @misc{:ref:caesar:piCipherLeurent, | ||
+ | author = {Gaëtan Leurent}, | ||
+ | title = {Tag Second-preimage Attack against π-cipher}, | ||
+ | year = {2014}, | ||
+ | note = {\url{http://hal.inria.fr/hal-00966794}}, | ||
+ | url = "http://hal.inria.fr/hal-00966794" | ||
+ | } | ||
+ | </code> | ||
<code bibtex> | <code bibtex> | ||
@misc{:ref:caesar:cryptoeprint2014217, | @misc{:ref:caesar:cryptoeprint2014217, | ||
Line 12: | Line 171: | ||
} | } | ||
</code> | </code> | ||
+ | |||
<code bibtex> | <code bibtex> | ||
@misc{:ref:caesar:cryptoeprint2014218, | @misc{:ref:caesar:cryptoeprint2014218, | ||
Line 20: | Line 180: | ||
note = {\url{http://eprint.iacr.org/}}, | note = {\url{http://eprint.iacr.org/}}, | ||
url = "http://eprint.iacr.org/2014/218" | url = "http://eprint.iacr.org/2014/218" | ||
+ | } | ||
+ | </code> | ||
+ | |||
+ | <code bibtex> | ||
+ | @misc{:ref:caesar:paesJeanNicolic, | ||
+ | author = {Jérémy Jean and Ivica Nikolić}, | ||
+ | title = {Using AES Round Symmetries to Distinguish PAES}, | ||
+ | year = {2014}, | ||
+ | note = {\url{http://www1.spms.ntu.edu.sg/~syllab/m/images/6/6e/Using_AES_Round_Symmetries_to_Distinguish_PAES.pdf}}, | ||
+ | url = "http://www1.spms.ntu.edu.sg/~syllab/m/images/6/6e/Using_AES_Round_Symmetries_to_Distinguish_PAES.pdf" | ||
} | } | ||
</code> | </code> | ||
Line 36: | Line 206: | ||
<code bibtex> | <code bibtex> | ||
@misc{:ref:caesar:keyrecoveryAVALANCHEv1, | @misc{:ref:caesar:keyrecoveryAVALANCHEv1, | ||
- | author = {Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser} | + | author = {Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser}, |
title = {Cryptanalysis of AVALANCHEv1}, | title = {Cryptanalysis of AVALANCHEv1}, | ||
year = {2014}, | year = {2014}, | ||
- | howpublished = {Cryptographic Comptetitions Mailing List}, | + | howpublished = {Cryptographic Competitions Mailing List}, |
note = {\url{http://martinlauridsen.info/pub/avalanchev1.pdf}}, | note = {\url{http://martinlauridsen.info/pub/avalanchev1.pdf}}, | ||
url = "http://martinlauridsen.info/pub/avalanchev1.pdf" | url = "http://martinlauridsen.info/pub/avalanchev1.pdf" | ||
Line 50: | Line 220: | ||
title = {Forging Attack on COBRA Mode}, | title = {Forging Attack on COBRA Mode}, | ||
year = {2014}, | year = {2014}, | ||
- | howpublished = {Cryptographic Comptetitions Mailing List} | + | howpublished = {Cryptographic Competitions Mailing List} |
} | } | ||
</code> | </code> | ||
+ | <code bibtex> | ||
+ | @misc{:ref:caesar:wheestInria, | ||
+ | author = {Anne Canteaut and Gaëtan Leurent}, | ||
+ | title = {Distinguishing and Key-recovery Attacks against Wheesht}, | ||
+ | year = {2014}, | ||
+ | howpublished = {Cryptographic Competitions Mailing List} | ||
+ | } | ||
+ | </code> | ||
+ | |||
+ | <code bibtex> | ||
+ | @misc{:ref:caesar:CalicoForgeryIaik, | ||
+ | author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl\"{a}ffer}, | ||
+ | title = {Forgery and Key Recovery Attacks on Calico}, | ||
+ | year = {2014}, | ||
+ | howpublished = {Cryptographic Competitions Mailing List}, | ||
+ | note = {\url{http://ascon.iaik.tugraz.at/files/analysis_calico.pdf}}, | ||
+ | url = "http://ascon.iaik.tugraz.at/files/analysis_calico.pdf" | ||
+ | } | ||
+ | </code> | ||