User Tools

Site Tools


refnotes:caesar

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
refnotes:caesar [15/05/2014 09:11:39]
mmeh
refnotes:caesar [24/03/2015 10:37:50] (current)
mmeh
Line 1: Line 1:
 ====== References ====== ====== References ======
  
-This page contains references to all third party cryptanalysis.+This page contains references to published ​third-party analysis.
  
 <code bibtex> <code bibtex>
-@misc{:​ref:​caesar:​cryptoeprint:2014:325,+@misc{:​ref:​caesar:​cryptoeprint2015212,​ 
 +    author = {Christof Beierle and Philipp Jovanovic and Martin M. Lauridsen and Gregor Leander and Christian Rechberger},​ 
 +    title = {Analyzing Permutations for AES-like CiphersUnderstanding ShiftRows},​ 
 +    howpublished = {Cryptology ePrint Archive, Report 2015/​212},​ 
 +    year = {2015}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +
 +</​code>​ 
 + 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2015134,​ 
 +    author = {Pierre Karpman}, 
 +    title = {From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions},​ 
 +    howpublished = {Cryptology ePrint Archive, Report 2015/​134},​ 
 +    year = {2015}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +
 +</​code>​ 
 + 
 +<code bibtex>​ 
 +@incollection{:​ref:​caesar:​todoAokiProest,​ 
 +year={2014}, 
 +isbn={978-3-319-12279-3},​ 
 +booktitle={Cryptology and Network Security},​ 
 +volume={8813},​ 
 +series={Lecture Notes in Computer Science}, 
 +editor={Gritzalis,​ Dimitris and Kiayias, Aggelos and Askoxylakis,​ Ioannis}, 
 +doi={10.1007/​978-3-319-12280-9_5},​ 
 +title={FFT Key Recovery for Integral Attack}, 
 +url={http://​dx.doi.org/​10.1007/​978-3-319-12280-9_5},​ 
 +publisher={Springer International Publishing},​ 
 +keywords={Block cipher; Integral attack; Fast Fourier Transform; Fast Walsh-Hadamard Transform; Prøst; CLEFIA; AES}, 
 +author={Todo,​ Yosuke and Aoki, Kazumaro},​ 
 +pages={64-81},​ 
 +language={English} 
 +
 +</​code>​ 
 + 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​screamWeakKeys,​ 
 +    author = {Gregor Leander and Brice Minaud and Sondre Rønjom}, 
 +    title = {A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2015/​068},​ 
 +    year = {2015}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +
 +</​code>​ 
 + 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​marble-forgery,​ 
 +  TITLE = {{Forgery and Key-Recovery Attacks on CAESAR Candidate Marble}}, 
 +  AUTHOR = {Fuhr, Thomas and Leurent, Ga{\"​e}tan and Suder, Valentin},​ 
 +  URL = {https://​hal.inria.fr/​hal-01102031},​ 
 +  YEAR = {2015}, 
 +  MONTH = Jan, 
 +  KEYWORDS = {forgery ; Marble ; key-recovery ; CAESAR competition ; authenticated encryption},​ 
 +  HAL_ID = {hal-01102031},​ 
 +  HAL_VERSION = {v2}, 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​lu-copa,​ 
 +    author = {Jiqiang Lu}, 
 +    title = {On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2015/​079},​ 
 +    year = {2015}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​asconIaik,​ 
 +  title = {Cryptanalysis of {Ascon}}, 
 +  author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl\"​{a}ffer},​ 
 +  howpublished = {Cryptology ePrint Archive, Report 2015/030; extended version of CT-RSA 2015}, 
 +  year = {2015}, 
 +  note = {\url{http://​eprint.iacr.org/​2015/​030}},​ 
 +  url = "​http://​eprint.iacr.org/​2015/​030",​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@unpublished{:​ref:​caesar:​leurenthal01017048,​ 
 +  TITLE = {{Differential Forgery Attack against LAC}}, 
 +  AUTHOR = {Leurent, Ga{\"​e}tan},​ 
 +  URL = {https://​hal.inria.fr/​hal-01017048},​ 
 +  NOTE = {Presented at DIAC 2014}, 
 +  YEAR = {2014}, 
 +  MONTH = Jul, 
 +  HAL_ID = {hal-01017048},​ 
 +  HAL_VERSION = {v1}, 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2014931,​ 
 +    author = {Thomas Peyrin and Siang Meng Sim and Lei Wang and Guoyan Zhang}, 
 +    title = {Cryptanalysis of JAMBU}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​931},​ 
 +    year = {2014}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2014251,​ 
 +    author = {Guy Barwell}, 
 +    title = {Forgery on Stateless CMCC}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​251},​ 
 +    year = {2014}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +    url = "​http://​eprint.iacr.org/​2014/​251"​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​sablierFeng,​ 
 +    author = {Xiutao Feng and Fan Zhang}, 
 +    title = {A practical state recovery attack on the stream cipher Sablier v1} 
 +    url = "​http://​www.amss.ac.cn/​xwdt/​kydt/​201404/​t20140409_4087622.html"​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:​cryptoeprint2014226,​ 
 +    author = {Mohamed Ahmed Abdelraheem and Andrey Bogdanov and Elmar Tischhauser},​ 
 +    title = {Weak-Key Analysis of POET}, 
 +    howpublished = {Cryptology ePrint Archive, Report 2014/​226},​ 
 +    year = {2014}, 
 +    note = {\url{http://​eprint.iacr.org/​}},​ 
 +    url = "​http://​eprint.iacr.org/​2014/​226"​ 
 +
 +</​code>​ 
 +<code bibtex>​ 
 +@misc{:​ref:​caesar:cryptoeprint2014325,
     author = {Xiutao FENG, Fan ZHANG and Hui WANG},     author = {Xiutao FENG, Fan ZHANG and Hui WANG},
     title = {A practical forgery and state recovery attack on the authenticated cipher PANDA-s},     title = {A practical forgery and state recovery attack on the authenticated cipher PANDA-s},
Line 10: Line 138:
     year = {2014},     year = {2014},
     note = {\url{http://​eprint.iacr.org/​}},​     note = {\url{http://​eprint.iacr.org/​}},​
 +    url = "​http://​eprint.iacr.org/​2014/​325"​
 } }
 </​code>​ </​code>​
- 
 <code bibtex> <code bibtex>
 @misc{:​ref:​caesar:​screamForgerySimWang,​ @misc{:​ref:​caesar:​screamForgerySimWang,​
refnotes/caesar.1400145099.txt.gz · Last modified: 15/05/2014 09:11:39 by mmeh