User Tools

Site Tools


refnotes:caesar

This is an old revision of the document!


References

This page contains references to all third party cryptanalysis.

@misc{:ref:caesar:cryptoeprint2014325,
    author = {Xiutao FENG, Fan ZHANG and Hui WANG},
    title = {A practical forgery and state recovery attack on the authenticated cipher PANDA-s},
    howpublished = {Cryptology ePrint Archive, Report 2014/325},
    year = {2014},
    note = {\url{http://eprint.iacr.org/}},
}
@misc{:ref:caesar:screamForgerySimWang,
    author = {Siang Meng Sim and Lei Wang},
    title = {Practical Forgery Attacks on SCREAM and iSCREAM},
    year = {2014},
    note = {\url{http://www1.spms.ntu.edu.sg/~syllab/m/images/b/b3/ForgeryAttackonSCREAM.pdf}},
    url = "http://www1.spms.ntu.edu.sg/~syllab/m/images/b/b3/ForgeryAttackonSCREAM.pdf"
}
@misc{:ref:caesar:piCipherLeurent,
    author = {Gaëtan Leurent},
    title = {Tag Second-preimage Attack against π-cipher},
    year = {2014},
    note = {\url{http://hal.inria.fr/hal-00966794}},
    url = "http://hal.inria.fr/hal-00966794"
}
@misc{:ref:caesar:cryptoeprint2014217,
    author = {Yu Sasaki and Lei Wang},
    title = {A Forgery Attack against PANDA-s},
    howpublished = {Cryptology ePrint Archive, Report 2014/217},
    year = {2014},
    note = {\url{http://eprint.iacr.org/}},
    url = "http://eprint.iacr.org/2014/217"
}
@misc{:ref:caesar:cryptoeprint2014218,
    author = {Yu Sasaki and Lei Wang},
    title = {A Practical Universal Forgery Attack against PAES-8},
    howpublished = {Cryptology ePrint Archive, Report 2014/218},
    year = {2014},
    note = {\url{http://eprint.iacr.org/}},
    url = "http://eprint.iacr.org/2014/218"
}
@misc{:ref:caesar:paesJeanNicolic,
    author = {Jérémy Jean and Ivica Nikolić},
    title = {Using AES Round Symmetries to Distinguish PAES},
    year = {2014},
    note = {\url{http://www1.spms.ntu.edu.sg/~syllab/m/images/6/6e/Using_AES_Round_Symmetries_to_Distinguish_PAES.pdf}},
    url = "http://www1.spms.ntu.edu.sg/~syllab/m/images/6/6e/Using_AES_Round_Symmetries_to_Distinguish_PAES.pdf"
}
@misc{:ref:caesar:cryptoeprint2014197,
    author = {Jian Guo and Jérémy Jean and Thomas Peyrin and Wang Lei},
    title = {Breaking POET Authentication with a Single Query},
    howpublished = {Cryptology ePrint Archive, Report 2014/197},
    year = {2014},
    note = {\url{http://eprint.iacr.org/}},
    url = "http://eprint.iacr.org/2014/197"
}
@misc{:ref:caesar:keyrecoveryAVALANCHEv1,
    author = {Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser},
    title = {Cryptanalysis of AVALANCHEv1},
    year = {2014},
    howpublished = {Cryptographic Competitions Mailing List},
    note = {\url{http://martinlauridsen.info/pub/avalanchev1.pdf}},
    url = "http://martinlauridsen.info/pub/avalanchev1.pdf"
}
@misc{:ref:caesar:NandiCobraForgery,
    author = {Mridul Nandi},
    title = {Forging Attack on COBRA Mode},
    year = {2014},
    howpublished = {Cryptographic Competitions Mailing List}
}
@misc{:ref:caesar:wheestInria,
    author = {Anne Canteaut and Gaëtan Leurent},
    title = {Distinguishing and Key-recovery Attacks against Wheesht},
    year = {2014},
    howpublished = {Cryptographic Competitions Mailing List}
}
@misc{:ref:caesar:CalicoForgeryIaik,
    author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl\"{a}ffer},
    title = {Forgery and Key Recovery Attacks on Calico},
    year = {2014},
    howpublished = {Cryptographic Competitions Mailing List},
    note = {\url{http://ascon.iaik.tugraz.at/files/analysis_calico.pdf}},
    url = "http://ascon.iaik.tugraz.at/files/analysis_calico.pdf"
}
refnotes/caesar.1400145134.txt.gz · Last modified: 15/05/2014 09:12:14 by mmeh