User Tools

Site Tools


refnotes:caesar

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
refnotes:caesar [15/12/2014 13:18:58]
mmeh
refnotes:caesar [24/03/2015 10:37:50] (current)
mmeh
Line 3: Line 3:
 This page contains references to published third-party analysis. This page contains references to published third-party analysis.
  
 +<code bibtex>
 +@misc{:​ref:​caesar:​cryptoeprint2015212,​
 +    author = {Christof Beierle and Philipp Jovanovic and Martin M. Lauridsen and Gregor Leander and Christian Rechberger},​
 +    title = {Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows},
 +    howpublished = {Cryptology ePrint Archive, Report 2015/212},
 +    year = {2015},
 +    note = {\url{http://​eprint.iacr.org/​}},​
 +}
 +</​code>​
 +
 +<code bibtex>
 +@misc{:​ref:​caesar:​cryptoeprint2015134,​
 +    author = {Pierre Karpman},
 +    title = {From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions},​
 +    howpublished = {Cryptology ePrint Archive, Report 2015/134},
 +    year = {2015},
 +    note = {\url{http://​eprint.iacr.org/​}},​
 +}
 +</​code>​
 +
 +<code bibtex>
 +@incollection{:​ref:​caesar:​todoAokiProest,​
 +year={2014},​
 +isbn={978-3-319-12279-3},​
 +booktitle={Cryptology and Network Security},
 +volume={8813},​
 +series={Lecture Notes in Computer Science},
 +editor={Gritzalis,​ Dimitris and Kiayias, Aggelos and Askoxylakis,​ Ioannis},
 +doi={10.1007/​978-3-319-12280-9_5},​
 +title={FFT Key Recovery for Integral Attack},
 +url={http://​dx.doi.org/​10.1007/​978-3-319-12280-9_5},​
 +publisher={Springer International Publishing},​
 +keywords={Block cipher; Integral attack; Fast Fourier Transform; Fast Walsh-Hadamard Transform; Prøst; CLEFIA; AES},
 +author={Todo,​ Yosuke and Aoki, Kazumaro},
 +pages={64-81},​
 +language={English}
 +}
 +</​code>​
 +
 +<code bibtex>
 +@misc{:​ref:​caesar:​screamWeakKeys,​
 +    author = {Gregor Leander and Brice Minaud and Sondre Rønjom},
 +    title = {A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro},
 +    howpublished = {Cryptology ePrint Archive, Report 2015/068},
 +    year = {2015},
 +    note = {\url{http://​eprint.iacr.org/​}},​
 +}
 +</​code>​
 +
 +<code bibtex>
 +@misc{:​ref:​caesar:​marble-forgery,​
 +  TITLE = {{Forgery and Key-Recovery Attacks on CAESAR Candidate Marble}},
 +  AUTHOR = {Fuhr, Thomas and Leurent, Ga{\"​e}tan and Suder, Valentin},
 +  URL = {https://​hal.inria.fr/​hal-01102031},​
 +  YEAR = {2015},
 +  MONTH = Jan,
 +  KEYWORDS = {forgery ; Marble ; key-recovery ; CAESAR competition ; authenticated encryption},​
 +  HAL_ID = {hal-01102031},​
 +  HAL_VERSION = {v2},
 +}
 +</​code>​
 +<code bibtex>
 +@misc{:​ref:​caesar:​lu-copa,​
 +    author = {Jiqiang Lu},
 +    title = {On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack},
 +    howpublished = {Cryptology ePrint Archive, Report 2015/079},
 +    year = {2015},
 +    note = {\url{http://​eprint.iacr.org/​}},​
 +}
 +</​code>​
 +<code bibtex>
 +@misc{:​ref:​caesar:​asconIaik,​
 +  title = {Cryptanalysis of {Ascon}},
 +  author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl\"​{a}ffer},​
 +  howpublished = {Cryptology ePrint Archive, Report 2015/030; extended version of CT-RSA 2015},
 +  year = {2015},
 +  note = {\url{http://​eprint.iacr.org/​2015/​030}},​
 +  url = "​http://​eprint.iacr.org/​2015/​030",​
 +}
 +</​code>​
 <code bibtex> <code bibtex>
 @unpublished{:​ref:​caesar:​leurenthal01017048,​ @unpublished{:​ref:​caesar:​leurenthal01017048,​
refnotes/caesar.1418649538.txt.gz · Last modified: 15/12/2014 13:18:58 by mmeh