This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
refnotes:caesar [18/02/2015 14:36:34] mmeh added Lu |
refnotes:caesar [24/03/2015 10:37:50] (current) mmeh |
||
---|---|---|---|
Line 2: | Line 2: | ||
This page contains references to published third-party analysis. | This page contains references to published third-party analysis. | ||
+ | |||
+ | <code bibtex> | ||
+ | @misc{:ref:caesar:cryptoeprint2015212, | ||
+ | author = {Christof Beierle and Philipp Jovanovic and Martin M. Lauridsen and Gregor Leander and Christian Rechberger}, | ||
+ | title = {Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows}, | ||
+ | howpublished = {Cryptology ePrint Archive, Report 2015/212}, | ||
+ | year = {2015}, | ||
+ | note = {\url{http://eprint.iacr.org/}}, | ||
+ | } | ||
+ | </code> | ||
+ | |||
+ | <code bibtex> | ||
+ | @misc{:ref:caesar:cryptoeprint2015134, | ||
+ | author = {Pierre Karpman}, | ||
+ | title = {From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions}, | ||
+ | howpublished = {Cryptology ePrint Archive, Report 2015/134}, | ||
+ | year = {2015}, | ||
+ | note = {\url{http://eprint.iacr.org/}}, | ||
+ | } | ||
+ | </code> | ||
+ | |||
+ | <code bibtex> | ||
+ | @incollection{:ref:caesar:todoAokiProest, | ||
+ | year={2014}, | ||
+ | isbn={978-3-319-12279-3}, | ||
+ | booktitle={Cryptology and Network Security}, | ||
+ | volume={8813}, | ||
+ | series={Lecture Notes in Computer Science}, | ||
+ | editor={Gritzalis, Dimitris and Kiayias, Aggelos and Askoxylakis, Ioannis}, | ||
+ | doi={10.1007/978-3-319-12280-9_5}, | ||
+ | title={FFT Key Recovery for Integral Attack}, | ||
+ | url={http://dx.doi.org/10.1007/978-3-319-12280-9_5}, | ||
+ | publisher={Springer International Publishing}, | ||
+ | keywords={Block cipher; Integral attack; Fast Fourier Transform; Fast Walsh-Hadamard Transform; Prøst; CLEFIA; AES}, | ||
+ | author={Todo, Yosuke and Aoki, Kazumaro}, | ||
+ | pages={64-81}, | ||
+ | language={English} | ||
+ | } | ||
+ | </code> | ||
+ | |||
+ | <code bibtex> | ||
+ | @misc{:ref:caesar:screamWeakKeys, | ||
+ | author = {Gregor Leander and Brice Minaud and Sondre Rønjom}, | ||
+ | title = {A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro}, | ||
+ | howpublished = {Cryptology ePrint Archive, Report 2015/068}, | ||
+ | year = {2015}, | ||
+ | note = {\url{http://eprint.iacr.org/}}, | ||
+ | } | ||
+ | </code> | ||
+ | |||
+ | <code bibtex> | ||
+ | @misc{:ref:caesar:marble-forgery, | ||
+ | TITLE = {{Forgery and Key-Recovery Attacks on CAESAR Candidate Marble}}, | ||
+ | AUTHOR = {Fuhr, Thomas and Leurent, Ga{\"e}tan and Suder, Valentin}, | ||
+ | URL = {https://hal.inria.fr/hal-01102031}, | ||
+ | YEAR = {2015}, | ||
+ | MONTH = Jan, | ||
+ | KEYWORDS = {forgery ; Marble ; key-recovery ; CAESAR competition ; authenticated encryption}, | ||
+ | HAL_ID = {hal-01102031}, | ||
+ | HAL_VERSION = {v2}, | ||
+ | } | ||
+ | </code> | ||
<code bibtex> | <code bibtex> | ||
@misc{:ref:caesar:lu-copa, | @misc{:ref:caesar:lu-copa, |