User Tools

Site Tools


refnotes:caesar

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
refnotes:caesar [18/02/2015 14:36:34]
mmeh added Lu
refnotes:caesar [24/03/2015 10:37:50] (current)
mmeh
Line 2: Line 2:
  
 This page contains references to published third-party analysis. This page contains references to published third-party analysis.
 +
 +<code bibtex>
 +@misc{:​ref:​caesar:​cryptoeprint2015212,​
 +    author = {Christof Beierle and Philipp Jovanovic and Martin M. Lauridsen and Gregor Leander and Christian Rechberger},​
 +    title = {Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows},
 +    howpublished = {Cryptology ePrint Archive, Report 2015/212},
 +    year = {2015},
 +    note = {\url{http://​eprint.iacr.org/​}},​
 +}
 +</​code>​
 +
 +<code bibtex>
 +@misc{:​ref:​caesar:​cryptoeprint2015134,​
 +    author = {Pierre Karpman},
 +    title = {From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions},​
 +    howpublished = {Cryptology ePrint Archive, Report 2015/134},
 +    year = {2015},
 +    note = {\url{http://​eprint.iacr.org/​}},​
 +}
 +</​code>​
 +
 +<code bibtex>
 +@incollection{:​ref:​caesar:​todoAokiProest,​
 +year={2014},​
 +isbn={978-3-319-12279-3},​
 +booktitle={Cryptology and Network Security},
 +volume={8813},​
 +series={Lecture Notes in Computer Science},
 +editor={Gritzalis,​ Dimitris and Kiayias, Aggelos and Askoxylakis,​ Ioannis},
 +doi={10.1007/​978-3-319-12280-9_5},​
 +title={FFT Key Recovery for Integral Attack},
 +url={http://​dx.doi.org/​10.1007/​978-3-319-12280-9_5},​
 +publisher={Springer International Publishing},​
 +keywords={Block cipher; Integral attack; Fast Fourier Transform; Fast Walsh-Hadamard Transform; Prøst; CLEFIA; AES},
 +author={Todo,​ Yosuke and Aoki, Kazumaro},
 +pages={64-81},​
 +language={English}
 +}
 +</​code>​
 +
 +<code bibtex>
 +@misc{:​ref:​caesar:​screamWeakKeys,​
 +    author = {Gregor Leander and Brice Minaud and Sondre Rønjom},
 +    title = {A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro},
 +    howpublished = {Cryptology ePrint Archive, Report 2015/068},
 +    year = {2015},
 +    note = {\url{http://​eprint.iacr.org/​}},​
 +}
 +</​code>​
 +
 +<code bibtex>
 +@misc{:​ref:​caesar:​marble-forgery,​
 +  TITLE = {{Forgery and Key-Recovery Attacks on CAESAR Candidate Marble}},
 +  AUTHOR = {Fuhr, Thomas and Leurent, Ga{\"​e}tan and Suder, Valentin},
 +  URL = {https://​hal.inria.fr/​hal-01102031},​
 +  YEAR = {2015},
 +  MONTH = Jan,
 +  KEYWORDS = {forgery ; Marble ; key-recovery ; CAESAR competition ; authenticated encryption},​
 +  HAL_ID = {hal-01102031},​
 +  HAL_VERSION = {v2},
 +}
 +</​code>​
 <code bibtex> <code bibtex>
 @misc{:​ref:​caesar:​lu-copa,​ @misc{:​ref:​caesar:​lu-copa,​
refnotes/caesar.1424270194.txt.gz · Last modified: 18/02/2015 14:36:34 by mmeh