Cryptanalysis of \texttt{NORX} v2.0
From MaRDI portal
Publication:2010594
DOI10.1007/S00145-018-9297-9zbMATH Open1435.94125OpenAlexW2806926746WikidataQ129728340 ScholiaQ129728340MaRDI QIDQ2010594FDOQ2010594
Authors: Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jérémy Jean, Jean-René Reinhard
Publication date: 27 November 2019
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-018-9297-9
Recommendations
Cites Work
- Progress in Cryptology - INDOCRYPT 2004
- Title not available (Why is that?)
- Advances in cryptology -- ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7--11, 2014, Proceedings, Part II
- A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro
- How to securely release unverified plaintext in authenticated encryption
- Rotational cryptanalysis of ARX
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- BLAKE2: simpler, smaller, fast as MD5
- Analysis of NORX: investigating differential and rotational properties
- Sandwich construction for keyed sponges: independence between capacity and online queries
- Beyond \(2^{c/2}\) security in sponge-based authenticated encryption modes
- Cryptanalysis of reduced NORX
Cited In (16)
- Analysis of NORX: investigating differential and rotational properties
- Exploiting the leakage: analysis of some authenticated encryption schemes
- Cryptanalysis of the AEAD and hash algorithm DryGASCON
- Beyond \(2^{c/2}\) security in sponge-based authenticated encryption modes
- Cryptanalysis of reduced NORX
- Breaking \textsc{Panther}
- NORX: Parallel and scalable AEAD
- Beyond conventional security in sponge-based authenticated encryption modes
- Cryptanalysis of the Double-Feedback XOR-Chain Scheme Proposed in Indocrypt 2013
- Security analysis of subterranean 2.0
- Generic attack on duplex-based AEAD modes using random function statistics
- Algebraic key-recovery attacks on reduced-round Xoofff
- Forgery and subkey recovery on CAESAR candidate iFeed
- Practical forgeries for ORANGE
- Cryptanalysis of Ascon
- An observation on NORX, BLAKE2, and ChaCha
Uses Software
This page was built for publication: Cryptanalysis of \texttt{NORX} v2.0
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2010594)