Analysis of the CAESAR candidate silver
From MaRDI portal
Publication:2807229
Recommendations
- Can CAESAR beat Galois? Robustness of CAESAR candidates against nonce reusing and high data complexity attacks
- Collision attacks against CAESAR candidates. Forgery and key-recovery against AEZ and Marble
- The \texttt{Deoxys} AEAD family
- Practical Cryptanalysis of PAES
- Exploiting the leakage: analysis of some authenticated encryption schemes
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 2089131 (Why is no real title available?)
- scientific article; zbMATH DE number 2089318 (Why is no real title available?)
- scientific article; zbMATH DE number 1942411 (Why is no real title available?)
- A Classical Introduction to Cryptography
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Improved differential attacks for ECHO and Grøstl
- Improved key recovery attacks on reduced-round AES in the single-key setting
- The block cipher \textsc{Square}
- The software performance of authenticated-encryption modes
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
Cited in
(3)
This page was built for publication: Analysis of the CAESAR candidate silver
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2807229)