Citation: | SHI Tairong, HU Bin, GUAN Jie, et al., “Cryptanalysis of AEGIS-128,” Chinese Journal of Electronics, vol. 31, no. 2, pp. 285-292, 2022, doi: 10.1049/cje.2020.00.231 |
[1] |
M. Bellare and C. Namprempre, “Authenticated encryption: Relations among notions and analysis of the generic composition paradigm,” Journal of Cryptology, vol.21, no.4, pp.531–545, 2008.
|
[2] |
CAESAR, “Competition for authenticated encryption: Security, applicability and robustness,” available at: http:// competition.cr.yp.to/caesar.html, 2019.
|
[3] |
D. A. Mcgrew and J. Viega, “The Galois/counter mode of operation (GCM),” The 5th International Conference on Cryptology in India (INDOCRYPT 2004), Chennai, India, pp.343–355, 2004.
|
[4] |
T. Ashur, M. Eichlseder, M. M. Lauridsen, et al., “Cryptanalysis of MORUS,” The 24th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2018), Brisbane, QLD, Australia, pp.35–64, 2018.
|
[5] |
Y. Sasaki, “Improved related-tweakey boomerang attacks on deoxys-BC,” The 10th International Conference on Cryptology in Africa (AFRICACRYPT 2018), Marrakesh, Morocco, pp.87–106, 2018.
|
[6] |
A. Bar-On, O. Dunkelman, N. Keller, et al., “DLCT: A new tool for differential-linear cryptanalysis,” The 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2019), Darmstadt, Germany, pp.313–342, 2019.
|
[7] |
T. R. Shi and J. Guan, “Real-time state recovery attack against MORUS in nonce-misuse setting,” Science China Information Sciences, vol.63, no.3, pp.214–216, 2019.
|
[8] |
Danping Shi, Siwei Sun, Yu Sasaki, et al., “Correlation of quadratic Boolean functions: Cryptanalysis of all versions of full MORUS,” The 39th Annual International Cryptology Conference (CRYPTO 2019), IACR, Santa Barbara, CA, USA, pp.190–209, 2019.
|
[9] |
H. J. Wu and B. Preneel, “AEGIS: A fast authenticated encryption algorithm,” available at: http://competitions.cr.yp.to/round3/aegisv11.pdf, 2016.
|
[10] |
H. J. Wu and B. Preneel, “AEGIS: A fast authenticated encryption algorithm,” The 20th International Conference on Selected Areas in Cryptography (SAC 2013), Burnaby, BC, Canada, pp.185–201, 2013.
|
[11] |
D. F. Ye, P. Wang, L. Hu, et al., “PAES v1: Parallelizable authenticated encryption schemes based on AES round function,” available at: http://competitions.cr.yp.to/round1/paesv1.pdf, 2014.
|
[12] |
I. Nikolić, “Tiaoxin-346,” available at: http://competitions.cr.yp.to/round3/tiaoxinv21.pdf, 2016.
|
[13] |
B. Minaud, “Linear biases in AEGIS keystream,” The 21st International Conference on Selected Areas in Cryptography (SAC 2014), Montreal, Canada, pp.290–305, 2014.
|
[14] |
P. Dey, R. S. Rohit, S. Sarkar, et al., “Differential fault analysis on Tiaoxin and AEGIS family of ciphers,” The 4th International Symposium on Security in Computing and Communications (SSCC 2016), Jaipur, India, pp.74–86, 2016.
|
[15] |
D. S. N. Mary and A. T. Begum, “An algorithm for moderating DoS attack in web based application,” The 14th International Colloquium on Theoretical Aspects of Computing (ICTAC 2017), Hanoi, Vietnam, pp.26–31, 2017.
|
[16] |
T. R. Shi, J. Guan, and W. Z. Liu, “Analysis on the weak states of AEGIS,” Acta Electronica Sinica, vol.46, no.9, pp.2102–2107, 2018. (in Chinese)
|
[17] |
M. Eichlseder, M. Nageler, and R. Primas, “Analyzing the linear keystream biases in AEGIS,” IACR Transactions on Symmetric Cryptology, vol.2019, no.4, pp.348–368, 2019.
|
[18] |
P. Derbez, P. A. Fouque, and J. Jean, “Improved key recovery attacks on reduced-round AES in the single-key setting,” The 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2013), Athens, Greece, pp.371–387, 2013.
|
[19] |
D. R. Simon, “On the power of quantum computation,” SIAM Journal on Computing, vol.26, no.5, pp.1474–1509, 1997. doi: 10.1137/S0097539796298637
|
[20] |
H. Kuwakado and M. Morii, “Quantum distinguisher between the 3-round Feistel cipher and the random permutation,” International Symposium on Information Theory and Its Applications, vol.41, no.3, pp.2682–2685, 2010.
|
[21] |
H. Kuwakado and M. Morii, “Security on the quantum-type Even-Mansour cipher,” International Sympsium on Information Theory and Its Applications, Hawaii, USA, pp.312–316, 2012.
|
[22] |
M. Kaplan, G. Leurent, A. Leverrier, et al., “Breaking symmetric cryptosystems using quantum period finding,” The 36th International Cryptology Conference (CRYPTO 2016), Santa Barbara, USA, pp.207–237, 2016.
|
[23] |
G. Leander and A. May, “Grover meets simon - quantumly attacking the FX-construction,” The 23rd International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT 2017), Hong Kong, China, pp.161–178, 2017.
|
[24] |
L. K. Grover, “A fast quantum mechanical algorithm for database search,” The 28th Annual ACM Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, pp.212–219, 1996.
|