Have a personal or library account? Click to login
Improvement on Bit Diffusion Analysis of π-Cipher Cover
Open Access
|Mar 2018

References

  1. [1] AES Competition, http://csrc.nist.gov/archive/aes/
  2. [2] eSTREAM Competition, http://competitions.cr.yp.to/estream.html
  3. [3] SHA-3 Competition, http://csrc.nist.gov/groups/ST/hash/index.html
  4. [4] BERSTEIN, D.: The CAESAR competition, http://competitions.cr.yp.to/caesar.html
  5. [5] The CAESAR committee, http://competitions.cr.yp.to/caesar-committee.html
  6. [6] US National Institute of Standards and Technology, http://www.nist.gov/
  7. [7] BERSTEIN, D.: (Google Groups), Cryptographic competitions, https://groups.google.com/forum/#!forum/crypto-competitions
  8. [8] BERSTEIN. D.: The CAESAR competition, http://competitions.cr.yp.to/caesar.html
  9. [9] MENEZES, A. J.-VAN OORSCHOT, P. C.-VANSTONE, S. A. : Handbook of Applied Cryptography. CRC Press, 2001.
  10. [10] DOĞANAKSOY, A.-EGE, B. -KOCAK, O.-SULAK, F.: Cryptographic Randomness Testing of Block Ciphers and Hash Functions. In: IACR Cryptology ePrint Archive Vol. 564, 2010.
  11. [11] SULAK, F.: Statistical Analysis of Block Ciphers and Hash Functions, PhD Thesis,Middle East Technical University, February 2011.
  12. [12] RUKHIN, A.-SOTO, J.- NECHVATAL, J.-SMID, M.-BARKER, E.- LEIGH, S.- LEVENSON, M.-VANGEL, M.-BANKS, D.-HECKERT, A-DRAY, J.-VO, S.: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Special Publication 800-22. Revision 1a. April 2010.
  13. [13] SOTO, J.: Randomness testing of the advanced encryption standard candidate algorithms, NISTIR 6390, September 1999. https://csrc.nist.gov/csrc/media/publications/nistir/.../ir6390.pdf10.6028/NIST.IR.6390
  14. [14] SOTO, J.-BASSHAM, L.: Randomness testing of the advanced encryption standard finalist candidates, NISTIR 6483, March 28, 2000.10.6028/NIST.IR.6483
  15. [15] WEBSTER, A. F.- TAVARES, S.E.: On the design of S-boxes. In: Conference on Advances in Cryptology-CRYPTO 85, Lecture Notes in Comput. Sci. Vol. 218, Springer- -Verlag, New York, Inc., New York, NY, USA, 1986, pp. 523-534.
  16. [16] CALIK, C.-DOĞANAKSOY, A.-TURAN, M. S.-SARAN, N.B.: New distinguishers based on random mappings against stream ciphers. In: S. W. Golomb, M.G. Parker, A. Pott, and A.Winterhof, eds. SETA, Lecture Notes in Comput. Sci. Vol. 5203, Springer- -Verlag, New York, 2008, pp. 30-41.
  17. [17] GLIGOROSKI, D.-MIHAJLOSKA, H.-SAMARDJISKA, S.-JACOBSEN, H. - EL-HADEDY, M.-JENSEN, R. E.-OTTE, D.: π-Cipher v2.0, Submission to The CAESAR Competition, August 29, 2015.
  18. [18] LEURENT, G.: Tag second-peimage attack against π-cipher, 2014. (< hal − 00966794v2 >)
  19. [19] FUHR, T.-LEURENT, G.: Observation on π-Cipher, submission to CAESAR competition mailing list, November, 2014.
  20. [20] ALLEY, J.-PIEPRZYK, J.: State recovery attacks against π-Cipher. In: Proceedings of the Australasian Computer Science Week Multiconference, ACSW’16, February 1, 2016.
  21. [21] MIHAJLOSKA, H.-MENNINK, B.-GLIGOROSKI, D.: π-cipher with ntermediate tags, pi-cipher.org, May 13, 2016.
  22. [22] BOURA, C.-CHAKRABORTI, A.-LEURENT, G.-PAUL, G.-SAHA, D.- SOLEIMANY, H.-SUDER, V. : Key recovery attack against 2.5-round π-cipher. In: FSE ’16, May 23, 2016, IACR, report Vol. 502, 2016 (accepted paper).
DOI: https://doi.org/10.1515/tmmp-2017-0023 | Journal eISSN: 1338-9750 | Journal ISSN: 12103195
Language: English
Page range: 139 - 149
Submitted on: Sep 28, 2016
Published on: Mar 23, 2018
Published by: Slovak Academy of Sciences, Mathematical Institute
In partnership with: Paradigm Publishing Services
Publication frequency: 3 issues per year
Keywords:

© 2018 Fatih Sulak, Beyza Bozdemir, Betül A. Özdemir, Neşe Koçak, Onur Koçak, published by Slovak Academy of Sciences, Mathematical Institute
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.