Cryptanalysis of NORX v2.0
NORX is an authenticated encryption scheme with associated data being publicly scrutinized as part of the ongoing CAESAR competition, where 14 other primitives are also competing. It is based on the sponge construction and relies on a simple permutation that allows efficient and versatile implementa...
Main Authors: | Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jérémy Jean, Jean-René Reinhard |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2017-03-01
|
Series: | IACR Transactions on Symmetric Cryptology |
Subjects: | |
Online Access: | https://tosc.iacr.org/index.php/ToSC/article/view/589 |
Similar Items
-
Distinguishing Attack on NORX Permutation
by: Tao Huang, et al.
Published: (2018-03-01) -
Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks?
by: Colin Chaigneau, et al.
Published: (2016-12-01) -
Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency
by: Ethan Heilman, et al.
Published: (2020-09-01) -
Key-Recovery Attacks on Full Kravatte
by: Colin Chaigneau, et al.
Published: (2018-03-01) -
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
by: Iftekhar Salam, et al.
Published: (2018-01-01)