[1] |
CAESAR-competition for authenticated encryption: security, ap-plicability and robustness[EB/OL]. .
|
[2] |
NASOUR B , JAVAD A , MOHAMMAD R . A single query forgery on avalanchev1[J]. Cryptographic Competitions Mailing List, 2014.
|
[3] |
GUY B . Forgery on stateless cmcc[EB/OL]. .
|
[4] |
CHRISTOPH D , MARIA E , FLORIAN M , et al. Forgery and key recovery attacks on calico[EB/OL]. .
|
[5] |
THOMAS F , GA?TAN L , VALENTIN S . Forgery and key- recov-ery attacks on CAESAR candidate marble[EB/OL]. .
|
[6] |
CHRISTOPH V , LEURENT G , STANDAERT F , et al. SCREAM &iSCREAM side-channel resistant authenticated encryption with masking[EB/OL]. .
|
[7] |
GROSSO V , LEURENT G , STANDAERT F , et al. LS-designs:bitslice encryption for efficient masked software implementa-tions[C]// Fast Software Encryption. Berlin: Springer,c 2014: 18-37.
|
[8] |
SIANG M , LEI W . Practical forgery attacks on scream and is-cream[EB/OL]. .
|
[9] |
GREGOR L , BRICE M , SONDRE R . A generic approach to invariant subspace attacks: cryptanalysis of robin, iscream and zorro[EB/OL]. .
|
[10] |
ABED F , FORLER C , LUCKS S . General Overview of the First-Round CAESAR Candidates for Authenticated Ecryption[R]. 2014.
|
[11] |
LISKOV M , RIVEST R L , WAGNER D . Wagner. Tweakable block ciphers[J]. Journal of Cryptology, 2011,24(3): 588-613.
|
[12] |
BRINCAT K , MITCHELL C J . New CBC-MAC forgery at-tacks[C]// Lecture Notes in Computer Science. c 2010: 3-14.
|
[13] |
陈杰, 胡予濮, 韦永壮 . 随机消息伪造攻击 PMAC 和TMAC-V[J]. 计算机学报, 2007,30(10): 1827-1832.
|
|
CHEN J , HU Y P , WEI Y Z . Random message forgery attack PMAC and TMAC-V[J]. Chinese Journal of Computers, 2007,30(10): 1827-1832.
|
[14] |
晁仕德, 张绍兰, 田华 , 等. 改进的PMAC及安全性分析[J]. 计算机工程与应用, 2009,45(21): 77-78.
|
|
CHAO S D , ZHANG S L , TIAN H , et al. Modified PMAC and se-curity analysis[J]. Computer Engineering and Applications, 2009,45(21): 77-78.
|