[1] |
WU H J . ACORN:a lightweight authenticated cipher (v1)[R]. CAESAR First Round Submission, 2014.
|
[2] |
WU H J . ACORN:a lightweight authenticated cipher (v2)[R]. CAESAR Second Round Submission, 2015.
|
[3] |
WU H J . ACORN:a lightweight authenticated cipher (v3)[R]. Candidate for the CAESAR Competition, 2016.
|
[4] |
LIU M C , LIN D D . Cryptanalysis of lightweight authenticated cipher acorn[R]. Crypto-Competition Mailing List, 2014.
|
[5] |
CHAIGNEAU C , FUHR T , GIBERT H . Full key-recovery on acorn in nonce-reuse and decryption-misuse settings[R]. Crypto-Competition Mailing List, 2015.
|
[6] |
WANG S P , HU B , LIU Y ,et al. Nonce-reuse attack on authenticated cipher ACORN[C]// 2016 International Conference on Artificial Intelligence and Computer Science. Lancaster:DEStech Publication, 2016: 379-385.
|
[7] |
ZHANG X J , LIN D D . Cryptanalysis of ACORN in nonce-reuse setting[C]// 13th International Conference on Information Security and Cryptology. Berlin:Springer, 2017: 342-361.
|
[8] |
SALAM M , BARTLETT H , DAWSON E ,et al. Investigating cube attacks on the authenticated encryption stream cipher acorn[C]// 2016 International Conference on Applications and Techniques in Information Security. Berlin:Springer, 2016: 15-26.
|
[9] |
SALAM M , WONG K , BARTLETT H ,et al. Finding state collisions in the authenticated encryption stream cipher ACORN[C]// 2016 Proceedings of the Australasian Computer Science Week Multiconference. New York:ACM Press, 2016,36: 1-10.
|
[10] |
LAFITTE F , LERMAN L , MARKOWITCH O ,et al. SAT-based cryptanalysis of ACORN[R]. IACR Cryptology ePrint Archive,Report 2016/521, 2016.
|
[11] |
DWIVEDI A D , KLOU?EK M , MORAWIECKI P . SAT-based cryptanalysis of authenticated ciphers from the CAESAR competetion[C]// 2017 The 14th International Conference on Security and Cryptography. Berlin:Springer, 2017: 275-284.
|
[12] |
DIBYENDU R , SOURAV M . Some results on ACORN[R]. IACR Cryptology ePrint Archive,Report 2016/1132, 2016.
|
[13] |
TODO Y , ISOBE T , HAO Y L ,et al. Cube attacks on non-blackbox polynomials based on division property[C]// 2017 37th Annual International Cryptology Conference. Berlin:Springer, 2017: 250-279.
|
[14] |
SIDDHANTI A A , MAITRA S , SINHA N . Certain observations on acorn v3 and the implications to TMDTO attacks[C]// 2017 7th International Conference on Security,Privacy,and Applied Cryptography Engineering. Berlin:Springer, 2017: 264-280.
|
[15] |
GHAFARI V A , HU H G . A new chosen IV statistical distinguishing framework to attack symmetric ciphers,and its application to ACORN-v3 and Grain-128a[J]. Journal of Ambient Intelligence and Humanized Computing, 2019,10: 2393-2400.
|
[16] |
WANG Q J , HAO Y L , TODO Y ,et al. Improved division property based cube attacks exploiting algebraic properties of superpoly[C]// 2018 38th Annual International Cryptology Conference. Berlin:Springer, 2018: 275-305.
|
[17] |
ZHANG F , LIANG Z Y , YANG B L ,et al. Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition[J]. Frontiers of Information Technology &Electronic Engineering, 2018,19(12): 1475-1499.
|
[18] |
YANG J C , LIU M C , LIN D D . Cube cryptanalysis of round-reduced ACORN[C]// 2019 22nd International Conference on Information Security. Berlin:Springer, 2019: 44-64.
|
[19] |
KESARWANI A , ROY D , SARKAR S ,et al. New cube distinguishers on NFSR-based stream ciphers[J]. Design,Codes and Cryptography, 2020,88: 173-199.
|