1 |
L. Jiao, B. Zhang and M. Wang, "Two Generic Methods of Analyzing Stream Ciphers," in Proc. of ISC 2015, pp. 379-396, Sep. 9-11, 2015.
|
2 |
F. Lafitte, L. Lerman, O. Markowitch et al., "SAT-based cryptanalysis of ACORN,".
|
3 |
X Zhang, X Feng, D Lin, et al, "Fault Attack on the Authenticated Cipher ACORN v2," Security & Communication Networks, 2017, 1-16, 2017.
|
4 |
Siddhanti A A, Maitra S, Sinha N, "Certain Observations on ACORN v3 and the Implications to TMDTO Attacks," in Proc. of Security, Privacy, and Applied Cryptography Engineering, pp. 264-280, Dec. 13-17, 2017.
|
5 |
P. Zhang, J. Guan, J. Li et al., "Research on State Collisions of Authenticated Cipher ACORN," in Proc. of ICSMIM 2015, pp.459-465, July 23-24, 2016.
|
6 |
S. Steve, "Formal analysis of a non-repudiation protocol," in Proc. of CSFW 1998, pp. 54-65, June 9-11, 1998.
|
7 |
"SHA-3 Competition (2007-2012)," Feb. 2005.
|
8 |
M. Bellare and C. Namprempre, "Authenticated encryption: Relations among notions and analysis of the generic composition paradigm," Journal of Cryptology, vol. 21, no. 4, pp. 469-491, Oct. 2008.
DOI
|
9 |
J. Daemen and V. Rijmen, "The Design of Rijndael: AES-the advanced encryption standard," Springer, Berlin, 2002.
|
10 |
"Caesar: Competition for authenticated encryption: Security, applicability, and robustness," Aug. 2016.
|
11 |
P. Hu, H. Ning, T. Qiu et al., "Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things," IEEE Internet of Thingsf Journal, vol. 4, no. 5, pp. 1143-1155, Jan. 2017.
DOI
|
12 |
Q. Xu, P. Ren, H. Song et al., "Security Enhancement for IoT Communications Exposed to Eavesdroppers with Uncertain Locations," IEEE Access, vol. 4, pp. 2840-2853, Jun. 2016.
DOI
|
13 |
V. T. Hoang, T. Krovetz, and P. Rogaway, "Robust authenticated-encryption: AEZ and the problem that it solves," in Proc. of EUROCRYPT 2015, pp. 15-44, April 26-30, 2015.
|
14 |
S. Javanmardi, M. Shojafar, S. Shariatmadari et al., "FRTRUST: a fuzzy reputation based model for trust management in semantic P2P grids," International Journal of Grid & Utility Computing, vol. 6, no. 1, pp. 57-66, Apr. 2014.
DOI
|
15 |
C. Dobrauning, M. Eichlseder and F. Mendel, "Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates," in Proc. of ASIACRYPT 2014, pp.490-509, December 7-11, 2014.
|
16 |
T. Peyrin, S. M. Sim, L. Wang et al., "Cryptanalysis of JAMBU," in Proc. of FSE 2015, pp. 264-281, March 8-11, 2015.
|
17 |
T. Fuhr, G. Leurent and V. Suder, "Collision Attacks against CAESAR Candidates Forgery and Key-Recovery against AEZ and Marble," in Proc. of ASIACRYPT 2015, pp. 510-532, November 29 - December 3, 2015.
|
18 |
H. J. Wu, "ACORN: A Lightweight Authenticated Cipher (v3)," Aug. 2015.
|
19 |
C. Colin, F.Thomas, and G. Henri, "Full key-recovery on ACORN in nonce-reuse and decryption misuse settings," 2015.
|
20 |
M. C. Liu and D. D. Lin, "Cryptanalysis of Lightweight Authenticated Cipher ACORN," 2014.
|
21 |
M. I. Salam, K. K. Wong, H. Bartlett et al., "Finding state collisions in the authenticated encryption stream cipher ACORN," in Proc. of Australasian Computer Science Week Multiconference, pp. 36-56, February 2-5, 2016.
|
22 |
M. I. Salam , H. Bartlett , E. Dawson et al., "Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN," in Proc. of Applications and Techniques in Information Security, pp.15-26, Oct 26-28, 2016.
|
23 |
S. Wang, B. Hu, Y. Liu et al., "Nonce-reuse Attack on Authenticated Cipher ACORN". in Proc. of AICS 2016, pp.379-385, September 20-21 2016.
|