Cite

[1] AES Competition, http://csrc.nist.gov/archive/aes/Search in Google Scholar

[2] eSTREAM Competition, http://competitions.cr.yp.to/estream.htmlSearch in Google Scholar

[3] SHA-3 Competition, http://csrc.nist.gov/groups/ST/hash/index.htmlSearch in Google Scholar

[4] BERSTEIN, D.: The CAESAR competition, http://competitions.cr.yp.to/caesar.htmlSearch in Google Scholar

[5] The CAESAR committee, http://competitions.cr.yp.to/caesar-committee.htmlSearch in Google Scholar

[6] US National Institute of Standards and Technology, http://www.nist.gov/Search in Google Scholar

[7] BERSTEIN, D.: (Google Groups), Cryptographic competitions, https://groups.google.com/forum/#!forum/crypto-competitionsSearch in Google Scholar

[8] BERSTEIN. D.: The CAESAR competition, http://competitions.cr.yp.to/caesar.htmlSearch in Google Scholar

[9] MENEZES, A. J.-VAN OORSCHOT, P. C.-VANSTONE, S. A. : Handbook of Applied Cryptography. CRC Press, 2001.Search in Google Scholar

[10] DOĞANAKSOY, A.-EGE, B. -KOCAK, O.-SULAK, F.: Cryptographic Randomness Testing of Block Ciphers and Hash Functions. In: IACR Cryptology ePrint Archive Vol. 564, 2010.Search in Google Scholar

[11] SULAK, F.: Statistical Analysis of Block Ciphers and Hash Functions, PhD Thesis,Middle East Technical University, February 2011.Search in Google Scholar

[12] RUKHIN, A.-SOTO, J.- NECHVATAL, J.-SMID, M.-BARKER, E.- LEIGH, S.- LEVENSON, M.-VANGEL, M.-BANKS, D.-HECKERT, A-DRAY, J.-VO, S.: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Special Publication 800-22. Revision 1a. April 2010.Search in Google Scholar

[13] SOTO, J.: Randomness testing of the advanced encryption standard candidate algorithms, NISTIR 6390, September 1999. https://csrc.nist.gov/csrc/media/publications/nistir/.../ir6390.pdf10.6028/NIST.IR.6390Search in Google Scholar

[14] SOTO, J.-BASSHAM, L.: Randomness testing of the advanced encryption standard finalist candidates, NISTIR 6483, March 28, 2000.10.6028/NIST.IR.6483Search in Google Scholar

[15] WEBSTER, A. F.- TAVARES, S.E.: On the design of S-boxes. In: Conference on Advances in Cryptology-CRYPTO 85, Lecture Notes in Comput. Sci. Vol. 218, Springer- -Verlag, New York, Inc., New York, NY, USA, 1986, pp. 523-534.Search in Google Scholar

[16] CALIK, C.-DOĞANAKSOY, A.-TURAN, M. S.-SARAN, N.B.: New distinguishers based on random mappings against stream ciphers. In: S. W. Golomb, M.G. Parker, A. Pott, and A.Winterhof, eds. SETA, Lecture Notes in Comput. Sci. Vol. 5203, Springer- -Verlag, New York, 2008, pp. 30-41.Search in Google Scholar

[17] GLIGOROSKI, D.-MIHAJLOSKA, H.-SAMARDJISKA, S.-JACOBSEN, H. - EL-HADEDY, M.-JENSEN, R. E.-OTTE, D.: π-Cipher v2.0, Submission to The CAESAR Competition, August 29, 2015.Search in Google Scholar

[18] LEURENT, G.: Tag second-peimage attack against π-cipher, 2014. (< hal − 00966794v2 >)Search in Google Scholar

[19] FUHR, T.-LEURENT, G.: Observation on π-Cipher, submission to CAESAR competition mailing list, November, 2014.Search in Google Scholar

[20] ALLEY, J.-PIEPRZYK, J.: State recovery attacks against π-Cipher. In: Proceedings of the Australasian Computer Science Week Multiconference, ACSW’16, February 1, 2016.Search in Google Scholar

[21] MIHAJLOSKA, H.-MENNINK, B.-GLIGOROSKI, D.: π-cipher with ntermediate tags, pi-cipher.org, May 13, 2016.Search in Google Scholar

[22] BOURA, C.-CHAKRABORTI, A.-LEURENT, G.-PAUL, G.-SAHA, D.- SOLEIMANY, H.-SUDER, V. : Key recovery attack against 2.5-round π-cipher. In: FSE ’16, May 23, 2016, IACR, report Vol. 502, 2016 (accepted paper).Search in Google Scholar

eISSN:
1210-3195
Language:
English
Publication timeframe:
3 times per year
Journal Subjects:
Mathematics, General Mathematics