Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reference another security analysis paper #44

Merged
merged 1 commit into from
Aug 8, 2024
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
30 changes: 29 additions & 1 deletion draft-irtf-cfrg-aegis-aead.md
Original file line number Diff line number Diff line change
Expand Up @@ -39,6 +39,34 @@ informative:
org: KU Leuven
date: 2016

AIKRS24:
title: "Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers—Rocca, Rocca-S and AEGIS"
rc: "Journal of Cryptographic Engineering, 2024"
seriesinfo:
DOI: 10.1007/s13389-024-00360-6
author:
-
ins: R. Anand
name: Ravi Anand
org: Indraprastha Institute of Information Technology Delhi; University of Hyogo
-
ins: T. Isobe
name: Takanori Isobe
org: University of Hyogo
-
ins: A. K. Kundu
name: Anup Kumar Kundu
org: Indian Statistical Institute Kolkata
-
ins: M. Rahman
name: Mostafizar Rahman
org: University of Hyogo
-
ins: S. Suryawanshi
name: Sahiba Suryawanshi
org: University of Hyogo; Indian Institute of Technology Bhilai
date: 2024

BS23:
title: "Single-query Quantum Hidden Shift Attacks"
rc: "Cryptology ePrint Archive, Paper 2023/1306"
Expand Down Expand Up @@ -1625,7 +1653,7 @@ AEGIS-128X and AEGIS-256X share the same security properties and requirements as

AEGIS is considered secure against guess-and-determine attacks aimed at recovering the state from observed ciphertexts. This resilience extends to quantum adversaries in the Q1 model, wherein quantum attacks do not confer any practical advantage for decrypting previously recorded ciphertexts or achieving key recovery.

Security analyses of AEGIS can be found in {{AEGIS}}, {{M14}}, {{FLLW17}}, {{ENP19}}, {{LIMS21}}, {{JLD21}}, {{STSI23}}, {{IR23}}, and {{BS23}}.
Security analyses of AEGIS can be found in {{AEGIS}}, {{M14}}, {{FLLW17}}, {{ENP19}}, {{LIMS21}}, {{JLD21}}, {{STSI23}}, {{IR23}}, {{BS23}}, and {{AIKRS24}}.

# IANA Considerations

Expand Down
Loading