References
The CAESAR Committee. Competition for authenticated encryption: security, applicability, and robustness. 2014. http://competitions.cr.yp.to/caesar.html
Wu H, Huang T. The authenticated cipher MORUS (v1.1). 2016. http://competitions.cr.yp.to/round2/ morusv11.pdf
Mileva A, Dimitrova V, Velichkov V. Analysis of the authenticated cipher MORUS (v1). In: Proceedings of International Conference on Cryptography and Information Security in the Balkans, Koper, 2015. 45–59
Nozaki Y, Yoshikawa M. Power analysis attack for a fast authenticated encryption MORUS. In: Proceedings of International Conference on Applied System Innovation, Sapporo, 2017. 365–368
Dwivedi A D, Klouček M, Morawiecki P, et al. SATbased cryptanalysis of authenticated ciphers from the CAESAR competition. In: Proceedings of International Conference on Security and Cryptography, Madrid, 2017. 237–246
Zhang P, Guan J, Li J Z, et al. Research on the confusion and diffusion properties of the initialization of MORUS. J Cryptol Res, 2015, 2: 536–548
Guan J, Shi T R, Li J Z, et al. Analysis of MORUS against collision attack (in Chinese). J Elec Inf Tech, 2017, 39: 1704–1710
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant Nos. 61572516, 61602514, 61272041, 61272488).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Shi, T., Guan, J. Real-time state recovery attack against MORUS in nonce-misuse setting. Sci. China Inf. Sci. 62, 39109 (2019). https://doi.org/10.1007/s11432-017-9457-x
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-017-9457-x