CAESAR. CAESAR: Competition for Authenticated En-
cryption: Security, Applicability, and Robustness.
http://competitions.cr.yp.to/caesar.html.
Cook, S. A. (1971). The complexity of theorem-proving
procedures. In Proceedings of the third annual ACM
symposium on Theory of computing, STOC ’71, pages
151–158, New York, NY, USA. ACM.
Cook, S. A. and Mitchell, D. G. (1997). Finding Hard In-
stances of the Satisfiability Problem: A Survey. pages
1–17. American Mathematical Society.
Courtois, N., Bard, G., and Wagner, D. (2008). Algebraic
and Slide Attacks on KeeLoq. In Nyberg, K., edi-
tor, Fast Software Encryption, volume 5086 of LNCS,
pages 97–115. Springer Berlin / Heidelberg.
Courtois, N. and Pieprzyk, J. (2002). Cryptanalysis of
Block Ciphers with Overdefined Systems of Equa-
tions. In Zheng, Y., editor, Advances in Cryptology
— ASIACRYPT 2002, volume 2501 of Lecture Notes
in Computer Science, pages 267–287. Springer Berlin
/ Heidelberg.
Das, S., Maitra, S., and Meier, W. (2015). Higher Order Dif-
ferential Analysis of NORX. IACR Cryptology ePrint
Archive, 2015:186.
Davis, M., Logemann, G., and Loveland, D. (1962). A ma-
chine program for theorem-proving. Communications
of the ACM, 7(5):394–397.
Davis, M. and Putnam, H. (1960). A computing procedure
for quantification theory. Journal of the ACM, 7:201–
215.
Dobraunig, C., Eichlseder, M., and Mendel, F. (2015a).
Forgery Attacks on Round-Reduced ICEPOLE-128.
In Selected Areas in Cryptography - SAC 2015 - 22nd
International Conference, Sackville, NB, Canada, Au-
gust 12-14, 2015, Revised Selected Papers, pages
479–492.
Dobraunig, C., Eichlseder, M., and Mendel, F. (2015b).
Heuristic tool for linear cryptanalysis with applica-
tions to CAESAR candidates. In Iwata, T. and Cheon,
J. H., editors, ASIACRYPT 2015, Part II, volume 9453
of LNCS, pages 490–509. Springer, Heidelberg.
Dobraunig, C., Eichlseder, M., Mendel, F., and Schläffer,
M. (2015c). Cryptanalysis of Ascon. In Nyberg, K.,
editor, CT-RSA 2015, volume 9048 of LNCS, pages
371–387. Springer, Heidelberg.
Dobraunig, C., Eichlseder, M., Mendel, F., and Schläffer,
M. Ascon A Family of Authenticated Encryption Al-
gorithms. http://ascon.iaik.tugraz.at.
Homsirikamol, E., Morawiecki, P., Rogawski, M., and Sre-
brny, M. (2012). Security Margin Evaluation of SHA-
3 Contest Finalists through SAT-based Attacks. In
11th Int. Conf. on Information Systems and Industrial
Management, volume 7564 of LNCS. Springer Berlin
Heidelberg.
Huang, T., Tjuawinata, I., and Wu, H. (2015). Differential-
linear cryptanalysis of ICEPOLE. In Leander, G., edi-
tor, FSE 2015, volume 9054 of LNCS, pages 243–263.
Springer, Heidelberg.
Lafitte, F., Lerman, L., Markowitch, O., and Heule, D. V.
(2016). SAT-based cryptanalysis of ACORN. IACR
Cryptology ePrint Archive, 2016:521.
Mileva, A., Dimitrova, V., and Velichkov, V. (2015).
Analysis of the Authenticated Cipher MORUS (v1).
In Cryptography and Information Security in the
Balkans - Second International Conference, Balkan-
CryptSec 2015, Koper, Slovenia, September 3-4, 2015,
Revised Selected Papers, pages 45–59.
Morawiecki, P., Gaj, K., Homsirikamol, E., Matusiewicz,
K., Pieprzyk, J., Rogawski, M., Srebrny, M., and Wój-
cik, M. (2014). ICEPOLE: High-Speed, Hardware-
Oriented Authenticated Encryption. In Cryptographic
Hardware and Embedded Systems - CHES 2014 -
16th International Workshop, Busan, South Korea,
September 23-26, 2014. Proceedings, pages 392–413.
http://www.icepole.org.
Mouha, N. and Preneel, B. (2013). A Proof that the
ARX Cipher Salsa20 is Secure against Differential
Cryptanalysis. Cryptology ePrint Archive, Report
2013/328. http://eprint.iacr.org/.
National Institute of Standards and Technology (2007).
Recommendations for Block Cipher Modes of Opera-
tion: Galois/Counter Mode (GCM) and GMAC. NIST
special publication 800-38D.
Rudell, R. L. (1986). Multiple-Valued Logic Minimiza-
tion for PLA Synthesis. Technical Report UCB/ERL
M86/65, EECS Department, University of California,
Berkeley.
Saarinen, M. O. (2015). The BRUTUS automatic cryptana-
lytic framework - Testing CAESAR authenticated en-
cryption candidates for weaknesses. Journal of Cryp-
tographic Engineering, 6(1):75–82.
Stoffelen, K. (2016). Optimizing S-Box Implementations
for Several Criteria Using SAT Solvers. In Fast
Software Encryption - 23rd International Conference,
FSE 2016, Bochum, Germany, March 20-23, 2016,
Revised Selected Papers, pages 140–160.
Wu, H. ACORN: A Lightweight Authenticated Cipher (v3).
https://competitions.cr.yp.to/round3/acornv3.pdf.
Wu, H. and Huang, T. The Authenticated Ci-
pher MORUS. https://competitions.cr.yp.to/caesar-
submissions.html.
SECRYPT 2017 - 14th International Conference on Security and Cryptography
246