This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Tax calculation will be finalised during checkout.
The CAESAR Committee. Competition for authenticated encryption: security, applicability, and robustness. 2014. http://competitions.cr.yp.to/caesar.html
Wu H, Huang T. The authenticated cipher MORUS (v1.1). 2016. http://competitions.cr.yp.to/round2/ morusv11.pdf
Mileva A, Dimitrova V, Velichkov V. Analysis of the authenticated cipher MORUS (v1). In: Proceedings of International Conference on Cryptography and Information Security in the Balkans, Koper, 2015. 45–59
Nozaki Y, Yoshikawa M. Power analysis attack for a fast authenticated encryption MORUS. In: Proceedings of International Conference on Applied System Innovation, Sapporo, 2017. 365–368
Dwivedi A D, Klouček M, Morawiecki P, et al. SATbased cryptanalysis of authenticated ciphers from the CAESAR competition. In: Proceedings of International Conference on Security and Cryptography, Madrid, 2017. 237–246
Zhang P, Guan J, Li J Z, et al. Research on the confusion and diffusion properties of the initialization of MORUS. J Cryptol Res, 2015, 2: 536–548
Guan J, Shi T R, Li J Z, et al. Analysis of MORUS against collision attack (in Chinese). J Elec Inf Tech, 2017, 39: 1704–1710
This work was supported by National Natural Science Foundation of China (Grant Nos. 61572516, 61602514, 61272041, 61272488).
About this article
Cite this article
Shi, T., Guan, J. Real-time state recovery attack against MORUS in nonce-misuse setting. Sci. China Inf. Sci. 62, 39109 (2019). https://doi.org/10.1007/s11432-017-9457-x