Towards the revision of the e-Government Recommended Ciphers List in FY 2012,
CRYPTREC is going to evaluate the cryptographic techniques submitted in FY 2009.
A list of them is as shown in table 1 below.
In addition to evaluations by the designated evaluators, we will solicit for voluntary analysis (attacks) for them. If volunteer evaluators analyze (attack) them and make the results public as academic journals, magazines, papers, or other publications, we will actively use them to make evaluation reports.
we would like to thank your help in providing us with useful information on their evaluations or other analysis (attacks) for them. Any cooperation will be greatly appreciated.
You may download necessary documents (see Table 2 below) to evaluate the submitted cryptographic techniques in table 1 below. But these documents are for evaluation use only and are prohibited to redistribute. CRYPTREC will not be liable for any incidental or consequential damages arising out of the use or inability to use them.
Please note that downloading the evaluation document will be regarded as acceptance of the term of the agreement.
Table 2: A overview of the evaluation documents to be released
||refference source code, specification sheet of refference source code,
refference hardware design description, specification sheet of refference
hardware design description
||test vector generation source code, specification sheet of test vector
generation source code
||briefing material for the Application of Cryptographic Techniques
|errata(if minor fixes exist)
Start of the Application for Cryptographic Techniques towards the Revision of the e-Government Recommended Ciphers List
CRYPTREC Symposium 2010