-
1
-
-
0036456438
-
The 128-Bit Block Cipher Camellia
-
Jan
-
K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima, and T. Tokita, "The 128-Bit Block Cipher Camellia," IEIEC Trans. Fundamentals, Vol.E85-A, No.1, pp.11-24, Jan, 2002.
-
(2002)
IEIEC Trans. Fundamentals
, vol.E85-A
, Issue.1
, pp. 11-24
-
-
Aoki, K.1
Ichikawa, T.2
Kanda, M.3
Matsui, M.4
Moriai, S.5
Nakajima, J.6
Tokita, T.7
-
2
-
-
84943306981
-
Camellia - A 128-Bit Block Cipher Camellia
-
ISEC2000
-
K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima, and T. Tokita, "Camellia - A 128-Bit Block Cipher Camellia,"Technical Report of IEICE, ISEC2000.
-
Technical Report of IEICE
-
-
Aoki, K.1
Ichikawa, T.2
Kanda, M.3
Matsui, M.4
Moriai, S.5
Nakajima, J.6
Tokita, T.7
-
3
-
-
24144436510
-
Improved Cryptanalysis of Rijndael
-
N. Furguson, J. Kelsey, S. Luck, B. Schneier, M. Stay, D. Wagner, and D. Whiting, "Improved Cryptanalysis of Rijndael," Seventh Fast Software Encryption Workshop, 2000.
-
(2000)
Seventh Fast Software Encryption Workshop
-
-
Furguson, N.1
Kelsey, J.2
Luck, S.3
Schneier, B.4
Stay, M.5
Wagner, D.6
Whiting, D.7
-
4
-
-
35248847135
-
Square Attack on Reduced Round Camemllia Cipher
-
ICISC 2001, Springer-Verlag
-
Y. He, and S. Quing, "Square Attack on Reduced Round Camemllia Cipher," ICISC 2001, LNCS 2229, Springer-Verlag, pp.213-230, 2000.
-
(2000)
LNCS
, vol.2229
, pp. 213-230
-
-
He, Y.1
Quing, S.2
-
5
-
-
0842283884
-
Probabilistic Higher Order Differential Attack and Secure Boolean Functions
-
Okinawa, Japan, Jan.26-28
-
T. Iwata, and K. Kurosawa, "Probabilistic Higher Order Differential Attack and Secure Boolean Functions",The 2000 Symposium on Cryptography and Information Security, SCIS2000-A-46, Okinawa, Japan, Jan.26-28, 2000.
-
(2000)
The 2000 Symposium on Cryptography and Information Security, SCIS2000-A-46
-
-
Iwata, T.1
Kurosawa, K.2
-
6
-
-
0036456363
-
On the Security of Feistel Cipher with SPN Round Function against Differential, Linear, and Truncated Differential Cryptanalysis
-
Jan
-
M. Kanda, and T. Matsumoto, "On the Security of Feistel Cipher with SPN Round Function against Differential, Linear, and Truncated Differential Cryptanalysis," IEIEC Trans. Fundamentals, Vol.E85-A, No.1, pp.25-37, Jan, 2002.
-
(2002)
IEIEC Trans. Fundamentals
, vol.E85-A
, Issue.1
, pp. 25-37
-
-
Kanda, M.1
Matsumoto, T.2
-
7
-
-
0042865211
-
A Study on Higher Order Differential Attack of Camellia
-
Londom, U.K, Sep.
-
T. Kawabata, and T. Kaneko, "A Study on Higher Order Differential Attack of Camellia," Second Open, NESSIE Workshop, Londom, U.K, Sep. 2001.
-
(2001)
Second Open, NESSIE Workshop
-
-
Kawabata, T.1
Kaneko, T.2
-
8
-
-
0002917705
-
The Interpolation Attack on Block Cipher
-
Fast Software Encryption 4-th International Workshop, Springer-Verlag. Berlin
-
Lar R. Knudsen "The Interpolation Attack on Block Cipher," Fast Software Encryption 4-th International Workshop, LNCS.1008, Springer-Verlag. Berlin, 1996.
-
(1996)
LNCS
, vol.1008
-
-
Knudsen, L.R.1
-
9
-
-
0041863249
-
Higher Order Derivatives and Differential Cryptanalysis
-
Kluwer Academic Publishers
-
X. Lai, "Higher Order Derivatives and Differential Cryptanalysis," Communications and Cryptography, pp.227-233, Kluwer Academic Publishers, 1994.
-
(1994)
Communications and Cryptography
, pp. 227-233
-
-
Lai, X.1
-
10
-
-
33746342600
-
Truncated Differential Cryptanalysis of Camellia
-
S. Lee, S. Hong, S. Lee, J. Lim, and S. Yoon, "Truncated Differential Cryptanalysis of Camellia," ICISC2001.
-
ICISC2001
-
-
Lee, S.1
Hong, S.2
Lee, S.3
Lim, J.4
Yoon, S.5
-
11
-
-
35248886769
-
Higher Order Differential Attack of a CAST Cipher
-
Fast Software Encryption 4-th International Workshop, Springer-Verlag. Berlin
-
T. Shimoyama, S. Moriai, and T. Kaneko, "Higher Order Differential Attack of a CAST Cipher," Fast Software Encryption 4-th International Workshop, LNCS.1372, Springer-Verlag. Berlin, 1996.
-
(1996)
LNCS
, vol.1372
-
-
Shimoyama, T.1
Moriai, S.2
Kaneko, T.3
-
12
-
-
35248885341
-
Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia
-
Lenven, Belgium, Feb
-
T. Shirai, S, Kanamaru, and G. Abe, "Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia" Fast Software Encryption 2002, FSE2002, pp.123-137, Lenven, Belgium, Feb, 2002.
-
(2002)
Fast Software Encryption 2002, FSE2002
, pp. 123-137
-
-
Shirai, T.1
Kanamaru, S.2
Abe, G.3
-
13
-
-
35248836181
-
A Study for Controled Higher Order Differential Cryptanalysis of Camellia
-
Shirahama, Japan, Jan.29-Feb.1, (in Japanese)
-
M. Takeda, and T. Kaneko, "A Study for Controled Higher Order Differential Cryptanalysis of Camellia," The 2002 Symposium on Cryptography and Information Security, SCIS2002, Shirahama, Japan, Jan.29-Feb.1, 2002. (in Japanese).
-
(2002)
The 2002 Symposium on Cryptography and Information Security, SCIS2002
-
-
Takeda, M.1
Kaneko, T.2
-
14
-
-
84957686830
-
Strength of MISTY1 without FL function for Higher Order Differential Attack
-
Applied Algebra, Algebraic Algorithm and Error Correcting Codes Symposium(AAECC13)
-
H. Tanaka, K. Hisamatsu, and T. Kaneko, "Strength of MISTY1 without FL function for Higher Order Differential Attack," Applied Algebra, Algebraic Algorithm and Error Correcting Codes Symposium(AAECC13), LNCS.1719 pp.221-230, 1999.
-
(1999)
LNCS
, vol.1719
, pp. 221-230
-
-
Tanaka, H.1
Hisamatsu, K.2
Kaneko, T.3
-
15
-
-
35248838471
-
On the Security of Camellia against the Square Attack
-
Lenven, Belgium, Feb
-
Y. Yeom, S. Park, and I. Kim, "On the Security of Camellia against the Square Attack," Fast Software Encryption 2002, FSE2002, pp.84-93, Lenven, Belgium, Feb, 2002.
-
(2002)
Fast Software Encryption 2002, FSE2002
, pp. 84-93
-
-
Yeom, Y.1
Park, S.2
Kim, I.3
|