-
1
-
-
70350650241
-
-
Aoki, K., Ichikawa, T., Kanda, M., et al.: Specification of Camellia-a 128-bit Block Cipher. In: Selected Areas in Cryptography-SAC 2000. LNCS, 2012, pp. 183-191. Springer, Heidelberg (2001)
-
Aoki, K., Ichikawa, T., Kanda, M., et al.: Specification of Camellia-a 128-bit Block Cipher. In: Selected Areas in Cryptography-SAC 2000. LNCS, vol. 2012, pp. 183-191. Springer, Heidelberg (2001)
-
-
-
-
2
-
-
84949951043
-
Truncated differential cryptanalysis of camellia
-
Kim, K.-c, ed, ICISC 2001, Springer, Heidelberg
-
Lee, S., Hong, S.H., Lee, S.-J., Lim, J.-I., Yoon, S.H.: Truncated differential cryptanalysis of camellia. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 32-38. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2288
, pp. 32-38
-
-
Lee, S.1
Hong, S.H.2
Lee, S.-J.3
Lim, J.-I.4
Yoon, S.H.5
-
3
-
-
84946831143
-
Security of reduced version of the block cipher camellia against truncated and impossible differential cryptanalysis
-
Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
-
Sugita, M., Kobara, K., Imai, H.: Security of reduced version of the block cipher camellia against truncated and impossible differential cryptanalysis. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 193-207. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 193-207
-
-
Sugita, M.1
Kobara, K.2
Imai, H.3
-
4
-
-
33745644801
-
-
Hatano, Y., Sekine, H., Kaneko, T.: Higher order differential attack of (II). In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, 2595, pp. 129-146. Springer, Heidelberg (2003)
-
Hatano, Y., Sekine, H., Kaneko, T.: Higher order differential attack of (II). In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 129-146. Springer, Heidelberg (2003)
-
-
-
-
5
-
-
34249846502
-
Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia
-
Wu, W., Zhang, W., Feng, D.: Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. Journal of Computer Science and Technology 22(3), 449-456 (2007)
-
(2007)
Journal of Computer Science and Technology
, vol.22
, Issue.3
, pp. 449-456
-
-
Wu, W.1
Zhang, W.2
Feng, D.3
-
6
-
-
43149101862
-
-
Lu, J., Kim, J.-S., Keller, N., Dunkelman, O.: Improving the efficiency of impossible differential cryptanalysis of reduced camellia and MISTY1. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, 4964, pp. 370-386. Springer, Heidelberg (2008)
-
Lu, J., Kim, J.-S., Keller, N., Dunkelman, O.: Improving the efficiency of impossible differential cryptanalysis of reduced camellia and MISTY1. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 370-386. Springer, Heidelberg (2008)
-
-
-
-
7
-
-
84957022995
-
Square attack on reduced camellia cipher
-
Qing, S, Okamoto, T, Zhou, J, eds, ICICS 2001, Springer, Heidelberg
-
He, Y., Qing, S.: Square attack on reduced camellia cipher. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, pp. 238-245. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2229
, pp. 238-245
-
-
He, Y.1
Qing, S.2
-
8
-
-
84949446672
-
On the Security of Camellia against the Square Attack
-
FSE, Springer, Heidelberg
-
Yeom, Y., Park, S., Kim, I.: On the Security of Camellia against the Square Attack. In: FSE 2002. LNCS, vol. 2356, pp. 89-99. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2356
, pp. 89-99
-
-
Yeom, Y.1
Park, S.2
Kim, I.3
-
9
-
-
33746329440
-
A Study of Integral Type Cryptanalysis on Camellia
-
Hamamatsu, Japan, pp
-
Yeom, Y., Park, S., Kim, I.: A Study of Integral Type Cryptanalysis on Camellia. In: The 2003 Symposium on Cryptography and Information Security-SCIS 2003, Hamamatsu, Japan, pp. 26-29 (2003)
-
(2003)
The 2003 Symposium on Cryptography and Information Security-SCIS
, pp. 26-29
-
-
Yeom, Y.1
Park, S.2
Kim, I.3
-
10
-
-
33745633334
-
-
Lei, D., Chao, L., Feng, K.: New observation on camellia. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, 3897, pp. 51-64. Springer, Heidelberg (2006)
-
Lei, D., Chao, L., Feng, K.: New observation on camellia. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 51-64. Springer, Heidelberg (2006)
-
-
-
-
11
-
-
38149119655
-
Square like attack on camellia
-
Qing, S, Imai, H, Wang, G, eds, ICICS 2007, Springer, Heidelberg
-
Duo, L., Li, C., Feng, K.: Square like attack on camellia. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 269-283. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4861
, pp. 269-283
-
-
Duo, L.1
Li, C.2
Feng, K.3
-
12
-
-
24144485414
-
-
Wenling, W., Dengguo, F., Hua, C.: Collision attack and pseudorandomness of reduced-round camellia. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, 3357, pp. 252-266. Springer, Heidelberg (2004)
-
Wenling, W., Dengguo, F., Hua, C.: Collision attack and pseudorandomness of reduced-round camellia. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 252-266. Springer, Heidelberg (2004)
-
-
-
-
13
-
-
84865273870
-
-
Jie, G., Zhongya, Z.: Improved collision attack on reduced round camellia. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, 4301, pp. 182-190. Springer, Heidelberg (2006)
-
Jie, G., Zhongya, Z.: Improved collision attack on reduced round camellia. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol. 4301, pp. 182-190. Springer, Heidelberg (2006)
-
-
-
-
14
-
-
83755212047
-
Differential, Linear, Boomerang and Rectangle Cryptanalysis of Reduced-Round Camellia
-
Munich, Germany, November 6-7 2002
-
Shirai, T.: Differential, Linear, Boomerang and Rectangle Cryptanalysis of Reduced-Round Camellia. In: Proceedings of the Third NESSIE Workshop, Munich, Germany, November 6-7 (2002), https://www.cosic.esat.kuleuven.be/nessie/
-
Proceedings of the Third NESSIE Workshop
-
-
Shirai, T.1
-
15
-
-
70350626639
-
Differential-Linear Cryptanalysis of Camellia
-
Kluwer Academic Publishers, Dordrecht
-
Wu, W., Feng, D.: Differential-Linear Cryptanalysis of Camellia. In: Progress on Cryptography, pp. 173-180. Kluwer Academic Publishers, Dordrecht (2004)
-
(2004)
Progress on Cryptography
, pp. 173-180
-
-
Wu, W.1
Feng, D.2
-
16
-
-
84957634424
-
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
-
EUROCRYPT, Springer, Heidelberg
-
Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. In: EUROCRYPT 1999. LNCS, vol. 2595, pp. 12-23. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.2595
, pp. 12-23
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
17
-
-
84949991813
-
Improved impossible differential cryptanalysis of rijndael and crypton
-
Kim, K.-c, ed, ICISC 2001, Springer, Heidelberg
-
Cheon, J.H., Kim, M., Kim, K., Lee, J.-Y., Kang, S.: Improved impossible differential cryptanalysis of rijndael and crypton. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 39-49. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2288
, pp. 39-49
-
-
Cheon, J.H.1
Kim, M.2
Kim, K.3
Lee, J.-Y.4
Kang, S.5
-
18
-
-
2642584905
-
Impossible Differential Cryptanalysis of 7-round AES
-
Phan, R.C.-W.: Impossible Differential Cryptanalysis of 7-round AES. Information Processing Letters 91(1), 33-38 (2004)
-
(2004)
Information Processing Letters
, vol.91
, Issue.1
, pp. 33-38
-
-
Phan, R.C.-W.1
-
19
-
-
24944480579
-
-
Jakimoski, G., Desmedt, Y.: Related-Key Differential Cryptanalysis of 192-bit key AES Variants. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, 3006, pp. 208-221. Springer, Heidelberg (2004)
-
Jakimoski, G., Desmedt, Y.: Related-Key Differential Cryptanalysis of 192-bit key AES Variants. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 208-221. Springer, Heidelberg (2004)
-
-
-
-
20
-
-
38149057178
-
-
Zhang, W., Wu, W., Zhang, L., Feng, D.: Improved related-key impossible differential attacks on reduced-round AES-192. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, 4356, pp. 15-27. Springer, Heidelberg (2007)
-
Zhang, W., Wu, W., Zhang, L., Feng, D.: Improved related-key impossible differential attacks on reduced-round AES-192. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 15-27. Springer, Heidelberg (2007)
-
-
-
-
21
-
-
33745642130
-
-
Biham, E., Dunkelman, O., Keller, N.: Related-key impossible differential attacks on 8-round AES-192. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, 3860, pp. 21-33. Springer, Heidelberg (2006)
-
Biham, E., Dunkelman, O., Keller, N.: Related-key impossible differential attacks on 8-round AES-192. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 21-33. Springer, Heidelberg (2006)
-
-
-
-
22
-
-
38149089619
-
New results on impossible differential cryptanalysis of reduced AES
-
Nam, K.-H, Rhee, G, eds, ICISC 2007, Springer, Heidelberg
-
Zhang, W., Wu, W., Feng, D.: New results on impossible differential cryptanalysis of reduced AES. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 239-250. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4817
, pp. 239-250
-
-
Zhang, W.1
Wu, W.2
Feng, D.3
-
23
-
-
80051884357
-
Impossible Differential Cryptanalysis of CLEFIA
-
Springer, Heidelberg
-
Tsunoo, Y., Tsujihara, E., Saito, T., Suzaki, T., Kubo, H.: Impossible Differential Cryptanalysis of CLEFIA. In: Fast Software Encryption-FSE 2008. Springer, Heidelberg (2008)
-
(2008)
Fast Software Encryption-FSE 2008
-
-
Tsunoo, Y.1
Tsujihara, E.2
Saito, T.3
Suzaki, T.4
Kubo, H.5
|