-
1
-
-
84949218850
-
Camellia: A 128-bit block cipher Suitable for Multiple Platforms-Design and Analysis. SAC 2000
-
Springer, Heidelberg
-
Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Camellia: a 128-bit block cipher Suitable for Multiple Platforms-Design and Analysis. In: SAC 2000. LNCS, vol. 2012, pp. 39-56. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2012
, pp. 39-56
-
-
Aoki, K.1
Ichikawa, T.2
Kanda, M.3
Matsui, M.4
Moriai, S.5
Nakajima, J.6
Tokita, T.7
-
2
-
-
0012022902
-
-
version 2.0
-
Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Specification of Camellia-a 128-bit block cipher. version 2.0 (2001), http://info.isl.ntt.co.jp/crypt/eng/camellia/specifications.html
-
(2001)
Specification of Camellia-a 128-bit Block Cipher
-
-
Aoki, K.1
Ichikawa, T.2
Kanda, M.3
Matsui, M.4
Moriai, S.5
Nakajima, J.6
Tokita, T.7
-
4
-
-
84957634424
-
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 12-23. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 12-23
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
5
-
-
79960261496
-
-
report, Archive
-
CRYPTREC-Cryptography Research and Evaluation Committees, report, Archive (2002), http://www.cryptrec.go.jp/english/index.html
-
(2002)
-
-
-
6
-
-
38149119655
-
Square like attack on camellia
-
Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. Springer, Heidelberg
-
Duo, L., Li, C., Feng, K.: Square like attack on camellia. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 269-283. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4861
, pp. 269-283
-
-
Duo, L.1
Li, C.2
Feng, K.3
-
7
-
-
33745644801
-
Higher Order Differential Attack of Camellia (II)
-
Nyberg, K., Heys, H.M. (eds.) SAC 2002. Springer, Heidelberg
-
Hatano, Y., Sekine, H., Kaneko, T.: Higher Order Differential Attack of Camellia (II). In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 129-146. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2595
, pp. 129-146
-
-
Hatano, Y.1
Sekine, H.2
Kaneko, T.3
-
8
-
-
33746685412
-
Information technology-Security techniques-Encryption algorithms-Part 3: Block ciphers
-
International Standardization of Organization (ISO)
-
International Standardization of Organization (ISO), International Standard-ISO/IEC 18033-3, Information technology-Security techniques-Encryption algorithms-Part 3: Block ciphers (2005)
-
(2005)
International Standard-ISO/IEC 18033-3
-
-
-
9
-
-
84949437856
-
Improved cryptanalysis of MISTY1
-
Daemen, J., Rijmen, V. (eds.) FSE 2002. Springer, Heidelberg
-
Kühn, U.: Improved cryptanalysis of MISTY1. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 61-75. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2365
, pp. 61-75
-
-
Kühn, U.1
-
10
-
-
84949951043
-
Truncated differential crypt-analysis of Camellia
-
Kim, K.-c. (ed.) ICISC 2001. Springer, Heidelberg
-
Lee, S., Hong, S.H., Lee, S.-J., Lim, J.-I., Yoon, S.H.: Truncated differential crypt-analysis of Camellia. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 32-38. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2288
, pp. 32-38
-
-
Lee, S.1
Hong, S.H.2
Lee, S.-J.3
Lim, J.-I.4
Yoon, S.H.5
-
11
-
-
33745633334
-
New observation on Camellia
-
Preneel, B., Tavares, S. (eds.) SAC 2005. Springer, Heidelberg
-
Lei, D., Chao, L., Feng, K.: New observation on Camellia. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 51-64. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3897
, pp. 51-64
-
-
Lei, D.1
Chao, L.2
Feng, K.3
-
12
-
-
70350626702
-
-
PhD Thesis, Department of Mathematics, Royal Holloway. University of London, England
-
Lu, J.: Cryptanalysis of block ciphers. PhD Thesis, Department of Mathematics, Royal Holloway. University of London, England (2008)
-
(2008)
Cryptanalysis of Block Ciphers
-
-
Lu, J.1
-
13
-
-
43149101862
-
Improving the efficiency of impossible differential cryptanalysis of reduced Camellia and MISTY1
-
Malkin, T.G. (ed.) CT-RSA 2008. Springer, Heidelberg
-
Lu, J., Kim, J.-S., Keller, N., Dunkelman, O.: Improving the efficiency of impossible differential cryptanalysis of reduced Camellia and MISTY1. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 370-386. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4964
, pp. 370-386
-
-
Lu, J.1
Kim, J.-S.2
Keller, N.3
Dunkelman, O.4
-
14
-
-
70549112028
-
New results on impossible differential cryptanalysis of reduced-round Camellia-128
-
Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. Springer, Heidelberg
-
Mala, H., Shakiba, M., Dakhilalian, M., Bagherikaram, G.: New results on impossible differential cryptanalysis of reduced-round Camellia-128. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 281-294. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5867
, pp. 281-294
-
-
Mala, H.1
Shakiba, M.2
Dakhilalian, M.3
Bagherikaram, G.4
-
16
-
-
34249847723
-
Differential, linear, boomerang and rectangle Cryptanalysis of Reduced-Round Camellia
-
Shirai, T.: Differential, linear, boomerang and rectangle Cryptanalysis of Reduced-Round Camellia. In: Proceedings of the Third NESSIE Workshop, Munich, Germany, (November 6-7, 2002)
-
Proceedings of the Third NESSIE Workshop, Munich, Germany, (November 6-7, 2002)
-
-
Shirai, T.1
-
17
-
-
84946831143
-
Security of reduced version of the block cipher Camellia against truncated and impossible differential cryptanalysis
-
Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
-
Sugita, M., Kobara, K., Imai, H.: Security of reduced version of the block cipher Camellia against truncated and impossible differential cryptanalysis. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 193-207. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 193-207
-
-
Sugita, M.1
Kobara, K.2
Imai, H.3
-
18
-
-
34249846502
-
Impossible differential cryptanalysis of Reduced-Round ARIA and Camellia
-
Wu, W., Zhang, W., Feng, D.: Impossible differential cryptanalysis of Reduced-Round ARIA and Camellia. Journal of Computer Science and Technology 22(3), 449-456 (2007)
-
(2007)
Journal of Computer Science and Technology
, vol.22
, Issue.3
, pp. 449-456
-
-
Wu, W.1
Zhang, W.2
Feng, D.3
-
19
-
-
24144485414
-
Collision attack and pseudorandomness of reduced-round Camellia. Handschuh, H., Hasan, M.A. (eds.) SAC 2004
-
Springer, Heidelberg
-
Wu, W., Feng, D., Chen, H.: Collision attack and pseudorandomness of reduced-round Camellia. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 252-266. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3357
, pp. 252-266
-
-
Wu, W.1
Feng, D.2
Chen, H.3
-
20
-
-
70350649172
-
Improved impossible differential cryptanalysis of reduced-round Camellia
-
Avanzi, R., Keliher, L., Sica, F. (eds.) SAC 2008. Springer, Heidelberg
-
Wu, W., Zhang, L., Zhang, W.: Improved impossible differential cryptanalysis of reduced-round Camellia. In: Avanzi, R., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 442-456. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5381
, pp. 442-456
-
-
Wu, W.1
Zhang, L.2
Zhang, W.3
|