The following pages link to Camellia (Q21710):
Displayed 50 items.
- Parallelisable variants of Camellia and SMS4 block cipher: p-Camellia and p-SMS4 (Q381127) (← links)
- Towards the optimality of Feistel ciphers with substitution-permutation functions (Q398983) (← links)
- On the differential and linear efficiency of balanced Feistel networks (Q407580) (← links)
- The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers (Q436555) (← links)
- Modeling energy-efficient secure communications in multi-mode wireless mobile devices (Q494039) (← links)
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity (Q510482) (← links)
- Cryptographic properties and application of a generalized unbalanced Feistel network structure (Q662179) (← links)
- Attacks of simple block ciphers via efficient heuristics (Q881887) (← links)
- What is the effective key length for a block cipher: an attack on every practical block cipher (Q893734) (← links)
- The DBlock family of block ciphers (Q893839) (← links)
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes (Q893871) (← links)
- New criteria for linear maps in AES-like ciphers (Q1032487) (← links)
- A simple power analysis attack against the key schedule of the Camellia block cipher (Q1041799) (← links)
- A geometric multigrid preconditioning strategy for DPG system matrices (Q1668569) (← links)
- On the construction of \(20 \times 20\) and \(2 4 \times 24\) binary matrices with good implementation properties for lightweight block ciphers and hash functions (Q1718633) (← links)
- Wave-shaped round functions and primitive groups (Q1726011) (← links)
- Making the impossible possible (Q1747659) (← links)
- Revisiting AES related-key differential attacks with constraint programming (Q1799563) (← links)
- Generalized Feistel networks revisited (Q1934218) (← links)
- Differential cryptanalysis of eight-round SEED (Q1944926) (← links)
- The resistance of PRESENT-80 against related-key differential attacks (Q2016426) (← links)
- Cryptographic properties of cyclic binary matrices (Q2025370) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys (Q2101200) (← links)
- Some efficient quantum circuit implementations of Camellia (Q2107075) (← links)
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function (Q2152178) (← links)
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks (Q2170076) (← links)
- A dynamical systems approach to the discrimination of the modes of operation of cryptographic systems (Q2198480) (← links)
- Subgroups of direct products of groups invariant under the action of permutations on factors (Q2209251) (← links)
- Computing AES related-key differential characteristics with constraint programming (Q2289026) (← links)
- Camellia: a rapid development framework for finite element solvers (Q2324389) (← links)
- Provable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structures (Q2329406) (← links)
- On relationship between the parameters characterizing nonlinearity and nonhomomorphy of vector spaces transformation (Q2332893) (← links)
- Impossible differential attack on 13-round Camellia-192 (Q2346554) (← links)
- On the algebraic construction of cryptographically good \(32 \times 32\) binary linear transformations (Q2349621) (← links)
- A note on APN permutations in even dimension (Q2363313) (← links)
- On the construction of differentially 4-uniform involutions (Q2401973) (← links)
- Differential property of \textsc{Present}-like structure (Q2413209) (← links)
- Type-preserving matrices and security of block ciphers (Q2415388) (← links)
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher (Q2437779) (← links)
- On computational complexity of impossible differential cryptanalysis (Q2446068) (← links)
- Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme (Q2491299) (← links)
- On some probabilistic approximations for AES-like S-boxes (Q2501584) (← links)
- Pseudorandomness of Camellia-like scheme (Q2508379) (← links)
- Revisiting key schedule's diffusion in relation with round function's diffusion (Q2510656) (← links)
- Perfect nonlinear functions and cryptography (Q2512886) (← links)
- Camellia: a software framework for discontinuous Petrov-Galerkin methods (Q2628405) (← links)
- Security evaluation of MISTY structure with SPN round function (Q2629406) (← links)
- Extended meet-in-the-middle attacks on some Feistel constructions (Q2630716) (← links)
- Quantum reversible circuits for \(\mathrm{GF}(2^8)\) multiplication based on composite field arithmetic operations (Q2686210) (← links)