Improved Attacks on Reduced-Round Camellia-128/192/256
From MaRDI portal
Publication:2790031
DOI10.1007/978-3-319-16715-2_4zbMath1382.94098OpenAlexW2155739614MaRDI QIDQ2790031
Xiaoyun Wang, Xiaoyang Dong, Leibo Li, Keting Jia
Publication date: 2 March 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-16715-2_4
Related Items (1)
Uses Software
Cites Work
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
- The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher
- Low Data Complexity Attack on Reduced Camellia-256
- Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon
- Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA
- New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256
- Multiple Differential Cryptanalysis: Theory and Practice
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- A Meet-in-the-Middle Attack on 8-Round AES
- The Key-Dependent Attack on Block Ciphers
- New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128
- A Model for Structure Attacks, with Applications to PRESENT and Serpent
- New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- New Observation on Camellia
- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
- Selected Areas in Cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Improved Attacks on Reduced-Round Camellia-128/192/256