Camellia
From MaRDI portal
Software:21710
swMATH9731MaRDI QIDQ21710FDOQ21710
Author name not available (Why is that?)
Cited In (91)
- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices
- BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications
- Results of Ukrainian national public cryptographic competition
- Security evaluation of MISTY structure with SPN round function
- An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines
- GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library
- Improved Attacks on Reduced-Round Camellia-128/192/256
- Title not available (Why is that?)
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES
- Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
- Impossible Differential Cryptanalysis of 14-Round Camellia-192
- Impossible Differentials of SPN Ciphers
- Transposition of AES Key Schedule
- Wide Trail Design Strategy for Binary MixColumns
- Pseudorandomness of Camellia-like scheme
- Revisiting key schedule's diffusion in relation with round function's diffusion
- On some probabilistic approximations for AES-like S-boxes
- Показатели рассеивания линейной среды AES-подобных алгоритмов шифрования
- On Linear Hulls and Trails
- Quantum reversible circuits for \(\mathrm{GF}(2^8)\) multiplication based on composite field arithmetic operations
- Quantum all-subkeys-recovery attacks on 6-round Feistel-\(2^\ast\) structure based on multi-equations quantum claw finding
- Chai-Tea, Cryptographic Hardware Implementations of xTEA
- О линейном и разностном криптоанализе AES-подобных алгоритмов шифрования
- Differential property of \textsc{Present}-like structure
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- Subgroups of direct products of groups invariant under the action of permutations on factors
- Computing AES related-key differential characteristics with constraint programming
- Wave-shaped round functions and primitive groups
- Towards the optimality of Feistel ciphers with substitution-permutation functions
- Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme
- On the differential and linear efficiency of balanced Feistel networks
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- Some efficient quantum circuit implementations of Camellia
- Revisiting AES related-key differential attacks with constraint programming
- New Insights on Impossible Differential Cryptanalysis
- What is the effective key length for a block cipher: an attack on every practical block cipher
- The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher
- Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes
- Type-preserving matrices and security of block ciphers
- Title not available (Why is that?)
- On relationship between the parameters characterizing nonlinearity and nonhomomorphy of vector spaces transformation
- Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
- On the algebraic construction of cryptographically good \(32 \times 32\) binary linear transformations
- Cryptographic properties and application of a generalized unbalanced Feistel network structure
- LBlock: A Lightweight Block Cipher
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
- Анализ влияния линейной избыточности в S-боксах на аффинную эквивалентность в раундовых функциях XSL-схем
- A note on APN permutations in even dimension
- Making the impossible possible
- Атака на $\mathrm{6}$ раундов Khazad
- Provable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structures
- More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
- The resistance of PRESENT-80 against related-key differential attacks
- Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia
- The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers
- Cryptographic properties of cyclic binary matrices
- Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher
- Tweaking AES
- Generalized Feistel networks revisited
- Impossible differential attack on 13-round Camellia-192
- Related-Key Cryptanalysis of Midori
- Attacks of simple block ciphers via efficient heuristics
- A simple power analysis attack against the key schedule of the Camellia block cipher
- Parallelizing the Camellia and SMS4 Block Ciphers
- Title not available (Why is that?)
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function
- The \texttt{Deoxys} AEAD family
- Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- Camellia: a rapid development framework for finite element solvers
- A geometric multigrid preconditioning strategy for DPG system matrices
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- New criteria for linear maps in AES-like ciphers
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
- Generic Attacks on Feistel Networks with Internal Permutations
- Camellia: a software framework for discontinuous Petrov-Galerkin methods
- The DBlock family of block ciphers
- Differential cryptanalysis of eight-round SEED
- Modeling energy-efficient secure communications in multi-mode wireless mobile devices
- Search for Related-Key Differential Characteristics in DES-Like Ciphers
- Greedy Distinguishers and Nonrandomness Detectors
- Extended meet-in-the-middle attacks on some Feistel constructions
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity
- A dynamical systems approach to the discrimination of the modes of operation of cryptographic systems
- Perfect nonlinear functions and cryptography
- Parallelisable variants of Camellia and SMS4 block cipher: p-Camellia and p-SMS4
- On computational complexity of impossible differential cryptanalysis
- On the construction of differentially 4-uniform involutions
- On the construction of \(20 \times 20\) and \(2 4 \times 24\) binary matrices with good implementation properties for lightweight block ciphers and hash functions
This page was built for software: Camellia