swMATH9731MaRDI QIDQ21710FDOQ21710
Author name not available (Why is that?)
Official website: http://link.springer.com/chapter/10.1007%2F3-540-44983-3_4
Cited In (only showing first 100 items - show all)
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- Towards the optimality of Feistel ciphers with substitution-permutation functions
- Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme
- On the differential and linear efficiency of balanced Feistel networks
- SM4
- What is the effective key length for a block cipher: an attack on every practical block cipher
- Parallelizing the Camellia and SMS4 block ciphers
- Title not available (Why is that?)
- On the algebraic construction of cryptographically good \(32 \times 32\) binary linear transformations
- Cryptographic properties and application of a generalized unbalanced Feistel network structure
- More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia
- The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers
- Generalized Feistel networks revisited
- Attacks of simple block ciphers via efficient heuristics
- Greedy distinguishers and nonrandomness detectors
- A simple power analysis attack against the key schedule of the Camellia block cipher
- Title not available (Why is that?)
- LBlock
- ARIA
- HIGHT
- AEGIS
- TWINE
- EPCBC
- eSTREAM
- tweakey
- Piccolo
- DBlock
- FOX
- BitCryptor
- Whirlpool
- SIMON
- Twofish
- STR2
- Camellia
- Midori
- A geometric multigrid preconditioning strategy for DPG system matrices
- SHARK
- Espresso
- Itubee
- LEX
- Skein Hash
- MacGuffin
- Picat-SAT
- SAFER
- Serpent
- NIST Statistical Test Suite
- CRYPTON
- MISTY
- CHUFFED
- PRINTcipher
- YAARX
- CryptoSMT
- Blowfish
- Square
- ATHENa
- iHDG
- New criteria for linear maps in AES-like ciphers
- TEA
- Edon80
- XTEA
- washer.AV
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
- Kuznyechik
- Minalpher
- Generic Attacks on Feistel Networks with Internal Permutations
- Camellia: a software framework for discontinuous Petrov-Galerkin methods
- The DBlock family of block ciphers
- Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others
- Modeling energy-efficient secure communications in multi-mode wireless mobile devices
- Meet-in-the-middle attack on reduced versions of the Camellia block cipher
- New insights on impossible differential cryptanalysis
- Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity
- Analyzing the influence of linear redundancy in S-boxes on the affine equivalence within XSL-like round functions
- Perfect nonlinear functions and cryptography
- LBlock: a lightweight block cipher
- Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
- Parallelisable variants of Camellia and SMS4 block cipher: p-Camellia and p-SMS4
- On computational complexity of impossible differential cryptanalysis
- On the construction of differentially 4-uniform involutions
- On the construction of \(20 \times 20\) and \(2 4 \times 24\) binary matrices with good implementation properties for lightweight block ciphers and hash functions
- Subgroups of direct products of groups invariant under the action of permutations on factors
- CryptDances
- Computing AES related-key differential characteristics with constraint programming
- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices
- Wave-shaped round functions and primitive groups
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- Some efficient quantum circuit implementations of Camellia
- Revisiting AES related-key differential attacks with constraint programming
- Type-preserving matrices and security of block ciphers
- On relationship between the parameters characterizing nonlinearity and nonhomomorphy of vector spaces transformation
- BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications
- Improved attacks on reduced-round Camellia-128/192/256
- Results of Ukrainian national public cryptographic competition
- Saturnin
- A note on APN permutations in even dimension
This page was built for software: Camellia