Cited in
(only showing first 100 items - show all)- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- Subgroups of direct products of groups invariant under the action of permutations on factors
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- Towards the optimality of Feistel ciphers with substitution-permutation functions
- On the differential and linear efficiency of balanced Feistel networks
- Computing AES related-key differential characteristics with constraint programming
- Wave-shaped round functions and primitive groups
- Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- Some efficient quantum circuit implementations of Camellia
- Revisiting AES related-key differential attacks with constraint programming
- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices
- What is the effective key length for a block cipher: an attack on every practical block cipher
- Parallelizing the Camellia and SMS4 block ciphers
- Type-preserving matrices and security of block ciphers
- On relationship between the parameters characterizing nonlinearity and nonhomomorphy of vector spaces transformation
- scientific article; zbMATH DE number 2009947 (Why is no real title available?)
- BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications
- On the algebraic construction of cryptographically good 32 32 binary linear transformations
- Cryptographic properties and application of a generalized unbalanced Feistel network structure
- Improved attacks on reduced-round Camellia-128/192/256
- Results of Ukrainian national public cryptographic competition
- Making the impossible possible
- A note on APN permutations in even dimension
- Provable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structures
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- The resistance of PRESENT-80 against related-key differential attacks
- More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)
- The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers
- Security evaluation of MISTY structure with SPN round function
- Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia
- Constructing lightweight optimal diffusion primitives with Feistel structure
- Impossible differential cryptanalysis of 14-round Camellia-192
- Cryptographic properties of cyclic binary matrices
- An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines
- Impossible differentials of SPN ciphers
- Transposition of AES key schedule
- GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library
- Tweaking AES
- Generalized Feistel networks revisited
- Impossible differential attack on 13-round Camellia-192
- Related-Key Cryptanalysis of Midori
- Diffusion rates of linear medium in AES-like ciphers
- Attacks of simple block ciphers via efficient heuristics
- On linear hulls and trails
- A simple power analysis attack against the key schedule of the Camellia block cipher
- Greedy distinguishers and nonrandomness detectors
- scientific article; zbMATH DE number 7301720 (Why is no real title available?)
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES
- MinT
- NESSIE
- KASUMI
- CLEFIA
- LBlock
- ARIA
- HIGHT
- AEGIS
- TWINE
- EPCBC
- eSTREAM
- tweakey
- Piccolo
- DBlock
- FOX
- BitCryptor
- Whirlpool
- SIMON
- Twofish
- STR2
- Camellia
- Midori
- SHARK
- Espresso
- Itubee
- LEX
- Skein Hash
- MacGuffin
- Picat-SAT
- SAFER
- Serpent
- NIST Statistical Test Suite
- CRYPTON
- MISTY
- CHUFFED
- PRINTcipher
- YAARX
- CryptoSMT
- Blowfish
- Square
- ATHENa
- iHDG
- TEA
- Edon80
- XTEA
- washer.AV
- Kuznyechik
- Minalpher
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function
- scientific article; zbMATH DE number 2081066 (Why is no real title available?)
This page was built for software: Camellia