Camellia
From MaRDI portal
Software:21710
swMATH9731MaRDI QIDQ21710FDOQ21710
Author name not available (Why is that?)
Cited In (91)
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- Subgroups of direct products of groups invariant under the action of permutations on factors
- Computing AES related-key differential characteristics with constraint programming
- Wave-shaped round functions and primitive groups
- Towards the optimality of Feistel ciphers with substitution-permutation functions
- Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme
- On the differential and linear efficiency of balanced Feistel networks
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- Some efficient quantum circuit implementations of Camellia
- Revisiting AES related-key differential attacks with constraint programming
- What is the effective key length for a block cipher: an attack on every practical block cipher
- Parallelizing the Camellia and SMS4 block ciphers
- Type-preserving matrices and security of block ciphers
- Title not available (Why is that?)
- On relationship between the parameters characterizing nonlinearity and nonhomomorphy of vector spaces transformation
- On the algebraic construction of cryptographically good \(32 \times 32\) binary linear transformations
- Cryptographic properties and application of a generalized unbalanced Feistel network structure
- A note on APN permutations in even dimension
- Making the impossible possible
- Provable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structures
- More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- The resistance of PRESENT-80 against related-key differential attacks
- Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia
- Constructing lightweight optimal diffusion primitives with Feistel structure
- The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers
- Cryptographic properties of cyclic binary matrices
- Tweaking AES
- Generalized Feistel networks revisited
- Impossible differential attack on 13-round Camellia-192
- Related-Key Cryptanalysis of Midori
- Attacks of simple block ciphers via efficient heuristics
- Greedy distinguishers and nonrandomness detectors
- A simple power analysis attack against the key schedule of the Camellia block cipher
- Title not available (Why is that?)
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function
- The \texttt{Deoxys} AEAD family
- Camellia: a rapid development framework for finite element solvers
- Automatic search of meet-in-the-middle and impossible differential attacks
- A geometric multigrid preconditioning strategy for DPG system matrices
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- New criteria for linear maps in AES-like ciphers
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
- Generic Attacks on Feistel Networks with Internal Permutations
- Camellia: a software framework for discontinuous Petrov-Galerkin methods
- The DBlock family of block ciphers
- Differential cryptanalysis of eight-round SEED
- Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others
- Modeling energy-efficient secure communications in multi-mode wireless mobile devices
- Meet-in-the-middle attack on reduced versions of the Camellia block cipher
- Search for Related-Key Differential Characteristics in DES-Like Ciphers
- Extended meet-in-the-middle attacks on some Feistel constructions
- New insights on impossible differential cryptanalysis
- Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity
- Analyzing the influence of linear redundancy in S-boxes on the affine equivalence within XSL-like round functions
- A dynamical systems approach to the discrimination of the modes of operation of cryptographic systems
- Perfect nonlinear functions and cryptography
- LBlock: a lightweight block cipher
- Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
- Parallelisable variants of Camellia and SMS4 block cipher: p-Camellia and p-SMS4
- An attack on 6 rounds of Khazad
- On computational complexity of impossible differential cryptanalysis
- On the construction of differentially 4-uniform involutions
- On the construction of \(20 \times 20\) and \(2 4 \times 24\) binary matrices with good implementation properties for lightweight block ciphers and hash functions
- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices
- BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications
- Improved attacks on reduced-round Camellia-128/192/256
- Results of Ukrainian national public cryptographic competition
- Security evaluation of MISTY structure with SPN round function
- Impossible differential cryptanalysis of 14-round Camellia-192
- An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines
- Impossible differentials of SPN ciphers
- Transposition of AES key schedule
- GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library
- Diffusion rates of linear medium in AES-like ciphers
- On linear hulls and trails
- Title not available (Why is that?)
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES
- Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
- On the linear and differential cryptanalysis of the AES-like ciphers
- Wide Trail Design Strategy for Binary MixColumns
- Pseudorandomness of Camellia-like scheme
- Revisiting key schedule's diffusion in relation with round function's diffusion
- On some probabilistic approximations for AES-like S-boxes
- Quantum reversible circuits for \(\mathrm{GF}(2^8)\) multiplication based on composite field arithmetic operations
- Quantum all-subkeys-recovery attacks on 6-round Feistel-\(2^\ast\) structure based on multi-equations quantum claw finding
- Chai-Tea, Cryptographic Hardware Implementations of xTEA
- Differential property of \textsc{Present}-like structure
This page was built for software: Camellia