Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
From MaRDI portal
Publication:2762783
DOI10.1007/3-540-44983-3_4zbMath1037.94540OpenAlexW1489027369MaRDI QIDQ2762783
Shiho Moriai, Junko Nakajima, Tetsuya Ichikawa, Masayuki Kanda, Kazumaro Aoki, Mitsuru Matsui, Toshio Tokita
Publication date: 9 January 2002
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-44983-3_4
Related Items
A note on APN permutations in even dimension, New Insights on Impossible Differential Cryptanalysis, Security evaluation of MISTY structure with SPN round function, Extended meet-in-the-middle attacks on some Feistel constructions, eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices, On Linear Hulls and Trails, Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis, On groups generated by ciphers based on Feistel network, On the construction of differentially 4-uniform involutions, Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256, Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers, Differential property of \textsc{Present}-like structure, Complementing Feistel Ciphers, On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2, О групповых свойствах классов SH- и TH-алгоритмов Фейстеля с линейно зависящими от координат ключа функциями усложнения;On group properties of classes Source-Heavy and Target-Heavy Feistel block ciphers with round functions linear dependent on round keys parts, Type-preserving matrices and security of block ciphers, Towards the optimality of Feistel ciphers with substitution-permutation functions, Generalized Feistel networks revisited, Quantum attacks on generalized Feistel networks based on the strong-weak separability, Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes, Improved heuristics for low-latency implementations of linear layers, On the differential and linear efficiency of balanced Feistel networks, Quantum reversible circuits for \(\mathrm{GF}(2^8)\) multiplication based on composite field arithmetic operations, Krip: high-speed hardware-oriented stream cipher based on a non-autonomous nonlinear shift register, Impossible differential cryptanalysis on reduced-round PRINCEcore, Further insights on constructing quantum circuits for Camellia block cipher, Differential cryptanalysis of eight-round SEED, Quantum all-subkeys-recovery attacks on 6-round Feistel-\(2^\ast\) structure based on multi-equations quantum claw finding, Classifying 8-Bit to 8-Bit S-Boxes Based on Power Mappings from the Point of DDT and LAT Distributions, The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers, The higher-order meet-in-the-middle attack and its application to the Camellia block cipher, Subgroups of direct products of groups invariant under the action of permutations on factors, Impossible Differentials of SPN Ciphers, On the construction of \(20 \times 20\) and \(2 4 \times 24\) binary matrices with good implementation properties for lightweight block ciphers and hash functions, On computational complexity of impossible differential cryptanalysis, New Applications of Differential Bounds of the SDS Structure, Wave-shaped round functions and primitive groups, Modeling energy-efficient secure communications in multi-mode wireless mobile devices, LBlock: A Lightweight Block Cipher, Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity, Making the impossible possible, Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme, On some probabilistic approximations for AES-like S-boxes, Cryptographic properties of cyclic binary matrices, Improved Attacks on Reduced-Round Camellia-128/192/256, Revisiting key schedule's diffusion in relation with round function's diffusion, More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\), Perfect nonlinear functions and cryptography, Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1, Improved Meet-in-the-Middle Distinguisher on Feistel Schemes, Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure, Анализ влияния линейной избыточности в S-боксах на аффинную эквивалентность в раундовых функциях XSL-схем, Impossible Differential Cryptanalysis of 14-Round Camellia-192, Generic Attacks on Feistel Networks with Internal Permutations, Wide Trail Design Strategy for Binary MixColumns, Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks, New criteria for linear maps in AES-like ciphers, An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines, A simple power analysis attack against the key schedule of the Camellia block cipher, Unnamed Item, Provable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structures, On relationship between the parameters characterizing nonlinearity and nonhomomorphy of vector spaces transformation, Chai-Tea, Cryptographic Hardware Implementations of xTEA, Quantum generic attacks on key-alternating Feistel ciphers for shorter keys, Impossible differential attack on 13-round Camellia-192, On the algebraic construction of cryptographically good \(32 \times 32\) binary linear transformations
Uses Software