Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher
From MaRDI portal
Publication:4912412
DOI10.1007/978-3-642-34117-5_13zbMath1279.94097OpenAlexW1531157152MaRDI QIDQ4912412
Jiqiang Lu, Pierre-Alain Fouque, Yongzhuang Wei, Enes Pašalić
Publication date: 4 April 2013
Published in: Advances in Information and Computer Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-34117-5_13
Related Items (2)
The higher-order meet-in-the-middle attack and its application to the Camellia block cipher ⋮ Impossible Differential Cryptanalysis of 14-Round Camellia-192
Uses Software
This page was built for publication: Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher