×

Found 38 Documents (Results 1–38)

Pholkos – efficient large-state tweakable block ciphers from the AES round function. (English) Zbl 1492.94067

Galbraith, Steven D. (ed.), Topics in cryptology – CT-RSA 2022. Cryptographers’ track at the RSA conference 2022, virtual event, March 1–2, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13161, 511-536 (2022).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Impossible differential cryptanalysis of 14-round Camellia-192. (English) Zbl 1346.94106

Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 363-378 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved meet-in-the-middle distinguisher on Feistel schemes. (English) Zbl 1396.94089

Dunkelman, Orr (ed.) et al., Selected areas in cryptography – SAC 2015. 22nd international conference, Sackville, NB, Canada, August 12–14, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-31300-9/pbk; 978-3-319-31301-6/ebook). Lecture Notes in Computer Science 9566, 122-142 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved attacks on reduced-round Camellia-128/192/256. (English) Zbl 1382.94098

Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 59-83 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The higher-order meet-in-the-middle attack and its application to the Camellia block cipher. (English) Zbl 1295.94110

Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 244-264 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Meet-in-the-middle attack on reduced versions of the Camellia block cipher. (English) Zbl 1279.94097

Hanaoka, Goichiro (ed.) et al., Advances in information and computer security. 7th international workshop on security, IWSEC 2012, Fukuoka, Japan, November 7–9, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34116-8/pbk). Lecture Notes in Computer Science 7631, 197-215 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

GPU-acceleration of block ciphers in the OpenSSL cryptographic library. (English) Zbl 1306.94055

Gollmann, Dieter (ed.) et al., Information security. 15th international conference, ISC 2012, Passau, Germany, September 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33382-8/pbk). Lecture Notes in Computer Science 7483, 338-353 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes. (English) Zbl 1307.94095

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 397-415 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

LBlock: a lightweight block cipher. (English) Zbl 1250.94047

Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21553-7/pbk). Lecture Notes in Computer Science 6715, 327-344 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Improved impossible differential cryptanalysis of reduced-round Camellia. (English) Zbl 1256.94069

Avanzi, Roberto Maria (ed.) et al., Selected areas in cryptography. 15th international workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14–15. Revised selected papers. Berlin: Springer (ISBN 978-3-642-04158-7/pbk). Lecture Notes in Computer Science 5381, 442-456 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A toolbox for cryptanalysis: Linear and affine equivalence algorithms. (English) Zbl 1038.94521

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 33-50 (2003).
MSC:  94A60 68P25 94A17
PDFBibTeX XMLCite
Full Text: Link

Security of reduced version of the block cipher Camellia against truncated and impossible differential cryptanalysis. (English) Zbl 1062.94554

Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 193-207 (2001).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software