搜索结果: 1-15 共查到“军事学 Camellia”相关记录23条 . 查询时间(0.06 秒)
Scrutinizing the Tower Field Implementation of the $\mathbb{F}_{2^8}$ Inverter -- with Applications to AES, Camellia, and SM4
Tower field Inverter S-box
2019/6/24
The tower field implementation of the F28F28 inverter is not only the key technique for compact implementations of the S-boxes of several internationally standardized block ciphers such as AES, Camell...
Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256
Block Cipher Meet-in-the-Middle Camellia
2016/1/23
Camellia is one of the widely used block ciphers, which has been selected as an international standard by ISO/IEC. In this paper, we focus on the key-recovery attacks on reduced-round Camellia-192/2...
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version)
block ciphers impossible differential attacks CLEFIA
2016/1/7
Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysis against
block ciphers. These attacks, even if extensively used, remain not fully understood because of thei...
A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia
DPA chosen message Feistel-SP
2016/1/3
The Feistel-SP structure is a commonly adopted structure
in symmetric cryptography with many practical instances. Differential
power analysis (DPA) has proven to be effective against these ciphers
...
Improved Attacks on Reduced-Round Camellia-128/192/256
Camellia Block Cipher Key-Dependent Attack
2015/12/23
Camellia is a widely used block cipher, which has been selected as an international
standard by ISO/IEC. In this paper, we consider a new family of differentials of round-reduced
Camellia-128 depend...
Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256
Block Cipher Camellia Impossible Differential Cryptanalysis
2012/6/14
As an international standard adopted by ISO/IEC, the block cipher Camellia has been used in various cryptographic applications. In this paper, we reevaluate the security of Camellia against impossible...
Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256
Block Cipher Camellia Impossible Differential Cryptanalysis
2012/3/20
As an international standard adopted by ISO/IEC, the block cipher Camellia has been used in various cryptographic applications. In this paper, we reevaluate the security of Camellia against impossible...
New Impossible Differential Attacks on Camellia
secret-key cryptography / Camellia Impossible Differential Cryptanalysis
2012/8/28
Camellia is one of the most worldwide used block ciphers, which has been selected as a standard by ISO/IEC. In this paper, we propose several new 7-round impossible differentials of Camellia with 2 $F...
New Impossible Differential Attacks on Camellia
Camellia Impossible Differential Cryptanalysis Impossible Differential Attack
2012/6/14
Camellia is one of the most worldwide used block ciphers, which has been selected as a standard by ISO/IEC. In this paper, we propose several new 7-round impossible differentials of Camellia with 2 $F...
New Impossible Differential Attacks on Camellia
secret-key cryptography / Camellia Impossible Differential Cryptanalysis Impossible Differential Attack.
2012/3/20
Camellia is one of the most worldwide used block ciphers, which has been selected as a standard by ISO/IEC. In this paper, we propose several new 7-round impossible differentials of Camellia with 2 $F...
Security of Reduced-Round Camellia against Impossible Differential Attack
Camellia Block Cipher Impossible Differential Cryptanalysis
2012/3/26
Camellia is one of the widely used block ciphers, which has been selected as an international standard by ISO/IEC. By using some interesting properties of $FL/FL^{-1}$ functions, we introduce new 7-ro...
Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256
Block Cipher Camellia Impossible Differential Cryptanalysis
2012/8/28
As an international standard adopted by ISO/IEC, the block cipher Camellia has been used in various cryptographic applications. In this paper, we reevaluate the security of Camellia against impossible...
Improved Integral Attacks on Reduced Round Camellia
secret-key cryptography / block ciphers cryptanalysis secret-key cryptography
2012/3/29
In this paper a method is presented to extend the length of integral distinguisher of Feistel-SP structure, based on which a new 8-round distinguisher of Camellia is proposed. Moreover, we improve int...
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256
Camellia Block Cipher Cryptanalysis Impossible Differential Path Impossible Differential Attack
2012/3/30
Camellia is a block cipher selected as a standard by ISO/IEC, which has been analyzed by a number of cryptanalysts. In this paper, we propose several 6-round impossible differential paths of Camellia ...
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256
Camellia block cipher Cryptanalysis Impossible differential path Impossible differential attack
2011/1/12
Camellia is a block cipher selected as a standard by ISO/IEC, which has been analyzed by a number of cryptanalysts. In this paper, we propose several 6-round impossible differential paths of Camellia ...