The Design of Rijndael
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Higher Order Differential Attack of Camellia (II)
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Improved Cryptanalysis of Rijndael
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Security of Camellia against Truncated Differential Cryptanalysis
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Truncated Differential Cryptanalysis of Camellia
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Square Attack on Reduced Camellia Cipher
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
On the Security of CAMELLIA against the Square Attack
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Impossible differential cryptanalysis of reduced-round ARIA and Camellia
Journal of Computer Science and Technology
Impossible Differential Analysis of Reduced Round CLEFIA
Information Security and Cryptology
Saturation Attack on the Block Cipher HIGHT
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Differential fault analysis on Camellia
Journal of Systems and Software
Square like attack on camellia
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Improving the efficiency of impossible differential cryptanalysis of reduced Camellia and MISTY1
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Impossible differential cryptanalysis on feistel ciphers with SP and SPS round functions
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
New impossible differential attacks of reduced-round Camellia-192 and Camellia-256
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
New impossible differential cryptanalysis of reduced-round camellia
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
New impossible differential attacks on camellia
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256
Journal of Systems and Software
Low data complexity attack on reduced camellia-256
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
New observations on impossible differential cryptanalysis of reduced-round camellia
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Hi-index | 0.00 |
In this paper, some observations on Camellia are presented, by which the Square attack and the Collision attack are improved. 11-round 256-bit Camellia without FL function is breakable with complexity of 2250 encryptions. 9-round 128-bit Camellia without FL function is breakable with the complexity of 290 encryptions. And 10-round 256-bit Camellia with FL function is breakable with the complexity of 2210 encryptions and 9-round 128-bit Camellia with FL function is breakable with the complexity of 2122 encryptions. These results are better than any other known results. It concludes that the most efficient attack on Camellia is Square attack.