Camellia (cipher)
Top View
- Simplification on Even-Mansour Scheme Attacks
- D2.2 Second Report on New QR Cryptographic Primitives
- ASIC Performance Comparison for the ISO Standard Block Ciphers
- Cache Timing Attacks on Camellia Block Cipher∗
- Fault Detection of the Camellia Cipher Against Single Byte Differential Fault Analysis
- FIPS 140-2 Non-Proprietary Security Policy Cryptocomply For
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
- NIST Cryptographic Standards & Their Adoptions in International / Industry
- 5529 NTT Software Corporation Category: Standards Track M. Kanda NTT S
- Elastic Block Ciphers: Method, Security and Instantiations
- Comparison Between AES, Camellia and SEED
- Camellia V1.0 Manual
- Compact Hardware Implementation of the Block Cipher Camellia with Concurrent Error Detection
- Parallelizing the Camellia and SMS4 Block Ciphers - Extended Version
- Reliable Architecture-Oblivious Error Detection Schemes for Secure Cryptographic GCM Structures
- A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms
- A Dynamical Systems Approach to the Discrimination of the Modes of Operation of Cryptographic Systems
- Copyright by Gokhan Sayilar 2014 the Thesis Committee for Gokhan Sayilar Certifies That This Is the Approved Version of the Following Thesis