{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:27:07Z","timestamp":1761708427134},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642054433"},{"type":"electronic","value":"9783642054457"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-05445-7_18","type":"book-chapter","created":{"date-parts":[[2009,11,3]],"date-time":"2009-11-03T10:03:23Z","timestamp":1257242603000},"page":"281-294","source":"Crossref","is-referenced-by-count":18,"title":["New Results on Impossible Differential Cryptanalysis of Reduced\u2013Round Camellia\u2013128"],"prefix":"10.1007","author":[{"given":"Hamid","family":"Mala","sequence":"first","affiliation":[]},{"given":"Mohsen","family":"Shakiba","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Dakhilalian","sequence":"additional","affiliation":[]},{"given":"Ghadamali","family":"Bagherikaram","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/3-540-44983-3_4","volume-title":"Selected Areas in Cryptography","author":"K. Aoki","year":"2001","unstructured":"Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Camellia: a 128-bit Block Cipher Suitable for Multiple Platforms-Design and Analysis. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol.\u00a02012, pp. 39\u201356. Springer, Heidelberg (2001)"},{"key":"18_CR2","unstructured":"Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Specification of Camellia \u2013 a 128-bit Block Cipher. version 2.0 (2001), \n                    \n                      http:\/\/info.isl.ntt.co.jp\/crypt\/eng\/camellia\/specifications.html"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/3-540-48910-X_2","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"E. Biham","year":"1999","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 12\u201323. Springer, Heidelberg (1999)"},{"key":"18_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E. Biham","year":"1993","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer, Heidelberg (1993)"},{"key":"18_CR5","unstructured":"CRYPTREC \u2013 Cryptography Research and Evaluation Committees, report, Archive (2002), \n                    \n                      http:\/\/www.ipa.go.jp\/security\/enc\/CRYPTREC\/index-e.html"},{"key":"18_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-3-540-77048-0_21","volume-title":"Information and Communications Security","author":"L. Duo","year":"2007","unstructured":"Duo, L., Li, C., Feng, K.: Square Like Attack on Camellia. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol.\u00a04861, pp. 269\u2013283. Springer, Heidelberg (2007)"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/3-540-36492-7_10","volume-title":"Selected Areas in Cryptography","author":"Y. Hatano","year":"2003","unstructured":"Hatano, Y., Sekine, H., Kaneko, T.: Higher Order Differential Attack of Camellia (II). In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 129\u2013146. Springer, Heidelberg (2003)"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/3-540-45600-7_27","volume-title":"Information and Communications Security","author":"Y. He","year":"2001","unstructured":"He, Y., Qing, S.: Square Attack on Reduced Camellia Cipher. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol.\u00a02229, pp. 238\u2013245. Springer, Heidelberg (2001)"},{"key":"18_CR9","unstructured":"International Standardization of Organization (ISO), International Standard - ISO\/IEC 18033-3, Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers (July 2005)"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/3-540-45473-X_24","volume-title":"Fast Software Encryption","author":"M. Kanda","year":"2002","unstructured":"Kanda, M., Matsumoto, T.: Security of Camellia against Truncated Differential Cryptanalysis. In: Matsui, M. (ed.) FSE 2001. LNCS, vol.\u00a02355, pp. 119\u2013137. Springer, Heidelberg (2002)"},{"key":"18_CR11","unstructured":"Kawabata, T., Kaneko, T.: A Study on Higher Order Differential Attack of Camellia. In: The 2nd open NESSIE workshop (2001)"},{"key":"18_CR12","unstructured":"Knudsen, L.R.: DEAL \u2013 a 128-bit Block Cipher. Technical report, Department of Informatics, University of Bergen, Norway (1998)"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/3-540-45861-1_3","volume-title":"Information Security and Cryptology - ICISC 2001","author":"S. Lee","year":"2002","unstructured":"Lee, S., Hong, S., Lee, S., Lim, J., Yoon, S.: Truncated Differential Cryptanalysis of Camellia. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol.\u00a02288, pp. 32\u201338. Springer, Heidelberg (2002)"},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/11693383_4","volume-title":"Selected Areas in Cryptography","author":"D. Lei","year":"2006","unstructured":"Lei, D., Chao, L., Feng, K.: New Observation on Camellia. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 51\u201364. Springer, Heidelberg (2006)"},{"key":"18_CR15","unstructured":"Lu, J.: Cryptanalysis of Block Ciphers. PhD Thesis, Department of Mathematics, Royal Holloway, University of London, England (2008)"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/978-3-540-79263-5_24","volume-title":"Topics in Cryptology \u2013 CT-RSA 2008","author":"J. Lu","year":"2008","unstructured":"Lu, J., Kim, J., Keller, N., Dunkelman, O.: Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol.\u00a04964, pp. 370\u2013386. Springer, Heidelberg (2008)"},{"key":"18_CR17","unstructured":"NESSIE \u2013 New European Schemes for Signatures, Integrity, and Encryption, final report of European project IST-1999-12324. Archive (1999), \n                    \n                      https:\/\/www.cosic.esat.kuleuven.be\/nessie\/Bookv015.pdf"},{"key":"18_CR18","unstructured":"NTT Information Sharing Platform Laboratories: Internationally Standardized Encryption Algorithm from Japan\u201cCamellia\u201d, \n                    \n                      http:\/\/info.isl.ntt.co.jp\/crypt\/camellia\/dl\/Camellia20061108v4_eng.pdf"},{"key":"18_CR19","unstructured":"Shirai, T.: Differential, Linear, Boomerang and Rectangle Cryptanalysis of Reduced-Round Camellia. In: Proceedings of 3rd NESSIE workshop (November 2002)"},{"key":"18_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/3-540-45682-1_12","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"M. Sugita","year":"2001","unstructured":"Sugita, M., Kobara, K., Imai, H.: Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 193\u2013207. Springer, Heidelberg (2001)"},{"key":"18_CR21","series-title":"Lecture Notes in Computer Science","first-page":"252","volume-title":"Selected Areas in Cryptography","author":"W. Wu","year":"2004","unstructured":"Wu, W., Feng, D., Chen, H.: Collision Attack and Pseudorandomness of Reduced-Round Camellia. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 252\u2013266. Springer, Heidelberg (2004)"},{"key":"18_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1007\/978-3-642-04159-4_29","volume-title":"SAC 2008","author":"W. Wu","year":"2009","unstructured":"Wu, W., Zhang, L., Zhang, W.: Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia. In: Avanzi, R., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol.\u00a05381, pp. 442\u2013456. Springer, Heidelberg (2009)"},{"issue":"3","key":"18_CR23","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/s11390-007-9056-0","volume":"22","author":"W. Wu","year":"2007","unstructured":"Wu, W., Zhang, W., Feng, D.: Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. Journal of Computer Science and Technology\u00a022(3), 449\u2013456 (2007)","journal-title":"Journal of Computer Science and Technology"},{"key":"18_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/3-540-45661-9_7","volume-title":"Fast Software Encryption","author":"Y. Yeom","year":"2002","unstructured":"Yeom, Y., Park, S., Kim, I.: On the security of Camellia against the Square attack. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol.\u00a02365, pp. 89\u201399. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-05445-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T12:09:34Z","timestamp":1580299774000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-05445-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642054433","9783642054457"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-05445-7_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}