{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:33:45Z","timestamp":1761708825980},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642349300"},{"type":"electronic","value":"9783642349317"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34931-7_15","type":"book-chapter","created":{"date-parts":[[2012,12,5]],"date-time":"2012-12-05T22:24:04Z","timestamp":1354746244000},"page":"244-264","source":"Crossref","is-referenced-by-count":6,"title":["The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher"],"prefix":"10.1007","author":[{"given":"Jiqiang","family":"Lu","sequence":"first","affiliation":[]},{"given":"Yongzhuang","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Jongsung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Enes","family":"Pasalic","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/3-540-44983-3_4","volume-title":"Selected Areas in Cryptography","author":"K. Aoki","year":"2001","unstructured":"Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol.\u00a02012, pp. 39\u201356. Springer, Heidelberg (2001)"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-642-29101-2_6","volume-title":"Information Security Practice and Experience","author":"D. Bai","year":"2012","unstructured":"Bai, D., Li, L.: New Impossible Differential Attacks on Camellia. In: Ryan, M.D., Smyth, B., Wang, G. (eds.) ISPEC 2012. LNCS, vol.\u00a07232, pp. 80\u201396. Springer, Heidelberg (2012)"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/3-540-48910-X_2","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"E. Biham","year":"1999","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 12\u201323. Springer, Heidelberg (1999)"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/3-540-44987-6_21","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"E. Biham","year":"2001","unstructured":"Biham, E., Dunkelman, O., Keller, N.: The Rectangle Attack - Rectangling the Serpent. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 340\u2013357. Springer, Heidelberg (2001)"},{"issue":"1","key":"15_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology\u00a04(1), 3\u201372 (1991)","journal-title":"Journal of Cryptology"},{"issue":"4","key":"15_CR6","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/s00145-010-9062-1","volume":"23","author":"A. Biryukov","year":"2010","unstructured":"Biryukov, A., Shamir, A.: Structural cryptanalysis of SASAS. Journal of Cryptology\u00a023(4), 505\u2013518 (2010)","journal-title":"Journal of Cryptology"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-22497-3_2","volume-title":"Information Security and Privacy","author":"J. Chen","year":"2011","unstructured":"Chen, J., Jia, K., Yu, H., Wang, X.: New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256. In: Parampalli, U., Hawkes, P. (eds.) ACISP 2011. LNCS, vol.\u00a06812, pp. 16\u201333. Springer, Heidelberg (2011)"},{"key":"15_CR8","unstructured":"CRYPTREC \u2014 Cryptography Research and Evaluatin Committees, report 2002 (2003)"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/BFb0052343","volume-title":"Fast Software Encryption","author":"J. Daemen","year":"1997","unstructured":"Daemen, J., Knudsen, L.R., Rijmen, V.: The Block Cipher SQUARE. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 149\u2013165. Springer, Heidelberg (1997)"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-71039-4_7","volume-title":"Fast Software Encryption","author":"H. Demirci","year":"2008","unstructured":"Demirci, H., Sel\u00e7uk, A.A.: A Meet-in-the-Middle Attack on 8-Round AES. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 116\u2013126. Springer, Heidelberg (2008)"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-642-10628-6_10","volume-title":"Progress in Cryptology - INDOCRYPT 2009","author":"H. Demirci","year":"2009","unstructured":"Demirci, H., Ta\u015fk\u0131n, \u0130., \u00c7oban, M., Baysal, A.: Improved Meet-in-the-Middle Attacks on AES. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol.\u00a05922, pp. 144\u2013156. Springer, Heidelberg (2009)"},{"issue":"6","key":"15_CR12","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W. Diffie","year":"1977","unstructured":"Diffie, W., Hellman, M.: Exhaustive cryptanalysis of the NBS data encryption standard. Computer\u00a010(6), 74\u201384 (1977)","journal-title":"Computer"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-642-17373-8_10","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"O. Dunkelman","year":"2010","unstructured":"Dunkelman, O., Keller, N., Shamir, A.: Improved Single-Key Attacks on 8-Round AES-192 and AES-256. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol.\u00a06477, pp. 158\u2013176. Springer, Heidelberg (2010)"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/11693383_4","volume-title":"Selected Areas in Cryptography","author":"D. Lei","year":"2006","unstructured":"Lei, D., Chao, L., Feng, K.: New Observation on Camellia. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 51\u201364. Springer, Heidelberg (2006)"},{"key":"15_CR15","unstructured":"Gilbert, H., Minier, M.: A collision attack on 7 rounds of Rijndael. In: Proceedings of the Third Advanced Encryption Standard Candidate Conference, pp. 230\u2013241. NIST (2000)"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/3-540-36492-7_10","volume-title":"Selected Areas in Cryptography","author":"Y. Hatano","year":"2003","unstructured":"Hatano, Y., Sekine, H., Kaneko, T.: Higher Order Differential Attack of Camellia(II). In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 39\u201356. Springer, Heidelberg (2003)"},{"issue":"4","key":"15_CR17","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"26","author":"M.E. Hellman","year":"1980","unstructured":"Hellman, M.E.: A cryptanalytic time\u2013memory trade-off. IEEE Transcations on Information Theory\u00a026(4), 401\u2013406 (1980)","journal-title":"IEEE Transcations on Information Theory"},{"issue":"17","key":"15_CR18","doi-asserted-by":"publisher","first-page":"1458","DOI":"10.1049\/el:19990979","volume":"35","author":"Y. Hu","year":"1999","unstructured":"Hu, Y., Zhang, Y., Xiao, G.: Integral cryptanalysis of SAFER+. Electronics Letters\u00a035(17), 1458\u20131459 (1999)","journal-title":"Electronics Letters"},{"key":"15_CR19","unstructured":"International Standardization of Organization (ISO), International Standard \u2013 ISO\/IEC 18033-3, Information technology \u2013 Security techniques \u2013 Encryption algorithms \u2013 Part 3: Block ciphers (2005)"},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"1995","unstructured":"Knudsen, L.R.: Truncated and Higher Order Differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 196\u2013211. Springer, Heidelberg (1995)"},{"key":"15_CR21","unstructured":"Knudsen, L.R.: DEAL \u2014 a 128-bit block cipher. Technical report, Department of Informatics, University of Bergen, Norway (1998)"},{"key":"15_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/3-540-45661-9_9","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"2002","unstructured":"Knudsen, L.R., Wagner, D.: Integral Cryptanalysis. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol.\u00a02365, pp. 112\u2013127. Springer, Heidelberg (2002)"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Lai, X.: Higher order derivatives and differential cryptanalysis. In: Communications and Cryptography, pp. 227\u2013233. Academic Publishers (1994)","DOI":"10.1007\/978-1-4615-2694-0_23"},{"key":"15_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-642-34047-5_6","volume-title":"Fast Software Encryption","author":"Y. Liu","year":"2012","unstructured":"Liu, Y., Li, L., Gu, D., Wang, X., Liu, Z., Chen, J., Li, W.: New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol.\u00a07549, pp. 90\u2013109. Springer, Heidelberg (2012)"},{"key":"15_CR25","unstructured":"Lu, J.: Cryptanalysis of block ciphers. PhD thesis, University of London, UK (2008)"},{"key":"15_CR26","unstructured":"Lu, J., Wei, Y., Kim, J., Fouque, P.-A.: Cryptanalysis of reduced versions of the Camellia block cipher. In: Miri, A., Vaudenay, S. (eds.) Pre-proceedings of SAC 2011 (2011), \n                    \n                      http:\/\/sac2011.ryerson.ca\/SAC2011\/LWKF.pdf\n                    \n                    \n                  , An editorially revised version is to appear in IET Information Security"},{"key":"15_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/978-3-642-34117-5_13","volume-title":"IWSEC 2012","author":"J. Lu","year":"2012","unstructured":"Lu, J., Wei, Y., Pasalic, E., Fouque, P.-A.: Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher. In: Hanaoka, G., Yamauchi, T. (eds.) IWSEC 2012. LNCS, vol.\u00a07631, pp. 197\u2013215. Springer, Heidelberg (2012)"},{"key":"15_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-642-05445-7_18","volume-title":"Selected Areas in Cryptography","author":"H. Mala","year":"2009","unstructured":"Mala, H., Shakiba, M., Dakhilalian, M., Bagherikaram, G.: New Results on Impossible Differential Cryptanalysis of Reduced\u2013Round Camellia\u2013128. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol.\u00a05867, pp. 281\u2013294. Springer, Heidelberg (2009)"},{"issue":"3","key":"15_CR29","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1049\/iet-ifs.2010.0094","volume":"5","author":"H. Mala","year":"2011","unstructured":"Mala, H., Dakhilalian, M., Shakiba, M.: Impossible differential cryptanalysis of reduced-round Camellia-256. IET Information Security\u00a05(3), 129\u2013134 (2011)","journal-title":"IET Information Security"},{"key":"15_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"15_CR31","unstructured":"NESSIE \u2014 New European Schemes for Signatures, Integrity, and Encryption, Final report of European project IST-1999-12324 (2004)"},{"key":"15_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-642-21031-0_17","volume-title":"Information Security Practice and Experience","author":"Y. Wei","year":"2011","unstructured":"Wei, Y., Lu, J., Hu, Y.: Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits. In: Bao, F., Weng, J. (eds.) ISPEC 2011. LNCS, vol.\u00a06672, pp. 222\u2013232. Springer, Heidelberg (2011)"},{"key":"15_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-540-30564-4_18","volume-title":"Selected Areas in Cryptography","author":"W. Wu","year":"2004","unstructured":"Wu, W., Feng, D., Chen, H.: Collision Attack and Pseudorandomness of Reduced-Round Camellia. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 252\u2013266. Springer, Heidelberg (2004)"},{"key":"15_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-48519-8_12","volume-title":"Fast Software Encryption","author":"D. Wagner","year":"1999","unstructured":"Wagner, D.: The Boomerang Attack. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 156\u2013170. Springer, Heidelberg (1999)"},{"key":"15_CR35","unstructured":"Yeom, Y., Park, S., Kim, I.: A study of integral type cryptanalysis on Camellia. In: Proceedings of the 2003 Symposium on Cryptography and Information Security, pp. 453\u2013456. IEICE (2003)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - INDOCRYPT 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34931-7_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T13:07:48Z","timestamp":1620133668000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34931-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642349300","9783642349317"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34931-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}