This paper revisits previous known-key distinguishers on generic Feistel-SP ciphers based on rebound attacks. In this paper first we propose a new 5-round inbound phase that requires 2c computations, while the previous work requires 2²c computations (c is a size of the S-box). The new method also improves the number of rounds which can be attacked. Then, we apply the new procedure to Camellia. After several optimizations for Camellia, it is shown that collisions are efficiently generated against 9 rounds out of 18 rounds of Camellia-128 including FL and whitening layers in the compression function modes such as MMO and Miyaguchi-Preneel modes. The attack on Camellia is verified by a machine experiment and the generated results are presented...
International audienceCamellia is one of the widely used block ciphers, which has been selected as a...
In this paper, we present new generic multiset attacks against generalized Feistel networks, by whic...
International audienceIn this paper we present a boomerang analysis of WARP, a recently proposed Gen...
Camellia is one of the widely used block ciphers, which has been included in the NESSIE block cipher...
Abstract. Camellia is one of the widely used block ciphers, which has been selected as an internatio...
Abstract. Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construc...
Abstract. Camellia is a widely used block cipher, which has been selected as an international standa...
Since Knudsen and Rijmen proposed the known-key attacks in ASIACRYPT 2007, the open-key model become...
Abstract. In this paper, we propose related-key differential distinguish-ers based on the complement...
Abstract Symmetric cryptography is expected to be quantum safe when long‐term security is needed. Ku...
International audienceThe Camellia block cipher has a 128-bit block length and a user key of 128, 19...
We propose two parallelisable variants of Camellia and SMS4 block ciphers based on the n-cell GF-NLF...
Abstract. We show key recovery attacks on generic balanced Feistel ciphers. The analysis is based on...
International audienceGeneric distinguishers against Feistel Network with up to 5 rounds exist in th...
Abstract. Improved meet-in-the-middle cryptanalysis with efficient tab-ulation technique has been sh...
International audienceCamellia is one of the widely used block ciphers, which has been selected as a...
In this paper, we present new generic multiset attacks against generalized Feistel networks, by whic...
International audienceIn this paper we present a boomerang analysis of WARP, a recently proposed Gen...
Camellia is one of the widely used block ciphers, which has been included in the NESSIE block cipher...
Abstract. Camellia is one of the widely used block ciphers, which has been selected as an internatio...
Abstract. Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construc...
Abstract. Camellia is a widely used block cipher, which has been selected as an international standa...
Since Knudsen and Rijmen proposed the known-key attacks in ASIACRYPT 2007, the open-key model become...
Abstract. In this paper, we propose related-key differential distinguish-ers based on the complement...
Abstract Symmetric cryptography is expected to be quantum safe when long‐term security is needed. Ku...
International audienceThe Camellia block cipher has a 128-bit block length and a user key of 128, 19...
We propose two parallelisable variants of Camellia and SMS4 block ciphers based on the n-cell GF-NLF...
Abstract. We show key recovery attacks on generic balanced Feistel ciphers. The analysis is based on...
International audienceGeneric distinguishers against Feistel Network with up to 5 rounds exist in th...
Abstract. Improved meet-in-the-middle cryptanalysis with efficient tab-ulation technique has been sh...
International audienceCamellia is one of the widely used block ciphers, which has been selected as a...
In this paper, we present new generic multiset attacks against generalized Feistel networks, by whic...
International audienceIn this paper we present a boomerang analysis of WARP, a recently proposed Gen...