Skip to main content
  • 110 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Aoki, K., T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima, and T. Tokita (2001). “Camellia: A 128-bit block cipher suitable for multiple platforms—design and analysis.” Selected Areas in Cryptography, SAC 2000, Lecture Notes in Computer Science, vol. 2012, eds. D.R. Stinson and S.E. Tavares. Springer-Verlag, Berlin, 39–56.

    Google Scholar 

  2. Hatano, Y., H. Sekine, and T. Kaneko (2002). “Higher order differential attack of Camellia (II).” Selected Areas in Cryptography, SAC 2002. Lecture Notes in Computer Science, eds. H. Heys and K. Nyberg. Springer-Verlag, Berlin, 39–56.

    Google Scholar 

  3. Shirai, T. (2002). “Differential, linear, boomerang and rectangle cryptanalysis of reduced-round Camellia.” Proceedings of the Third NESSIE Workshop, NESSIE, November 2002.

    Google Scholar 

  4. Yeom, Y., S. Park, and I. Kim (2002). “On the security of Camellia against the square attack.” Fast Software Encryption, FSE 2002, Lecture Notes in Computer Science, vol. 2365, eds. J. Daemen and V. Rijmen. Springer-Verlag, Berlin, 89–99.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

De Cannière, C. (2005). Camellia. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_44

Download citation

Publish with us

Policies and ethics