References
Aoki, K., T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima, and T. Tokita (2001). “Camellia: A 128-bit block cipher suitable for multiple platforms—design and analysis.” Selected Areas in Cryptography, SAC 2000, Lecture Notes in Computer Science, vol. 2012, eds. D.R. Stinson and S.E. Tavares. Springer-Verlag, Berlin, 39–56.
Hatano, Y., H. Sekine, and T. Kaneko (2002). “Higher order differential attack of Camellia (II).” Selected Areas in Cryptography, SAC 2002. Lecture Notes in Computer Science, eds. H. Heys and K. Nyberg. Springer-Verlag, Berlin, 39–56.
Shirai, T. (2002). “Differential, linear, boomerang and rectangle cryptanalysis of reduced-round Camellia.” Proceedings of the Third NESSIE Workshop, NESSIE, November 2002.
Yeom, Y., S. Park, and I. Kim (2002). “On the security of Camellia against the square attack.” Fast Software Encryption, FSE 2002, Lecture Notes in Computer Science, vol. 2365, eds. J. Daemen and V. Rijmen. Springer-Verlag, Berlin, 89–99.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this entry
Cite this entry
De Cannière, C. (2005). Camellia. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_44
Download citation
DOI: https://doi.org/10.1007/0-387-23483-7_44
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23473-1
Online ISBN: 978-0-387-23483-0
eBook Packages: Computer ScienceReference Module Computer Science and Engineering