Crypto-Core Design using Camellia Cipher
暂无分享,去创建一个
Mohd Nazrin Md Isa | Rizalafande Che Ismail | Siti Zarina Md Naziri | Razaidi Hussin | Chew Wei Ci | Muhammad Sufyan Safwan Mohamad Basir
[1] Marcin Rogawski. Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to Camellia algorithm) using ALTERA devices , 2003, IACR Cryptol. ePrint Arch..
[2] Jens-Peter Kaps,et al. Compact FPGA implementation of Camellia , 2009, 2009 International Conference on Field Programmable Logic and Applications.
[3] Zhiqiang Liu,et al. Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256 , 2011, J. Syst. Softw..
[4] Howard M. Heys,et al. A simple power analysis attack against the key schedule of the Camellia block cipher , 2005, Inf. Process. Lett..
[5] Mitsuru Matsui,et al. Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis , 2000, Selected Areas in Cryptography.
[6] H.M. Heys,et al. Compact Hardware Implementation of the Block Cipher Camellia with Concurrent Error Detection , 2007, 2007 Canadian Conference on Electrical and Computer Engineering.
[7] Analysis of Camellia , 2000 .
[8] M. Devlin,et al. A high throughput FPGA Camellia implementation , 2005, Research in Microelectronics and Electronics, 2005 PhD.
[9] Takakazu Kurokawa,et al. High-Performance Symmetric Block Ciphers on CUDA , 2011, 2011 Second International Conference on Networking and Computing.
[10] Zoran Čiča. Pipelined implementation of Camellia encryption algorithm , 2016, 2016 24th Telecommunications Forum (TELFOR).
[11] Elif Bilge Kavun,et al. A pipelined camellia architecture for compact hardware implementation , 2010, ASAP 2010 - 21st IEEE International Conference on Application-specific Systems, Architectures and Processors.