Camellia カメリア

Camellia 参考文献リスト

以下は、情報提供の一環として、Camelliaに関連して学会等で発表があった論文および論文誌に掲載された論文を一覧にまとめたものです。内容等についての御質問は、それぞれの著者にお問い合わせください(NTTに問い合わせいただいてもお答えできませんので御了承ください)。また、NTT及び三菱電機が、内容の正確性について保証を与えるものでも有りません。
NTTおよび三菱電機は、Camelliaに関連する皆様からの情報提供を歓迎します。

公式評価報告書

NESSIE
"NESSIE Security Report, version 2.0," NESSIE Deliverables of the NESSIE project D20, NES/DOC/ENS/WP5/D20/2, Feb. 2003.
NESSIE
"NESSIE Performance of Optimized Implementations of the NESSIE Primitives, version 2.0," NESSIE Deliverables of the NESSIE project D21, NES/DOC/TEC/WP6/D21/2, Feb. 2003.
情報処理振興事業協会、通信・放送機構
「暗号技術評価報告書(2002年度版) CRYPTREC Report 2002」、Mar. 2003.
総務省、経済産業省
「暗号技術検討会 2002年度報告書」、Mar. 2003.

報告書等

  • Yiqun Lisa Yin, "A Note on the Block Cipher Camellia," August 2000. This note is a part of Japanese contribution for ISO/IEC JTC1/SC27, Call for contribution on NP18033: Encryption Algorithms, Part 3: Block Ciphers. (yiqun.ps 288KB) (yiqun.pdf 134KB)
  • Lars R. Knudsen, "Analysis of Camellia," April 2000. This note is a part of Japanese contribution for ISO/IEC JTC1 SC27, Call for contribution on NP18033: Encryption Algorithms, Part 3: Block Ciphers. (knudsen.ps 219KB) (knudsen.pdf 100KB)
  • "Proposal of addition of new cipher suites to TLS to support Camellia, EPOC, and PSEC," presentation slides at the 48th IETF meeting (TLS WG), August 2000. (IETF.ppt 228KB) (IETF.pdf 179KB)
  • Shiho Moriai, "On the new cipher proposal for TLS (Transport Layer Security) (in Japanese) ", 48th IETF report meeting, IAJ, ISOC-JP, and ITRC, September 2000. (IETF_report.ppt 145KB)

論文等

【2011年】new

  • Leibo Li, Jiazhe Chen and Keting Jia, "New Impossible Differential Cryptanalysis of Reduced-Round Camellia", Lecture Notes in Computer Science, 2011, Volume 7092, Cryptology and Network Security, pp.26--39.
  • Rishabh Poddar, Amit Datta and Chester Rebeiro, "A Cache Trace Attack on CAMELLIA", Lecture Notes in Computer Science, 2011, Volume 7011, Security Aspects in Information Technology, pp.144--156.
  • Jiazhe Chen, Keting Jia, Hongbo Yu and Xiaoyun Wang, "New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256", Lecture Notes in Computer Science, 2011, Volume 6812, Information Security and Privacy, pp.16--33.
  • Xiangyang Xu and Guangsheng Zhang, "Security research with Square attack to a variant Camellia cipher", Frontiers of Electrical and Electronic Engineering in China, 2010, Volume 5, Number 4, pp.482--487.
  • Yuechuan Wei, Ping Li, Bing Sun and Chao Li, "Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions", Lecture Notes in Computer Science, 2010, Volume 6123, Applied Cryptography and Network Security, pp.105--122.
  • Huihui Yap, Khoongming Khoo and Axel Poschmann, "Parallelizing the Camellia and SMS4 Block Ciphers", Lecture Notes in Computer Science, 2010, Volume 6055, Progress in Cryptology ? AFRICACRYPT 2010, pp.387--406.
  • Wenling Wu and Dengguo Feng, "Collision attack on reduced-round Camellia", Science in China Series F: Information Sciences, 2005, Volume 48, Number 1, pp.78--90.
  • Wen-Ling Wu, Wen-Tao Zhang and Deng-Guo Feng, "Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia", Journal of Computer Science and Technology, 2007, Volume 22, Number 3, pp.449--456.
  • Wen-Ling Wu, "Pseudorandomness of Camellia-Like Scheme", Journal of Computer Science and Technology, 2006, Volume 21, Number 1, pp.82--88.
  • 朝日康介、五十嵐保隆、金子敏信、「A-7-7 ブロック暗号CamelliaのCUDAによる高速実装」、電子情報通信学会2010年ソサイエティ大会.
  • 青木和麻呂、「改善された力まかせの攻撃法の実効性について---AESとCamelliaの(再)評価」、2012年暗号とセキュリティ技術シンポジウム SCIS2012、1C2-5.

【2010年】

  • Alex Biryukov and Ivica Nikolić, "Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad, and Others", Advances in Cryptology - EUROCRYPT 2010, LNCS 6110, Springer-Verlag.

【2009年】

  • 関谷啓吾、小田哲、行木孝夫、「Core 2におけるCamelliaの高速実装」、2009年暗号と情報セキュリティシンポジウム SCIS2009、2C2-4、Jan. 2009.
  • Hamid Mala, Mohsen Shakiba, Mohammad Dakhilalian and Ghadamali Bagherikaram, "New Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-128", Proceedings of the 16th Annual International Workshop on Selected Areas in Cryptography, SAC 2009, LNCS 5867, Springer-Verlag.

【2008年】

  • 及川一樹、児玉英一郎、王家宏、高田豊雄、「共通言語基盤上における暗号アルゴリズムの効率的な実装手法」、2008年暗号と情報セキュリティシンポジウム SCIS2008、2C2-5、Jan. 2008.
  • Jiqiang Lu, Jongsung Kim, Nathan Keller, and Orr Dunkelman, "Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1", Topics in Cryptology -- CT-RSA 2008 The Cryptographers' Track at the RSA Conference 2008, LNCS 4964, Springer-Verlag.
  • Wenling Wu, Lei Zhang and Wentao Zhang, "Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia", Proceedings of the 15th Annual International Workshop on Selected Areas in Cryptography, SAC 2008, LNCS 5381, Springer-Verlag.

【2007年】

  • Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh, "ASIC Performance Comparison for the ISO Standard Block Ciphers", in proceedings of the 2nd Joint Workshop on Information Security, JWIS2007, Aug. 2007.
  • Akashi Satoh and Sumio Morioka, "Compact Hardware Architecture for 128-bit Block Cipher Camellia", in proceedings of 3rd NESSIE workshop, Nov. 2002.
  • 菅原健、本間尚文、青木孝文、佐藤証、「ISO標準ブロック暗号のASICハードウェア性能評価」、信学技法IT2006-104, ISEC2006-159, WBS2006-101, Mar. 2007.
  • Lei Duo, Chao Li, Keqin Feng, ``Square Like Attack on Camellia,'' the 9th International Conference on Information and Communications Security, ICICS 2007, LNCS 4861, Springer-Verlag.
  • Mitsuru Matsui, Junko Nakajima, ``On the Power of Bitslice Implementation on Intel Core2 Processor,'' the 9th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2007, LNCS 4727, Springer-Verlag.

【2006年】

  • Guan Jie, Zhang Zhongya, ``Improved Collision Attack on Reduced Round Camellia,'' the 5th International Conference on Cryptology and Network Security, CANS 2006, LNCS 4301, Springer-Verlag.
  • Mitsuru Matsui, ``How Far Can We Go on the x64 Processors?,'' the 13th International Workshop on Fast Software Encryption, FSE 2006, LNCS 4047, Springer-Verlag.
  • 小田哲、青木和麻呂、小林 鉄太郎、「Pentium 4におけるCamelliaの高速実装」、2006年暗号と情報セキュリティシンポジウムSCIS2006、2C3-2、Jan. 2006.
  • 福田明香、松井充、「64-bit プロセッサにおける共通鍵暗号のソフトウェア実装性能解析」、2006年暗号と情報セキュリティシンポジウムSCIS2006、2C3-3、Jan. 2006.

【2005年】

  • Daniel Denning, James Irvine, Malachy Devlin, ``A HIGH THROUGHPUT FPGA CAMELLIA IMPLEMENTATION,'' PhD Research In Micro-Electronics & Electronics, PRIME 2005, Jul. 2005. (paper: PRIME05.pdf 265KB)
  • Lu Xiao, Howard M. Heys, ``A simple power analysis attack against the key schedule of the Camellia block cipher,'' Information Processing Letters, vol. 95, pp. 409-412, Elsevier, 2005.
  • Lu Xiao, Howard M. Heys, ``An Improved Power Analysis Attack Against Camellia's Key Schedule,'' http://eprint.iacr.org/2005/338, 2005.
  • Duo Lei, Li Chao, Feng Keqin,``New Observation on Camellia,'' Proceedings of the 12th Annual International Workshop on Selected Areas in Cryptography, SAC 2005, LNCS 3897, Springer-Verlag.

【2004年】

  • 高橋賢司、市川哲也、鈴木大輔、粕谷智巳、「FPGA を用いた暗号アルゴリズムCamellia のハードウェア高速実装」、電子情報通信学会2004基礎・境界ソサエティ大会A-7-7, Sep. 2004.
  • 武田仁己、金子敏信、「Camelliaの確率的不能差分攻撃に関する一考察」、 2004年暗号と情報セキュリティシンポジウムSCIS2004、3A-5、Jan. 2004.
  • Wu Wenling, Feng Dengguo, Chen Hua,``Collision Attack and Pseudorandomness of Reduced-Round Camellia,'' the 11th Annual International Workshop on Selected Areas in Cryptography, SAC 2004, LNCS 3357, Springer-Verlag.
  • Daniel Denning, James Irvine, Malachy Devlin, ``A Key Agile 17.4 Gbit/sec Camellia Implementation,'' the 14th International Conference on Field-Programmable Logic and its Applications, FPL 2004, LNCS 3203, Springer-Verlag.
  • Taizo Shirai, Kyoji Shibutani, ``Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices'', the 11th International Workshop on Fast Software Encryption, FSE 2004, LNCS 3017, Springer-Verlag.
  • Herve Ledig, Frederic Muller, and Frederic Valette, ``Enhancing Collision Attacks,'' the 6th International workshop on Cryptographic Hardware and Embedded Systems, CHES 2004, LNCS 3156, Springer-Verlag.

【2003年】

  • 角尾幸保、洲崎智保、齋藤照夫、川端剛嗣、宮内宏、「S-boxにおけるキャッシュ遅延を利用したCamelliaへのタイミング攻撃」、2003年暗号と情報セキュリティシンポジウムSCIS2003, 3D-4, pp.179--184,Jan. 2003.
  • Y. Yeom, S. Park and I. Kim, ``A Study of Integral Type Cryptanalysis on Camellia,'' 2003年暗号と情報セキュリティシンポジウムSCIS2003, 6D-2, pp453--456, Jan. 2003.
  • 佐藤証、森岡澄夫、「AES/Camellia/Triple-DESのハードウェア性能比較」、2003年暗号と情報セキュリティシンポジウムSCIS2003, 12D-1, pp.935--940, Jan. 2003.
  • 佐藤証、森岡澄夫、「AESとCamelliaの共有ハードウェア・アーキテクチャ」、2003年暗号と情報セキュリティシンポジウムSCIS2003, 12D-2, pp.941--946, Jan. 2003.
  • 反町亨、市川哲也、粕谷智巳、「FPGAを用いたブロック暗号のハードウェア実装評価」、2003年暗号と情報セキュリティシンポジウムSCIS2003, 12D-3, pp.947--952, 2003.
  • L. Xiao and H.M. Heys, ``Hardware Performance Characterization of Block Cipher Structures,'' Topics in Cryptology -- CT-RSA 2003 The Cryptographers' Track at the RSA Conference 2003, LNCS 2612, Springer-Verlag.
  • 武田仁己、金子敏信、「Camelliaの制限型高階差分攻撃に関する制御条件」、電子情報通信学会2003基礎・境界ソサエティ大会A-7-14, Sep. 2003.
  • Akashi Satoh, Sumio Morioka, ``Unified Hardware Architecture for 128-Bit Block Ciphers AES and Camellia,'' the 5th International workshop on Cryptographic Hardware and Embedded Systems, CHES 2003, LNCS 2779, Springer-Verlag.
  • Akashi Satoh, Sumio Morioka, ``Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES,'' the 6th Information Security Conference, ISC 2003, LNCS 2851, Springer-Verlag.
  • Alex Biryukov, Christophe De Cannire, ``Block Ciphers and Systems of Quadratic Equations,'' the 10th International Workshop on Fast Software Encryption, FSE 2003, LNCS 2887, Springer-Verlag.
  • Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Maki Shigeri, Hiroshi Miyauchi, ``Cryptanalysis of DES Implemented on Computers with Cache,'' the 5th International workshop on Cryptographic Hardware and Embedded Systems, CHES 2003, LNCS 2779, Springer-Verlag.

【2002年】

  • 佐藤証、森岡澄夫、張網、「128ビットブロック暗号Camelliaの小型ハードウェア・アークテクチャ」、2002年暗号と情報セキュリティシンポジウムSCIS2002, 9B-3, pp.595--598, Jan. 2002.
  • 武田仁己、金子敏信、「Camelliaの制御型高階差分攻撃に関する一考察」、2002年暗号と情報セキュリティシンポジウムSCIS2002, 13A-1, pp.915--919, Jan. 2002.
  • T. Ogiso, Y. Sakabe, M. Soshi, and A. Miyaji, ``Software Obfuscation on a Theoretical Basis and Its Implementation,'' IEICE transactions on fundamentals, Vol.E86-A No.1, 2002.
  • T. Kawabata, M. Takeda, and T. Kaneko, ``A Study on Higher Order Differential Attack of Camellia,'' IEICE transactions on fundamentals, Vol.E86-A No.1, 2002.
  • M. Sugita, K. Kobara, and H. Imai, ``Best Truncated and Impossible Differentials of Feistel Block Ciphers with S-D (Substitution and Diffusion) or D-S Round Functions,'' IEICE transactions on fundamentals, Vol.E86-A No.1, 2002.
  • T. Shirai, S. Kanamaru, and G. Abe, ``Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia,'' the 9th International Workshop on Fast Software Encryption, FSE 2002, LNCS 2365, Springer-Verlag.
  • Y. Yeom, S. Park, and I. Kim, ``On the Security of CAMELLIA against the Square Attack,'' the 9th International Workshop on Fast Software Encryption, FSE 2002, LNCS 2365, Springer-Verlag.
  • 市川哲也、粕谷智巳、松井充、「128bitブロック暗号Camelliaの小型ハードウェア実装おける一方法」、電子情報通信学会2002情報通信基礎サブソサエティ合同研究会、Mar. 2002.
  • 秦野康生、金子敏信、「Camelliaの高階差分攻撃(II)」、信学技報ISEC2002-2, May 2002.
  • Y. Hatano, H. Sekine, and T. Kaneko, ``Higher Order Differential Attack of Camellia(II),'' the 9th Annual International Workshop on Selected Areas in Cryptography, SAC 2002, LNCS 2595, Springer-Verlag.
  • T. Shirai,``Differential, Linear, Boomerang and Rectangle Cryptanalysis of Reduced-Round Camellia,'' in proceedings of 3rd NESSIE workshop, Nov. 2002.
  • N.T. Courtois, ``Cryptanalysis of Block Ciphers with Overdefined Systems of Equations,'' Advances in Cryptology - ASIACRYPT 2002, LNCS 2501, Springer-Verlag.
  • Soichi Furuya, Kouichi Sakurai, ``Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC'', the 5th International Conference on Information and Communications Security, ICICS 2002, LNCS 2513, Springer-Verlag.

【2001年】

  • 神田雅透、「Truncated Differential Cryptanalysisに対するCamelliaの安全性について」、2001年暗号と情報セキュリティシンポジウムSCIS2001、11A-2, pp.585--590, Jan. 2001.
  • 渋谷香士、下山武司、辻井重男、「Byte-Orientedな暗号に対するTruncated Linear Attack」、2001年暗号と情報セキュリティシンポジウムSCIS2001, 11A-3, pp.591--596, Jan. 2001.
  • C. H. Yang、``Performance Evaluation of AES/DES/Camellia On the 6805 and H8/300 CPUs,'' 2001年暗号と情報セキュリティシンポジウムSCIS2001, 13A-1, pp.727--730, Jan. 2001.
  • K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima, and T. Tokita, ``The 128-Bit Block Cipher Camellia,'' IEICE transactions on fundamentals, Vol.E85-A No.1, 2001.
  • M. Kanda and T. Matsumoto, ``On the Security of Feistel Ciphers with SPN Round Function against Differential, Linear, and Truncated Differential Cryptanalysis,'' IEICE transactions on fundamentals, Vol.E85-A No.1, 2001.
  • M. Kanda and T. Matsumoto, ``Security of Camellia against Truncated Differential Cryptanalysis,'' the 8th International Workshop on Fast Software Encryption, FSE 2001, LNCS 2355, Springer-Verlag.
  • 川端健、大垣康博、金子敏信、「Camelliaの高階差分攻撃に関する一考察」、信学技報ISEC2001-9, May 2001.
  • T. Kawabata and T. Kaneko, ``A Study on Higher Order Differential Attack of Camellia,'' in proceedings of 2nd NESSIE workshop, Sep. 2001.
  • 杉田誠、古原和邦、今井秀樹、「トランケイテッド差分解読法と不能差分解読法に対するCamelliaの安全性評価」、2001年電子情報通信学会ソサイエティ大会講演論文集(分冊1-6) A-7-8、Sep. 2001.
  • 武田仁己、川端健、大垣康博、金子敏信、「Camelliaの制御型高階差分攻撃に関する一考察」、2001年電子情報通信学会ソサイエティ大会講演論文集(分冊1-6) A-7-9、Sep. 2001.
  • T. Kawabata and T. Kaneko, ``A Study on Strength of Camellia against Higher Order Differential Attack,'' the 4th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2001, Nov. 2001.
  • M. Sugita, K. Kobara, and H. Imai, ``Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis,'' Advances in Cryptology - ASIACRYPT 2001, LNCS 2248, Springer-Verlag.
  • E. Biham, O. Dunkelman, V. Furman, T. Mor, ``Preliminary report on the NESSIE submissions Anubis, Camellia, IDEA, Khazad, Misty1, Nimbus, Q,'' NESSIE public report, NES/DOC/TEC/WP3/011/b.
  • Y. Braziler, ``The statistical evaluation of the NESSIE submission Camellia,'' NESSIE public report, NES/DOC/TEC/WP3/019/1.
  • Y. He and S. Qing, ``Square Attack on Reduced Camellia Cipher,'' the Third International Conference on Information and Communications Security, ICICS 2001, LNCS 2229, Springer-Verlag.
  • S. Lee, S. Hong, and S. Lee, J. Lim, and S. Yoon, ``Truncated Differential Cryptanalysis of Camellia,'' the 4th International Conference on Information Security and Cryptology, ICISC 2001, LNCS 2288, Springer-Verlag.

【2000年】

  • 青木和麻呂、市川哲也、神田雅透、松井充、盛合志帆、中嶋純子、時田俊雄、「128ビットブロック暗号Camellia」、信学技報ISEC2000-6, May 2000.
  • K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima, and T. Tokita, ``Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis,'' the 7th Annual International Workshop on Selected Areas in Cryptography, SAC 2000, LNCS 2012, Springer-Verlag. (sac_camellia.ps.gz 200KB) (sac_camellia.pdf 294KB)
  • M. Kanda, ``Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function,'' the 7th Annual International Workshop on Selected Areas in Cryptography, SAC 2000, LNCS 2012, Springer-Verlag.
  • 市川哲也、松井充、中嶋純子、時田俊雄、青木和麻呂、神田雅透、盛合志帆、「128ビットブロック暗号Camelliaの実装評価」、信学技報ISEC2000-73, Sep. 2000.

ページトップ