Bibliography
Related Publications from External Researchers
NOTICE: This is a reference list. Inclusion in the list does not mean that contents of the papers is validated or guaranteed.
List of related publications(from External)
2011
-
Chester Rebeiro, Rishabh Poddar, Amit Datta, and Debdeep Mukhopadhyay,
"An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines."
Indocrypt 2011, LNCS 7107, pp. 55-75, Springer-Verlag, 2011. -
Hamid Mala, Mohammad Dakhilalian, and Mohsen Shakiba
"Impossible Differential Attacks on 13-Round CLEFIA-128."
Journal of Computer Science and Technology, Volume 26, Number 4, pp. 744-750, 2011. -
Andrey Bogdanov, and Vincent Rijmen,
"Zero-Correlation Linear Cryptanalysis of Block Ciphers."
IACR ePrint archive: Report 2011/123. -
Chester Rebeiro, and Debdeep Mukhopadhyay,
"Cryptanalysis of CLEFIA using Differential Methods with Cache Trace Patterns."
CT-RSA 2011, LNCS 6558, pp.89-103, Springer-Verlag, 2011. -
Naoto Kobayashi, Yasutaka Igarashi, and Toshinobu Kaneko,
"Differential characteristic property of CLEFIA."
The 2011 Symposium on Cryptography and Information Security, SCIS 2011, 2B1-3, 2011. -
Naoki Shibayama, Yasutaka Igarashi, Toshibobu Kaneko, and Seiichiro Hangai,
"Security Evaluation of CLEFIA against Saturation Cryptanalysis."
The 2011 Symposium on Cryptography and Information Security, SCIS 2011, 2B1-4, 2011. -
Junko Takahashi, and Toshinori Fukunaga,
"Evaluation of Access-driven Cache Attacks against the Block Ciphers."
The 2011 Symposium on Cryptography and Information Security, SCIS 2011, 2D4-1, 2011.
2010
-
Yukiyasu Tsunoo, Etsuko Tsujihara, Hiroyasu Kubo, Maki Shigeri, and Takeshi Kawabata,
"Saturation Characteristics of Generalized Feistel Structure."
IEICE Transactions, Vol.J93-A No.4 pp.269-276, 2010. -
Cihangir Tezcan,
"The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA."
Indocrypt 2010, LNCS 6498, pp.197-209, Springer-Verlag, 2010. -
Xin-jie ZHAO, Tao WANG, and Jing-zhe GAO,
"Multiple Bytes Differential Fault Analysis on CLEFIA."
IACR ePrint archive: Report 2010/078. -
Xin-jie ZHAO, and Tao WANG,
"Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment."
IACR ePrint archive: Report 2010/056.
2009
-
Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, and Toshinori Fukunaga,
"Cache Timing Attacks on Clefia."
Indocrypt 2009, LNCS 5922, pp.104-118, Springer-Verlag, 2009. -
Wenying Zhang, and Jing Han,
"Impossible Differential Analysis of Reduced Round CLEFIA."
Inscrypt 2008, LNCS 5487, pp.181-191, Springer-Verlag, 2009. -
Junko Takahashi, and Toshinori Fukunaga,
"Differential Fault Analysis on CLEFIA (in Japanese)."
The 2009 Symposium on Cryptography and Information Security, SCIS 2009, 2A3-4, 2009. -
Tomasz Kryjak, and Marek Gorgon,
"Pipeline implementation of the 128-bit block cipher CLEFIA in FPGA."
FPL 2009, pp. 373-378, IEEE 2009. -
Bai Xuefei, Huang Lu, Wang Yao, and Xu Yizhi,
"Differential power analysis attack on CLEFIA block cipher."
International Conference on Computational Intelligence and Software Engineering, CiSE 2009.
2008
-
Junko Takahashi, and Toshinori Fukunaga,
"Improved Differential Fault Analysis on CLEFIA."
FDTC 2008, IEEE Computer Security, pp. 25 - 34, 2008. -
Etsuko Tsujihara, Maki Shigeri, Tomoyasu Suzaki, Takeshi Kawabata, and Yukiyasu Tsunoo,
"New Impossible Differentials of CLEFIA (in Japanese)."
IEICE Technical Report, ISEC2008-3 (2008-05), 2008. -
Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, and Hiroyasu Kubo,
"Impossible Differential Cryptanalysis of CLEFIA."
FSE 2008, LNCS 5086, pp. 398-411, Springer-Verlag, 2008. -
Jongsung Kim, Changhoon Lee, Jaechul Sung, Seokhie
Hong, Sangjin Lee, Jongin Lim,
"Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis."
IEICE Transactions 91-A(10), pp.3047-3058, 2008. -
Y. Tsunoo, E, Tsujihara, M. Shigeri, T.
Suzaki, T. Kawabata,
"Cryptanalysis of CLEFIA using multiple impossible differentials."
ISITA 2008, Proceedings available at IEEE Xplore. -
Takeshi Sugawara, Naofumi Homma , Takafumi Aoki, and Akashi Satoh,
"High-performance ASIC implementations of the 128-bit block cipher CLEFIA."
ISCAS 2008, pp. 2925-2928, IEEE, 2008.
2007
-
Wei Wang, and Xiaoyun Wang,
"Improved Impossible Differential Cryptanalysis of CLEFIA."
IACR ePrint archive: Report 2007/466. -
Hua Chen, Wenling Wu, and Dengguo Feng,
"Differential Fault Analysis on CLEFIA."
ICICS, LNCS 4861, pp. 284-295, Springer-Verlag, 2008. -
Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,
"ASIC Implementations of the 128-bit Block Cipher CLEFIA."
Computer Security Symposium 2007, CSS 2007, pp. 175-180, 2007.
Related Publications from Sony
List of related publications(from Sony)
2011
-
Toru Akishita, and Harunaga Hiwatari,
"Very Compact Hardware Implementations of the Blockcipher CLEFIA."
SAC 2011, LNCS 7118, pp. 278-292, Springer-Verlag, 2011. -
Atsushi Mitsuda, and Taizo Shirai,
"Update of the Security Evaluation of CLEFIA against Differential Attack and Linear Attack."
The 2011 Symposium on Cryptography and Information Security, SCIS 2011, 2B1-2, 2011. -
Toru Akishita, and Harunaga Hiwatari,
"Compact Hardware Implementation of the 128-bit Blockcipher CLEFIA."
The 2011 Symposium on Cryptography and Information Security, SCIS 2011, 3D1-1, 2011.
2007
-
Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, and Tetsu Iwata,
"Hardware Implementations of the 128-bit Blockcipher CLEFIA (in Japanese)."
IEICE Technical Report, ISEC2007-49 (2007-07), 2007. -
Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, and Tetsu Iwata,
"The 128-Bit Blockcipher CLEFIA (in Japanese)."
IEICE Technical Report, ISEC2007-1 (2007-05), 2007. -
Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, and Tetsu Iwata,
"The 128-bit Blockcipher CLEFIA."
FSE 2007, LNCS 4593, pp. 181-195, Springer-Verlag, 2007.
2006
-
Taizo Shirai, and Kyoji Shibutani,
"On Feistel structures using a diffusion switching mechanism."
FSE 2006, LNCS 4047, pp.41-56, Springer-Verlag, 2006.
2004
-
Taizo Shirai, and Bart Preneel,
"On Feistel structures using optimal diffusion mappings across multiple rounds."
Asiacrypt 2004, LNCS 3329, pp.1-15, Springer-Verlag, 2004. -
Taizo Shirai, and Kyoji Shibutani,
"Improving immunity of Feistel ciphers against differential cryptanalysis by using multiple MDS matrices."
FSE 2004, LNCS 3017, pp.260-278, Springer-Verlag, 2004.