@inbook{bd1979dac21a4d38b9a1dad61f267b15,
title = "Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1",
abstract = "We observe that when conducting an impossible differential cryptanalysis on Camellia and MISTY1, their round structures allow us to partially determine whether a candidate pair is useful by guessing only a small fraction of the unknown required subkey bits of a relevant round at a time, instead of guessing all of them at once. Taking advantage of the early abort technique, we improve a previous impossible differential attack on 6-round MISTY1 without the FL functions, and present impossible differential cryptanalysis of 11-round Camellia-128 without the FL functions, 13-round Camellia-192 without the FL functions and 14-round Camellia-256 without the FL functions. The presented results are better than any previously published cryptanalytic results on Camellia and MISTY1 without the FL functions.",
author = "Jiqiang Lu and Jongsung Kim and N. Keller and Orr Dunkelman",
year = "2008",
language = "American English",
volume = "4964",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "370--386",
editor = "Tal Malkin",
booktitle = "Topics in Cryptology – CT-RSA 2008",
}