Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,697,521 papers from all fields of science
Search
Sign In
Create Free Account
Block cipher
Known as:
Block crypto
, Block ciphers
, Codebook algorithm
Expand
In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called blocks, with an unvarying…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Authenticated encryption
Authentication
BATON
BEAR and LION ciphers
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Copy-move forgery detection based on PHT
Leida Li
,
Shushang Li
,
Jun Wang
World Congress on Information and Communication…
2012
Corpus ID: 13317499
Copy-move is one of the most common method for image tampering. Many methods have been proposed to detect the tampered regions…
Expand
2006
2006
"Hybrid Cone-Cylinder" Codebook Model for Foreground Detection with Shadow and Highlight Suppression
A. Doshi
,
M. Trivedi
IEEE International Conference on Video and Signal…
2006
Corpus ID: 1444639
In the interest of 24-7 long-term surveillance, a truly robust, adaptive, and fast background-foreground segmentation technique…
Expand
Highly Cited
2005
Highly Cited
2005
Data Encryption Standard (DES)
A. Biryukov
,
C. Cannière
Encyclopedia of Cryptography and Security
2005
Corpus ID: 6547274
Background TheData Encryption Standard (DES) [] has been around for more than years. During this time, the standard was…
Expand
2005
2005
Hoc Networks
2005
Corpus ID: 10331725
Highly Cited
2005
Highly Cited
2005
An information-theoretic framework for deriving canonical decision-feedback receivers in Gaussian channels
T. Guess
,
M. Varanasi
IEEE Transactions on Information Theory
2005
Corpus ID: 6553460
A framework is presented that allows a number of known results relating feedback equalization, linear prediction, and mutual…
Expand
2005
2005
Parity bit selected spreading sequences: a block coding approach to spread spectrum
C. D’amours
IEEE Communications Letters
2005
Corpus ID: 35156094
Parity bits are used to select the spreading sequence from a set of orthogonal spreading sequences, The information bits are then…
Expand
Highly Cited
2003
Highly Cited
2003
A Traceable Block Cipher
O. Billet
,
H. Gilbert
International Conference on the Theory and…
2003
Corpus ID: 14900254
In this paper we propose a new symmetric block cipher with the following paradoxical traceability properties: it is…
Expand
2003
2003
A 2048 complex point FFT processor using a novel data scaling approach
T. Lenart
,
V. Öwall
Proceedings of the International Symposium on…
2003
Corpus ID: 17978938
In this paper, a novel data scaling method for pipelined FFT processors is proposed. By using data scaling, the FFT processor can…
Expand
1998
1998
Contemporary Block Ciphers
L. Knudsen
Lectures on Data Security
1998
Corpus ID: 11845282
This paper considers modern secret-key block ciphers. The theory behind the design and analysis of modern block ciphers is…
Expand
1994
1994
On the security of the CAST encryption algorithm
H. Heys
,
E. Tavares
Proceedings of Canadian Conference on Electrical…
1994
Corpus ID: 1395342
We examine a new private key encryption algorithm referred to as CAST. Specifically, we investigate the security of the cipher…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE