Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,123,945 papers from all fields of science
Search
Sign In
Create Free Account
Block cipher
Known as:
Block crypto
, Block ciphers
, Codebook algorithm
Expand
In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called blocks, with an unvarying…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Authenticated encryption
Authentication
BATON
BEAR and LION ciphers
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
An improved no-search fractal image coding method
Sheng Bi
,
Qiang Wang
International Congress on Image and Signal…
2014
Corpus ID: 4304740
In order to improve the performance of no-search fractal coding further, a two order fitting surface is proposed to approximate…
Expand
2012
2012
Copy-move forgery detection based on PHT
Leida Li
,
Shushang Li
,
Jun Wang
World Congress on Information and Communication…
2012
Corpus ID: 13317499
Copy-move is one of the most common method for image tampering. Many methods have been proposed to detect the tampered regions…
Expand
Highly Cited
2005
Highly Cited
2005
Data Encryption Standard (DES)
A. Biryukov
,
C. Cannière
Encyclopedia of Cryptography and Security
2005
Corpus ID: 6547274
Background TheData Encryption Standard (DES) [] has been around for more than years. During this time, the standard was…
Expand
Highly Cited
2005
Highly Cited
2005
A micropower low-voltage multiplier with reduced spurious switching
Kwen-Siong Chong
,
B. Gwee
,
J. Chang
IEEE Transactions on Very Large Scale Integration…
2005
Corpus ID: 1532150
We describe a micropower 16times16-bit multiplier (18.8 muW/MHz @1.1 V) for low-voltage power-critical low speed (les5 MHz…
Expand
2005
2005
Parity bit selected spreading sequences: a block coding approach to spread spectrum
C. D’amours
IEEE Communications Letters
2005
Corpus ID: 35156094
Parity bits are used to select the spreading sequence from a set of orthogonal spreading sequences, The information bits are then…
Expand
Highly Cited
2004
Highly Cited
2004
Block Encryption Using Reversible Cellular Automata
M. Seredynski
,
P. Bouvry
International Conference on Cellular Automata for…
2004
Corpus ID: 15743283
Cellular automata (CA) are highly parallel and discrete dynamical systems, whose behavior is completely specified in terms of a…
Expand
Highly Cited
2003
Highly Cited
2003
A Traceable Block Cipher
O. Billet
,
H. Gilbert
International Conference on the Theory and…
2003
Corpus ID: 14900254
In this paper we propose a new symmetric block cipher with the following paradoxical traceability properties: it is…
Expand
Highly Cited
2000
Highly Cited
2000
On the Pseudorandomness of Top-Level Schemes of Block Ciphers
S. Moriai
,
S. Vaudenay
International Conference on the Theory and…
2000
Corpus ID: 6773521
Block ciphers are usually basedon one top-level scheme into which we plug "roundf unctions". To analyze security, it is important…
Expand
2000
2000
Sharing Block Ciphers
E. F. Brickell
,
G. D. Crescenzo
,
Y. Frankel
Australasian Conference on Information Security…
2000
Corpus ID: 31736546
Threshold cryptosystems use algebraic properties such as homomorphisms in order to allow several parties to jointly evaluate a…
Expand
1998
1998
Contemporary Block Ciphers
L. Knudsen
Lectures on Data Security
1998
Corpus ID: 11845282
This paper considers modern secret-key block ciphers. The theory behind the design and analysis of modern block ciphers is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE