Cipher security summary

Known as: Block cipher security summary, Block cipher security, Cipher security 
This article summarizes publicly known attacks against block ciphers and stream ciphers. Note that there are perhaps attacks that are not publicly… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1994-2018
012319942018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
In today's network-based cloud computing era, software applications are playing big role. The security of these software… (More)
  • figure I
  • figure 4
  • figure 3
  • figure 2
  • figure 6
Is this relevant?
2013
2013
The main goal of this paper is to present of security evaluation of block cipher use in wireless network. Information security… (More)
  • figure I
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
2012
2012
With the development of Internet of Things (IOT), there are more and more concerns about the security of IOT. In terms of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
Graphic Processing Units (GPU) are increasingly popular in the field of high-performance computing for their ability to provide… (More)
  • figure 1
  • figure 2
  • figure 5
  • table 1
Is this relevant?
2009
2009
Knudsen and Rijmen introduced the notion of known-key distinguishers in an effort to view block cipher security from an… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2009
2009
The substitution table or S-Box is considered as the core of the block ciphers. The good design of the S-Box can increase the… (More)
  • figure 1
  • table II
  • table III
  • figure 2
  • figure 3
Is this relevant?
2009
2009
This paper proposes a new, large diffusion layer for the AES block cipher. This new layer replaces the ShiftRows and MixColumns… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
Is this relevant?
2007
2007
How much time is needed to encrypt, authenticate, verify, and decrypt a packet? The answer depends on the machine (most… (More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Despite their widespread usage in block cipher security, linear and differential cryptanalysis still lack a robust treatment of… (More)
  • table 1
  • table 2
  • figure 1
  • table 3
  • table 4
Is this relevant?
1999
1999
Absolute lower limits to the cost of cryptanalytic attacks are quantified, via a theory of guesswork. Conditional guesswork… (More)
  • figure 1
Is this relevant?