Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cipher security summary

Known as: Block cipher security summary, Block cipher security, Cipher security 
This article summarizes publicly known attacks against block ciphers and stream ciphers. Note that there are perhaps attacks that are not publicly… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
With the rapid technological growth in the present context, Internet of Things (IoT) has attracted the worldwide attention and… Expand
  • table I
  • figure 1
Is this relevant?
2015
2015
Content-fragile commutative watermarking-encryption requires that both the content-fragile image signature and the watermarking… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
In this paper, we discuss the different authentication techniques suitable for severely constrained nodes in wireless sensor… Expand
  • figure 2
  • figure 1
Is this relevant?
2014
2014
A usual way to construct block ciphers is to apply several rounds of a given structure. Many kinds of attacks are mounted against… Expand
  • table 1
  • table 2
  • table 3
  • figure 2
  • figure 5
Is this relevant?
2013
2013
The main goal of this paper is to present of security evaluation of block cipher use in wireless network. Information security… Expand
  • figure I
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
2009
2009
Knudsen and Rijmen introduced the notion of known-key distinguishers in an effort to view block cipher security from an… Expand
  • table 1
Is this relevant?
2007
2007
How much time is needed to encrypt, authenticate, verify, and decrypt a message? The answer depends on the machine (most… Expand
Is this relevant?
2007
2007
VEST is a set of four stream cipher families submitted by S. O'Neil, B. Gittins and H. Landman to the eSTREAM call for stream… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Abstract Despite their widespread usage in block cipher security, linear and differential cryptanalysis still lack a robust… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
2001
2001
This study describes historical observations and future estimates of the discharge regime of the river Meuse, with reference to… Expand
  • figure 2.1
  • figure 2.3
  • figure 2.4
  • figure 2.5
  • figure 2.6
Is this relevant?