Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,779,029 papers from all fields of science
Search
Sign In
Create Free Account
Cipher security summary
Known as:
Block cipher security summary
, Block cipher security
, Cipher security
Expand
This article summarizes publicly known attacks against block ciphers and stream ciphers. Note that there are perhaps attacks that are not publicly…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Biclique attack
Block cipher
CAST-256
Chosen-ciphertext attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Dynamic Cipher for Enhanced Cryptography and Communication for Internet of Things
Paramjeet Cheema
,
Neeraj Julka
International Conference on Intelligent, Secure…
2017
Corpus ID: 8818561
Security represents a vital element for sanctioning the widespread adoption of Internet of Things technologies and applications…
Expand
2016
2016
Security Implementation in WSN with Symmetric and Matrix Mapping on Asymmetric ECC Cryptographic Techniques
S. Hemalatha
,
V. Rajamani
,
V. Parthasarathy
2016
Corpus ID: 63289535
As the wireless sensor networks are easily deployable, the volume of sensor applications has been increased widely in various…
Expand
2011
2011
The Expeditious Cipher (X-cipher): A High Throughput Lightweight Cipher
M. Saeb
2011
Corpus ID: 55547229
Pervasive computing utilizes devices with cost constraints and limited resources in terms of memory, processing speed, and…
Expand
2010
2010
Influence of faults insertion on software implementation of block cipher security
Ph.D. eng. Krzysztof Bucholc
2010
Corpus ID: 60077483
Faults inserted deliberately may cause hazard for cipher security. In this paper there is analysed the influence of faults on…
Expand
2007
2007
Overtaking VEST
A. Joux
,
Jean-René Reinhard
Fast Software Encryption Workshop
2007
Corpus ID: 17396566
VEST is a set of four stream cipher families submitted by S. O'Neil, B. Gittins and H. Landman to the eSTREAM call for stream…
Expand
2007
2007
Design of embedded network cipher security system based on smart card
Tang Li
2007
Corpus ID: 63481573
To solve low efficiency and weak security of traditional user layer network communication in C/S model,and fully considering the…
Expand
2007
2007
Transferência de propriedade de etiquetas RFID e utilização de matrizes MDS 16 X 16 na cifra de bloco AES
E. Abrahão
2007
Corpus ID: 171646125
Neste trabalho foram desenvolvidas duas frentes de pesquisa. Na primeira foram estudados protocolos de comunicacao para etiquetas…
Expand
2004
2004
A Novel Secure Image Ciphering Technique Based On Chaos
A. Ammar
,
A. El-Kabbany
,
M. Youssef
,
A. Emam
,
Al-Azhar
2004
Corpus ID: 7960407
The recent secure of digital images attracts much attention, and many image encryption methods have been proposed. This paper…
Expand
2003
2003
Design of network cipher security system
Li Fei
2003
Corpus ID: 203682017
With Internet becoming popular, people enjoy convenience of Internet, and are infested with network virus and hacker. Therefore…
Expand
1999
1999
Mechanical key puzzle lock
靳云山
1999
Corpus ID: 140273773
The utility model discloses a mechanical key puzzle lock, which is composed of a carry mechanism, a reset mechanism and a locking…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE