Skip to search formSkip to main contentSkip to account menu

Cipher security summary

Known as: Block cipher security summary, Block cipher security, Cipher security 
This article summarizes publicly known attacks against block ciphers and stream ciphers. Note that there are perhaps attacks that are not publicly… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Abstract Several modes of operation have been built upon block cipher security. Among them, CFB is considered to be one of the… 
2016
2016
2014
2014
In this paper, we discuss the different authentication techniques suitable for severely constrained nodes in wireless sensor… 
2013
2013
The main goal of this paper is to present of security evaluation of block cipher use in wireless network. Information security… 
2009
2009
The substitution table or S-Box is considered as the core of the block ciphers. The good design of the S-Box can increase the… 
2007
2007
We study the asymptotic behavior of stream cipher security measures associated with algebraic feedback shift registers and… 
2006
2006
The notion of a related-key attack (RKA) was formally introduced by Biham in 1993 It is essentially more of an attack model… 
2004
2004
The recent secure of digital images attracts much attention, and many image encryption methods have been proposed. This paper… 
2003
2003
  • Li Fei
  • 2003
  • Corpus ID: 203682017
With Internet becoming popular, people enjoy convenience of Internet, and are infested with network virus and hacker. Therefore… 
2001
2001
We examine the information leakage between sets of plaintext and ciphertext bits in symmetric-key block ciphers. The paper…