Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,217,193 papers from all fields of science
Search
Sign In
Create Free Account
Cipher security summary
Known as:
Block cipher security summary
, Block cipher security
, Cipher security
Expand
This article summarizes publicly known attacks against block ciphers and stream ciphers. Note that there are perhaps attacks that are not publicly…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Biclique attack
Block cipher
CAST-256
Chosen-ciphertext attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Comparative Analysis of Lightweight Block Ciphers in IoT-Enabled Smart Environment
Deepti Sehrawat
,
N. S. Gill
,
M. Devi
SPIN
2019
Corpus ID: 155108229
With the rapid technological growth in the present context, Internet of Things (IoT) has attracted the worldwide attention and…
Expand
2016
2016
Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness
Andrey Bogdanov
,
Takanori Isobe
,
Elmar Tischhauser
International Conference on the Theory and…
2016
Corpus ID: 267932252
Whitebox cryptography aims to provide security for cryptographic algorithms in an untrusted environment where the adversary has…
Expand
2016
2016
RT-OCFB: Real-Time Based Optimized Cipher Feedback Mode
T. Hwang
,
P. Gope
Cryptologia
2016
Corpus ID: 35091253
Abstract Several modes of operation have been built upon block cipher security. Among them, CFB is considered to be one of the…
Expand
Highly Cited
2016
Highly Cited
2016
Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness
Andrey Bogdanov
,
Takanori Isobe
International Conference on the Theory and…
2016
Corpus ID: 6399838
Whitebox cryptography aims to provide security for cryptographic algorithms in an untrusted environment where the adversary has…
Expand
2013
2013
Block cipher security evaluation based on fuzzy logic
Sirwan A. Mohammed
,
S. Sadkhan
International Conference on Electrical…
2013
Corpus ID: 36845036
The main goal of this paper is to present of security evaluation of block cipher use in wireless network. Information security…
Expand
2009
2009
Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks
M. Minier
,
R. Phan
,
Benjamin Pousse
International Conference on Cryptology in Africa
2009
Corpus ID: 1842482
Knudsen and Rijmen introduced the notion of known-key distinguishers in an effort to view block cipher security from an…
Expand
Highly Cited
2009
Highly Cited
2009
A New Involutory MDS Matrix for the AES
Jorge Nakahara
,
É. Abrahão
International Journal of Network Security
2009
Corpus ID: 10910779
This paper proposes a new, large diffusion layer for the AES block cipher. This new layer replaces the ShiftRows and MixColumns…
Expand
Highly Cited
2008
Highly Cited
2008
On Probability of Success in Linear and Differential Cryptanalysis
A. Selçuk
Journal of Cryptology
2008
Corpus ID: 5259551
Abstract Despite their widespread usage in block cipher security, linear and differential cryptanalysis still lack a robust…
Expand
2001
2001
Effect of climate change on the hydrology of the river Meuse
M. Wit
,
P. Warmerdam
,
+8 authors
H. Buitenveld
2001
Corpus ID: 85748549
This study describes historical observations and future estimates of the discharge regime of the river Meuse, with reference to…
Expand
Highly Cited
1996
Highly Cited
1996
Substitution-permutation networks resistant to differential and linear cryptanalysis
H. Heys
,
S. Tavares
Journal of Cryptology
1996
Corpus ID: 1367485
In this paper we examine a class of product ciphers referred to as substitution-permutation networks. We investigate the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE