Skip to search formSkip to main contentSkip to account menu

Cipher security summary

Known as: Block cipher security summary, Block cipher security, Cipher security 
This article summarizes publicly known attacks against block ciphers and stream ciphers. Note that there are perhaps attacks that are not publicly… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
With the rapid technological growth in the present context, Internet of Things (IoT) has attracted the worldwide attention and… 
Review
2018
Review
2018
  • M. Styugin
  • Int. J. Netw. Secur.
  • 2018
  • Corpus ID: 43081378
Systems that have a complex technical implementation usually contain many vulnerabilities which cannot be found at the… 
2017
2017
In today's world of the internet, billions of computer systems are connected to one another in a global network. The internet… 
2016
2016
Abstract Several modes of operation have been built upon block cipher security. Among them, CFB is considered to be one of the… 
2015
2015
CAESAR has caused a heated discussion regarding the merits of one-pass encryption and online ciphers. The latter is a keyed… 
2014
2014
East African Nubi has classic attributes of a creole — it was formed in a short period of time and its structure diverges… 
2013
2013
The main goal of this paper is to present of security evaluation of block cipher use in wireless network. Information security… 
2009
2009
Knudsen and Rijmen introduced the notion of known-key distinguishers in an effort to view block cipher security from an… 
Highly Cited
2005
Highly Cited
2005
In this paper we examine a class of product ciphers referred to as substitution-permutation networks. We investigate the… 
2001
2001
This study describes historical observations and future estimates of the discharge regime of the river Meuse, with reference to…