Skip to search formSkip to main contentSkip to account menu

Cipher security summary

Known as: Block cipher security summary, Block cipher security, Cipher security 
This article summarizes publicly known attacks against block ciphers and stream ciphers. Note that there are perhaps attacks that are not publicly… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Security represents a vital element for sanctioning the widespread adoption of Internet of Things technologies and applications… 
2016
2016
As the wireless sensor networks are easily deployable, the volume of sensor applications has been increased widely in various… 
2011
2011
Pervasive computing utilizes devices with cost constraints and limited resources in terms of memory, processing speed, and… 
2010
2010
Faults inserted deliberately may cause hazard for cipher security. In this paper there is analysed the influence of faults on… 
2007
2007
VEST is a set of four stream cipher families submitted by S. O'Neil, B. Gittins and H. Landman to the eSTREAM call for stream… 
2007
2007
To solve low efficiency and weak security of traditional user layer network communication in C/S model,and fully considering the… 
2007
2007
Neste trabalho foram desenvolvidas duas frentes de pesquisa. Na primeira foram estudados protocolos de comunicacao para etiquetas… 
2004
2004
The recent secure of digital images attracts much attention, and many image encryption methods have been proposed. This paper… 
2003
2003
  • Li Fei
  • 2003
  • Corpus ID: 203682017
With Internet becoming popular, people enjoy convenience of Internet, and are infested with network virus and hacker. Therefore… 
1999
1999
The utility model discloses a mechanical key puzzle lock, which is composed of a carry mechanism, a reset mechanism and a locking…