Skip to search formSkip to main contentSkip to account menu

Cipher security summary

Known as: Block cipher security summary, Block cipher security, Cipher security 
This article summarizes publicly known attacks against block ciphers and stream ciphers. Note that there are perhaps attacks that are not publicly… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
With the rapid technological growth in the present context, Internet of Things (IoT) has attracted the worldwide attention and… 
2016
2016
Whitebox cryptography aims to provide security for cryptographic algorithms in an untrusted environment where the adversary has… 
2016
2016
Abstract Several modes of operation have been built upon block cipher security. Among them, CFB is considered to be one of the… 
Highly Cited
2016
Highly Cited
2016
Whitebox cryptography aims to provide security for cryptographic algorithms in an untrusted environment where the adversary has… 
2013
2013
The main goal of this paper is to present of security evaluation of block cipher use in wireless network. Information security… 
2009
2009
Knudsen and Rijmen introduced the notion of known-key distinguishers in an effort to view block cipher security from an… 
Highly Cited
2009
Highly Cited
2009
This paper proposes a new, large diffusion layer for the AES block cipher. This new layer replaces the ShiftRows and MixColumns… 
Highly Cited
2008
Highly Cited
2008
Abstract Despite their widespread usage in block cipher security, linear and differential cryptanalysis still lack a robust… 
2001
2001
This study describes historical observations and future estimates of the discharge regime of the river Meuse, with reference to… 
Highly Cited
1996
Highly Cited
1996
In this paper we examine a class of product ciphers referred to as substitution-permutation networks. We investigate the…