Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,199,059 papers from all fields of science
Search
Sign In
Create Free Account
Cipher security summary
Known as:
Block cipher security summary
, Block cipher security
, Cipher security
Expand
This article summarizes publicly known attacks against block ciphers and stream ciphers. Note that there are perhaps attacks that are not publicly…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Biclique attack
Block cipher
CAST-256
Chosen-ciphertext attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
RT-OCFB: Real-Time Based Optimized Cipher Feedback Mode
T. Hwang
,
P. Gope
Cryptologia
2016
Corpus ID: 35091253
Abstract Several modes of operation have been built upon block cipher security. Among them, CFB is considered to be one of the…
Expand
2016
2016
PFX: an essence of authencryption for block-cipher security
T. Hwang
,
P. Gope
Secur. Commun. Networks
2016
Corpus ID: 32640008
2014
2014
Authentication schemes for wireless sensor networks
Ayman Tajeddine
,
A. Kayssi
,
A. Chehab
,
I. Elhajj
MELECON - 17th IEEE Mediterranean…
2014
Corpus ID: 3213094
In this paper, we discuss the different authentication techniques suitable for severely constrained nodes in wireless sensor…
Expand
2013
2013
Block cipher security evaluation based on fuzzy logic
Sirwan A. Mohammed
,
Sattar B. Sadkhan
International Conference on Electrical…
2013
Corpus ID: 36845036
The main goal of this paper is to present of security evaluation of block cipher use in wireless network. Information security…
Expand
2009
2009
On dynamic chaotic S-BOX
G. Zaibi
,
A. Kachouri
,
F. Peyrard
,
D. Fournier-Prunaret
Global Information Infrastructure Symposium
2009
Corpus ID: 14895404
The substitution table or S-Box is considered as the core of the block ciphers. The good design of the S-Box can increase the…
Expand
2007
2007
The Asymptotic Behavior of pi-Adic Complexity with pi2 = - 2
A. Klapper
Sequences, Subsequences, and Consequences
2007
Corpus ID: 7231675
We study the asymptotic behavior of stream cipher security measures associated with algebraic feedback shift registers and…
Expand
2006
2006
On the Existence of Related-Key Oracles in Cryptosystems Based on Block Ciphers
Ermaliza Razali
,
R. Phan
OTM Workshops
2006
Corpus ID: 9691887
The notion of a related-key attack (RKA) was formally introduced by Biham in 1993 It is essentially more of an attack model…
Expand
2004
2004
A Novel Secure Image Ciphering Technique Based On Chaos
A. Ammar
,
A. El-Kabbany
,
M. Youssef
,
A. Emam
,
Al-Azhar
2004
Corpus ID: 7960407
The recent secure of digital images attracts much attention, and many image encryption methods have been proposed. This paper…
Expand
2003
2003
Design of network cipher security system
Li Fei
2003
Corpus ID: 203682017
With Internet becoming popular, people enjoy convenience of Internet, and are infested with network virus and hacker. Therefore…
Expand
2001
2001
Information leakage of Feistel ciphers
H. Heys
IEEE Transactions on Information Theory
2001
Corpus ID: 37423465
We examine the information leakage between sets of plaintext and ciphertext bits in symmetric-key block ciphers. The paper…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE