Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cipher security summary

Known as: Block cipher security summary, Block cipher security, Cipher security 
This article summarizes publicly known attacks against block ciphers and stream ciphers. Note that there are perhaps attacks that are not publicly… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
With the rapid technological growth in the present context, Internet of Things (IoT) has attracted the worldwide attention and… Expand
  • table I
  • figure 1
2016
2016
Abstract Several modes of operation have been built upon block cipher security. Among them, CFB is considered to be one of the… Expand
2016
2016
2016
2016
Cryptography is the first line of defense to protect the data from intruder. Symmetric cryptography and asymmetric cryptography… Expand
2014
2014
East African Nubi has classic attributes of a creole — it was formed in a short period of time and its structure diverges… Expand
  • table 1
  • table 2
  • figure 1
  • table 3
  • table 4
2014
2014
In this paper, we discuss the different authentication techniques suitable for severely constrained nodes in wireless sensor… Expand
  • figure 2
  • figure 1
2009
2009
Knudsen and Rijmen introduced the notion of known-key distinguishers in an effort to view block cipher security from an… Expand
  • table 1
Highly Cited
2007
Highly Cited
2007
  • A. Selçuk
  • Journal of Cryptology
  • 2007
  • Corpus ID: 5259551
Abstract Despite their widespread usage in block cipher security, linear and differential cryptanalysis still lack a robust… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
  • figure 2
Highly Cited
2005
Highly Cited
2005
In this paper we examine a class of product ciphers referred to as substitution-permutation networks. We investigate the… Expand
  • figure 1
  • figure 3
  • table 1
  • figure 4
  • table 2
2001
2001
This study describes historical observations and future estimates of the discharge regime of the river Meuse, with reference to… Expand
  • figure 2.1
  • figure 2.3
  • figure 2.4
  • figure 2.5
  • figure 2.6