Skip to search formSkip to main contentSkip to account menu

Key schedule

Known as: Schedule (disambiguation), Round key, Key scheduling 
In cryptography, the so-called product ciphers are a certain kind of ciphers, where the (de-)ciphering of data is done in "rounds". The general setup… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
In this paper, we present a framework for biclique cryptanalysis of block ciphers which extremely requires a low amount of data… 
2014
2014
In this paper, a hybrid encryption algorithm is proposed. The proposed algorithm combines between AES and Chaos encryption. The… 
2011
2011
IDEA is a 64-bit block cipher with 128-bit keys which is widely used due to its inclusion in several cryptographic packages such… 
2007
2007
We study the security of a block cipher-based pseudorandom number generator, both in the black box world and in the physical… 
Highly Cited
2007
Highly Cited
2007
Saarinen recently proposed a chosen IV statistical attack, called the d-monomial test, and used it to find weaknesses in several… 
2007
2007
This paper investigates the impact of security on the performance of WLAN. More specifically, it analyzes the impact of different… 
2004
2004
State Based Key Hop (SBKH) protocol provides a strong, lightweight encryption scheme for battery operated devices, such as the… 
2002
2002
This paper presents some FPGA-based implementations of the private key Advanced Encryption Standard (AES) cryptography algorithm… 
2000
2000
A JBits implementation of the Serpent block cipher in a Xilinx FPGA is described. JBits provides a Java-based Application…