Skip to search formSkip to main contentSkip to account menu

Key schedule

Known as: Schedule (disambiguation), Round key, Key scheduling 
In cryptography, the so-called product ciphers are a certain kind of ciphers, where the (de-)ciphering of data is done in "rounds". The general setup… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
In this paper, we present a framework for biclique cryptanalysis of block ciphers which extremely requires a low amount of data… 
2011
2011
IDEA is a 64-bit block cipher with 128-bit keys which is widely used due to its inclusion in several cryptographic packages such… 
2007
2007
We study the security of a block cipher-based pseudorandom number generator, both in the black box world and in the physical… 
2007
2007
This paper investigates the impact of security on the performance of WLAN. More specifically, it analyzes the impact of different… 
2005
2005
In this paper, we describe a sequence of simple, yet efficient chosen-plaintext (or chosen-ciphertext) attacks against reduced… 
2004
2004
State Based Key Hop (SBKH) protocol provides a strong, lightweight encryption scheme for battery operated devices, such as the… 
2002
2002
This paper presents some FPGA-based implementations of the private key Advanced Encryption Standard (AES) cryptography algorithm… 
2000
2000
A JBits implementation of the Serpent block cipher in a Xilinx FPGA is described. JBits provides a Java-based Application… 
1997
1997
SPEED is a private key block cipher. It supports three variable parameters: (1) data length — the length of a plaintext…