Skip to search formSkip to main contentSkip to account menu

Known-key distinguishing attack

Known as: Known key, Chosen key distinguisher, Chosen-key attack 
In cryptography, a known-key distinguishing attack is an attack model against symmetric ciphers, whereby an attacker who knows the key can find a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Cloud storage allows users to access and store data in clouds over the internet, and provides a cheap and reliable solution for… 
2012
2012
Group key agreement (GKA) is a cryptographic primitive allowing two or more users to negotiate a shared session key over public… 
2011
2011
encryption algorithm (3,12,16) was examined based on the text to be encrypted and the chosen key. It is a symmetric key algorithm… 
2011
2011
Abstract This paper fast proposes a novel lossless data-hiding method, in which the magnitudes of gray level differences in pixel… 
2010
2010
In this paper, we investigate the possible security threats to downloadable conditional access system (DCAS) host devices. We… 
2007
2007
WEP is a protocol for securing wireless networks. In the past years, many attacks on WEP have been published, totally breaking… 
2006
2006
Instruction set randomization (ISR) has been proposed as a form of defense against binary code injection into an executing… 
1990
1990
In zero-knowledge interactive proofs, a lot of randomized information is exchanged between the prover and the verifier, and the…