Skip to search formSkip to main contentSkip to account menu

Product cipher

In cryptography, a product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in… 
2007
2007
  • Orhun Kara
  • IACR Cryptol. ePrint Arch.
  • 2007
  • Corpus ID: 16586271
In this paper we describe a novel attack method on product ciphers, the reflection attack. The attack method exploits certain… 
Highly Cited
2005
Highly Cited
2005
We will be looking at 3 industrial-strength encryption algorithms. The first encryption algorithm is called DES for data… 
Highly Cited
2004
Highly Cited
2004
Highly Cited
2004
2004
2004
We introduce commutative diagram cryptanalysis, a framework for expressing certain kinds of attacks on product ciphers. We show… 
Highly Cited
2000
Highly Cited
2000
Building on the work of Kocher (1996), Jaffe and Yun (1998), we discuss the notion of side-channel cryptanalysisc cryptanalysis… 
Highly Cited
1999
Highly Cited
1999
It is a general belief among the designers of block-ciphers that even a relatively weak cipher may become very strong if its… 
Highly Cited
1989
Highly Cited
1989
One of the ultimate goals of cryptography researchers is to construct a (secrete-key) block cipher which has the following ideal… 
1989
1989
This article reports the last of a series of experiments performed between 1984 and 1988 to explore the limits of artificial…