Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Product cipher

In cryptography, a product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in… Expand
  • figure 1.1
  • figure 1.2
  • figure 1.3
  • figure 1.4
  • figure 1.5
2007
2007
  • Orhun Kara
  • IACR Cryptol. ePrint Arch.
  • 2007
  • Corpus ID: 16586271
In this paper we describe a novel attack method on product ciphers, the reflection attack. The attack method exploits certain… Expand
  • figure 1
Highly Cited
2004
Highly Cited
2004
Digital watermarking has been widely applied to solve copyright protection problems of digital media relating to illegal use or… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2004
2004
We introduce commutative diagram cryptanalysis, a framework for expressing certain kinds of attacks on product ciphers. We show… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Highly Cited
2000
Highly Cited
2000
Building on the work of Kocher (1996), Jaffe and Yun (1998), we discuss the notion of side-channel cryptanalysisc cryptanalysis… Expand
Highly Cited
1999
Highly Cited
1999
It is a general belief among the designers of block-ciphers that even a relatively weak cipher may become very strong if its… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
1999
1999
A method is proposed to offer privacy in computer communications, using symmetric product block ciphers. The security protocol… Expand
1998
1998
In this paper, methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create new… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 6
  • figure 6
Highly Cited
1989
Highly Cited
1989
One of the ultimate goals of cryptography researchers is to construct a (secrete-key) block cipher which has the following ideal… Expand
  • table 1
  • figure I
1989
1989
This article reports the last of a series of experiments performed between 1984 and 1988 to explore the limits of artificial… Expand