Skip to search formSkip to main contentSkip to account menu

Product cipher

In cryptography, a product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
This paper deals with the novel approach to generate cubical key that symbolises the message and key in six-face cubical… 
2016
2016
Most cryptosystems are defined over finite algebraic structures where arithmetic operations are performed modulo natural numbers… 
2014
2014
RC4 is one of the most widely used stream ciphers which finds its application in many security protocols such as Wi-Fi Protocol… 
2013
2013
Today data security is very important and high priority topic. With rapid growth in communication and computer technologies… 
2007
2007
The central contribution of this paper is a cryptanalysis of chaotic product cipher attempt. We use the method of an… 
Highly Cited
2005
Highly Cited
2005
Background TheData Encryption Standard (DES) [] has been around for more than  years. During this time, the standard was… 
1999
1999
A method is proposed to offer privacy in computer communications, using symmetric product block ciphers. The security protocol… 
1998
1998
In this paper, methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create new… 
1989
1989
This article reports the last of a series of experiments performed between 1984 and 1988 to explore the limits of artificial…