Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,398,743 papers from all fields of science
Search
Sign In
Create Free Account
Product cipher
In cryptography, a product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Avalanche effect
Block cipher
Communication Theory of Secrecy Systems
Cryptanalysis
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Six-face cubical key encryption and decryption based on product cipher using hybridisation and Rubik's cubes
Rajavel Dhandabani
,
Shantharajah S. Periyasamy
,
T. Padma
,
A. K. Sangaiah
IET Networks
2018
Corpus ID: 52277925
This paper deals with the novel approach to generate cubical key that symbolises the message and key in six-face cubical…
Expand
2016
2016
Secure symmetric ciphers over the real field
Y. Hassoun
arXiv.org
2016
Corpus ID: 7011182
Most cryptosystems are defined over finite algebraic structures where arithmetic operations are performed modulo natural numbers…
Expand
2014
2014
Enhancing Security of Improved RC4 Stream Cipher by Converting into Product Cipher
Nishith Sinha
,
Mallika Chawda
,
K. Bhamidipati
2014
Corpus ID: 14129819
RC4 is one of the most widely used stream ciphers which finds its application in many security protocols such as Wi-Fi Protocol…
Expand
2013
2013
S ECURE P ARTIAL I MAGE E NCRYPTION S CHEME U SING S CAN B ASED A LGORITHM
Parameshachari
,
K. Soyjaudah
,
S. Devi
2013
Corpus ID: 15624277
Today data security is very important and high priority topic. With rapid growth in communication and computer technologies…
Expand
2007
2007
Cryptanalysis of Chaotic Product Cipher
Adrian Skrobek
,
P. Sukiennik
Advances in Information Processing and Protection
2007
Corpus ID: 59222301
The central contribution of this paper is a cryptanalysis of chaotic product cipher attempt. We use the method of an…
Expand
2007
2007
Ëðððð Øøø Blockin×
Alex Biryukov
,
David Wagner
2007
Corpus ID: 115968780
Highly Cited
2005
Highly Cited
2005
Data Encryption Standard (DES)
A. Biryukov
,
C. Cannière
Encyclopedia of Cryptography and Security
2005
Corpus ID: 6547274
Background TheData Encryption Standard (DES) [] has been around for more than years. During this time, the standard was…
Expand
1999
1999
Product cipher negotiation with on-line evaluation for private communication over computer networks
Vasilios Katos
1999
Corpus ID: 40251014
A method is proposed to offer privacy in computer communications, using symmetric product block ciphers. The security protocol…
Expand
1998
1998
SYMMETRIC CIPHERS BASED ON TWO-DIMENSIONAL CHAOTIC
J. Fridrich
1998
Corpus ID: 16987105
In this paper, methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create new…
Expand
1989
1989
Computer Cryptanalysis of Product Ciphers
John Millar Carroll
,
L. Robbins
Cryptologia
1989
Corpus ID: 11396977
This article reports the last of a series of experiments performed between 1984 and 1988 to explore the limits of artificial…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE