Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,254,551 papers from all fields of science
Search
Sign In
Create Free Account
Product cipher
In cryptography, a product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Avalanche effect
Block cipher
Communication Theory of Secrecy Systems
Cryptanalysis
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Six-face cubical key encryption and decryption based on product cipher using hybridisation and Rubik's cubes
Rajavel Dhandabani
,
Shantharajah S. Periyasamy
,
T. Padma
,
A. K. Sangaiah
IET Networks
2018
Corpus ID: 52277925
This paper deals with the novel approach to generate cubical key that symbolises the message and key in six-face cubical…
Expand
2007
2007
Reflection Attacks on Product Ciphers
Orhun Kara
IACR Cryptology ePrint Archive
2007
Corpus ID: 16586271
In this paper we describe a novel attack method on product ciphers, the reflection attack. The attack method exploits certain…
Expand
2007
2007
Ëðððð Øøø Blockin×
Alex Biryukov
,
David Wagner
2007
Corpus ID: 115968780
Highly Cited
2005
Highly Cited
2005
Data Encryption Standard (DES)
A. Biryukov
,
C. Cannière
Encyclopedia of Cryptography and Security
2005
Corpus ID: 6547274
Background TheData Encryption Standard (DES) [] has been around for more than years. During this time, the standard was…
Expand
Highly Cited
2004
Highly Cited
2004
Image and video encryption using SCAN patterns
S. Maniccam
,
N. Bourbakis
Pattern Recognition
2004
Corpus ID: 45197027
Highly Cited
2004
Highly Cited
2004
A color image watermarking scheme based on color quantization
P. Tsai
,
Yu-Chen Hu
,
Chinchen Chang
Signal Processing
2004
Corpus ID: 17113418
2004
2004
Towards a Unifying View of Block Cipher Cryptanalysis
D. Wagner
Fast Software Encryption Workshop
2004
Corpus ID: 47746
We introduce commutative diagram cryptanalysis, a framework for expressing certain kinds of attacks on product ciphers. We show…
Expand
1999
1999
Product cipher negotiation with on-line evaluation for private communication over computer networks
Vasilios Katos
1999
Corpus ID: 40251014
A method is proposed to offer privacy in computer communications, using symmetric product block ciphers. The security protocol…
Expand
Highly Cited
1994
Highly Cited
1994
On the distribution of characteristics in bijective mappings
L. O'Connor
Journal of Cryptology
1994
Corpus ID: 1702447
Differential cryptanalysis is a method of attacking iterated mappings based on differences known as characteristics. The…
Expand
1989
1989
Computer Cryptanalysis of Product Ciphers
John Millar Carroll
,
L. Robbins
Cryptologia
1989
Corpus ID: 11396977
This article reports the last of a series of experiments performed between 1984 and 1988 to explore the limits of artificial…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE