Skip to search formSkip to main content

Product cipher

In cryptography, a product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
RC4 is one of the most widely used stream ciphers which finds its application in many security protocols such as Wi-Fi Protocol… Expand
Is this relevant?
2007
2007
In this paper we describe a novel attack method on product ciphers, the reflection attack. The attack method exploits certain… Expand
  • figure 1
Is this relevant?
2005
2005
An adjustable foot rest is disclosed which comprises a floor stand, a foot plate which is pivotally mounted to the floor stand… Expand
Is this relevant?
2004
2004
Digital watermarking has been widely applied to solve copyright protection problems of digital media relating to illegal use or… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Building on the work of Kocher (1996), Jaffe and Yun (1998), we discuss the notion of side-channel cryptanalysisc cryptanalysis… Expand
Is this relevant?
Highly Cited
1999
Highly Cited
1999
It is a general belief among the designers of block-ciphers that even a relatively weak cipher may become very strong if its… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
1999
1999
A method is proposed to offer privacy in computer communications, using symmetric product block ciphers. The security protocol… Expand
Is this relevant?
1998
1998
In this paper, methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create new… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 6
  • figure 6
Is this relevant?
Highly Cited
1989
Highly Cited
1989
One of the ultimate goals of cryptography researchers is to construct a (secrete-key) block cipher which has the following ideal… Expand
  • table 1
  • figure I
Is this relevant?
1989
1989
This article reports the last of a series of experiments performed between 1984 and 1988 to explore the limits of artificial… Expand
Is this relevant?