Skip to search formSkip to main contentSkip to account menu

Product cipher

In cryptography, a product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
This paper deals with the novel approach to generate cubical key that symbolises the message and key in six-face cubical… 
2016
2016
Most cryptosystems are defined over finite algebraic structures where arithmetic operations are performed modulo natural numbers… 
2015
2015
Block cipher algorithms are commonly used to secure confidential information in everyday user applications. However, it is quite… 
2014
2014
RC4 is one of the most widely used stream ciphers which finds its application in many security protocols such as Wi-Fi Protocol… 
2011
2011
Processing data received as a stream is a task commonly performed by modern embedded devices, in a wide range of applications… 
Highly Cited
2005
Highly Cited
2005
Background TheData Encryption Standard (DES) [] has been around for more than  years. During this time, the standard was… 
1999
1999
A method is proposed to offer privacy in computer communications, using symmetric product block ciphers. The security protocol… 
1998
1998
In this paper, methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create new… 
1989
1989
This article reports the last of a series of experiments performed between 1984 and 1988 to explore the limits of artificial…