Product cipher

In cryptography, a product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1989-2016
012319892016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
In this paper we give a short overview of Symmetric key block cipher for different algorithms presented in this field according… (More)
Is this relevant?
2016
2016
Encryption is a way to enhance the security of a message or file by scrambling the contents so that it can be read only by… (More)
Is this relevant?
2014
2014
RC4 is one of the most widely used stream ciphers which finds its application in many security protocols such as Wi-Fi Protocol… (More)
Is this relevant?
2014
2014
Encryption is the process of converting messages, information, or data into a form unreadable by anyone except the intended… (More)
  • figure 1.1
  • figure 1.2
  • figure 1.3
  • figure 1.4
  • figure 1.5
Is this relevant?
2011
2011
Processing data received as a stream is a task commonly performed by modern embedded devices, in a wide range of applications… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
2007
2007
In this paper we describe a novel attack method on product ciphers, the reflection attack. The attack method exploits certain… (More)
  • figure 1
Is this relevant?
2005
2005
Block cipher algorithms are commonly used to secure confidential information in everyday user applications. However, it is quite… (More)
  • figure I
  • figure 2
  • figure 3
  • figure 4
  • figure 9
Is this relevant?
Highly Cited
1998
Highly Cited
1998
1 I n t r o d u c t i o n It is well known that the resistance of a product cipher to modern cryptanalytic attacks such as linear… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Review
1994
Review
1994
In this paper we will survey three forms of statistical dependency found in block ciphers. Each dependency is based on some… (More)
  • figure 1
Is this relevant?
1989
1989
This paper describes a high-speed software implementation of the Data Encryption Standard (DES) cipher algorithm and the design… (More)
Is this relevant?