Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 206,115,571 papers from all fields of science
Search
Sign In
Create Free Account
Product cipher
In cryptography, a product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
10 relations
Avalanche effect
Block cipher
Communication Theory of Secrecy Systems
Cryptanalysis
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Homomorphic Encryption and Applications
X. Yi
,
Russell Paulet
,
E. Bertino
SpringerBriefs in Computer Science
2014
Corpus ID: 11182158
This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in…
Expand
2007
2007
Reflection Attacks on Product Ciphers
Orhun Kara
IACR Cryptol. ePrint Arch.
2007
Corpus ID: 16586271
In this paper we describe a novel attack method on product ciphers, the reflection attack. The attack method exploits certain…
Expand
Highly Cited
2005
Highly Cited
2005
Data encryption standard (DES)
A. Biryukov
,
C. Cannière
Encyclopedia of Cryptography and Security
2005
Corpus ID: 6547274
We will be looking at 3 industrial-strength encryption algorithms. The first encryption algorithm is called DES for data…
Expand
Highly Cited
2004
Highly Cited
2004
A color image watermarking scheme based on color quantization
P. Tsai
,
Yu-Chen Hu
,
Chinchen Chang
Signal Process.
2004
Corpus ID: 17113418
Highly Cited
2004
Highly Cited
2004
Image and video encryption using SCAN patterns
S. Maniccam
,
N. Bourbakis
Pattern Recognit.
2004
Corpus ID: 45197027
2004
2004
Towards a Unifying View of Block Cipher Cryptanalysis
D. Wagner
FSE
2004
Corpus ID: 47746
We introduce commutative diagram cryptanalysis, a framework for expressing certain kinds of attacks on product ciphers. We show…
Expand
Highly Cited
2000
Highly Cited
2000
Side Channel Cryptanalysis of Product Ciphers
J. Kelsey
,
B. Schneier
,
D. Wagner
,
Chris Hall
J. Comput. Secur.
2000
Corpus ID: 60786323
Building on the work of Kocher (1996), Jaffe and Yun (1998), we discuss the notion of side-channel cryptanalysisc cryptanalysis…
Expand
Highly Cited
1999
Highly Cited
1999
Slide Attacks
A. Biryukov
,
D. Wagner
FSE
1999
Corpus ID: 9365907
It is a general belief among the designers of block-ciphers that even a relatively weak cipher may become very strong if its…
Expand
Highly Cited
1989
Highly Cited
1989
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses
Yuliang Zheng
,
Tsutomu Matsumoto
,
H. Imai
CRYPTO
1989
Corpus ID: 14444878
One of the ultimate goals of cryptography researchers is to construct a (secrete-key) block cipher which has the following ideal…
Expand
1989
1989
Computer Cryptanalysis of Product Ciphers
John Millar Carroll
,
L. Robbins
Cryptologia
1989
Corpus ID: 11396977
This article reports the last of a series of experiments performed between 1984 and 1988 to explore the limits of artificial…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE