Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,579,883 papers from all fields of science
Search
Sign In
Create Free Account
Slide attack
The slide attack is a form of cryptanalysis designed to deal with the prevailing idea that even weak ciphers can become very strong by increasing the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Block cipher
Cipher
Cryptanalysis
Fast Software Encryption
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Related-Key Differential Slide Attack Against Fountain V1
R. Posteuca
IACR Cryptology ePrint Archive
2019
Corpus ID: 201059115
The stream cipher FOUNTAIN was introduced in April 2019 as one of the candidates in the NIST lightweight crypto standardization…
Expand
2018
2018
Advanced Slide Attacks on the Even-Mansour Scheme
Guang Yang
,
Ping Zhang
,
Jiachen Ding
,
Honggang Hu
International Conference on Data Science in…
2018
Corpus ID: 49884671
Block ciphers have been widely used to protect data security. Most block ciphers (such as AES) have an iterated structure which…
Expand
2017
2017
Breaking Symmetric Cryptosystems Using Quantum Algorithms
G. Leurent
2017
Corpus ID: 125240559
2017
2017
Related Key Chosen IV Attack on Stream Cipher Espresso Variant
Mingxing Wang
,
D. Lin
22017 IEEE International Conference on…
2017
Corpus ID: 12655178
The stream cipher Espresso was proposed by Elena Dubrova and Martin Hell in Cryptography and Communications in 2015, which…
Expand
2014
2014
Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro
H. Soleimany
Fast Software Encryption Workshop
2014
Corpus ID: 14769800
This paper aims to enhance the application of slide attack which is one of the most well-known cryptanalysis methods using self…
Expand
2013
2013
Slide Attacks against Iterated Hill Ciphers
Liam Keliher
,
Samuel Thibodeau
International Symposium on Security in Computing…
2013
Corpus ID: 45222167
In this paper we analyze two iterated Hill Cipher variants due to Sastry et al. The designers claim that their modifications to…
Expand
2007
2007
Ëðððð Øøø Blockin×
Alex Biryukov
,
David Wagner
2007
Corpus ID: 115968780
2005
2005
Advanced Slide Attacks Revisited: Realigning Slide on DES
R. Phan
International Conference on Cryptology in…
2005
Corpus ID: 40980619
Slide attacks are powerful tools that enable the cryptanalyst to break ciphers with up to 4-round self-similarity. This paper…
Expand
2002
2002
Slide Attack on Spectr-H64
Selçuk Kavut
,
M. D. Yücel
International Conference on Cryptology in India
2002
Corpus ID: 15131755
We compare one round diffusion characteristics of the block cipher Spectr-H64 to those of AES-Rijndael and Safer K-64, in terms…
Expand
2002
2002
A New Class of Stream Ciphers Combining LFSR and FCSR Architectures
F. Arnault
,
T. Berger
,
A. Necer
International Conference on Cryptology in India
2002
Corpus ID: 46078634
We propose a new pseudorandom generator based on Linear Feedback Shift Registers (LFSR) and Feedback with Carry Shift Registers…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE