Slide attack

The slide attack is a form of cryptanalysis designed to deal with the prevailing idea that even weak ciphers can become very strong by increasing the… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1999-2017
024619992017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
The impacts that quantum computers will have on cryptography have become more and more important to study for not only public key… (More)
  • table 1
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2016
2016
The slide attack, presented by Biryukov and Wagner, has already become a classical tool in cryptanalysis of block ciphers. While… (More)
  • figure 1
  • table 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
This paper aims to enhance the application of slide attack which is one of the most well-known cryptanalysis methods using… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
2013
2013
The Even–Mansour cryptosystem was developed in 1991 in an attempt to obtain the simplest possible block cipher, using only one… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
Is this relevant?
2007
2007
The slide attack is applicable to ciphers that can be represented as an iterative application of the same keyed permutation. The… (More)
Is this relevant?
2006
2006
WG and LEX are two stream ciphers submitted to eStream – the ECRYPT stream cipher project. In this paper, we point out security… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2002
2002
We compare one round diffusion characteristics of the block cipher Spectr-H64 to those of AES-Rijndael and Safer K-64, in terms… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2002
2002
The DES key schedule is linear and yet defeats related-key cryptanalysis and other attacks that exploit weaknesses in key… (More)
  • table 1
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1999
Highly Cited
1999
It is a general belief among the designers of block-ciphers that even a relatively weak cipher may become very strong if its… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?