Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,209,526 papers from all fields of science
Search
Sign In
Create Free Account
Weak key
Known as:
Flat keyspace
, Linear keyspace
, Linear key space
Expand
In cryptography, a weak key is a key, which, used with a specific cipher, makes the cipher behave in some undesirable way. Weak keys usually…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Authentication
Bar mitzvah attack
Block cipher
CIKS-1
Expand
Broader (1)
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC
Christoph Dobraunig
,
Eik List
IACR Cryptology ePrint Archive
2017
Corpus ID: 17197669
Kiasu-BC is a tweakable block cipher proposed by Jean et al. at ASIACRYPT 2014 alongside their TWEAKEY framework. The cipher is…
Expand
2015
2015
Attribute-Based Encryption Goes X.509
Florian Reimair
,
Johannes Feichtner
,
Peter Teufl
IEEE International Conference on e-Business…
2015
Corpus ID: 7254440
Key authentication as well as an intended recipient not having a key available are, among others, challenges that public key…
Expand
2015
2015
Encryption and hash based security in Internet of Things
B. Vinayaga Sundaram
,
M. Ramnath
,
M. Prasanth
,
J. Varsha Sundaram
3rd International Conference on Signal Processing…
2015
Corpus ID: 15089331
The Internet of Things (IoT) promises to be the next big revolution of the World Wide Web. It has a very wide range of…
Expand
2010
2010
KIDS - Keyed Intrusion Detection System
S. Mrdović
,
B. Peruničić-Draženović
International Conference on Detection of…
2010
Corpus ID: 8706670
Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection…
Expand
Highly Cited
2006
Highly Cited
2006
Cryptanalysis of a chaotic block cipher with external key and its improved version
Chengqing Li
,
Shujun Li
,
G. Álvarez
,
Guanrong Chen
,
K. Lo
arXiv.org
2006
Corpus ID: 56205
2005
2005
New Attacks Against Reduced-Round Versions of IDEA
P. Junod
Fast Software Encryption Workshop
2005
Corpus ID: 980420
In this paper, we describe a sequence of simple, yet efficient chosen-plaintext (or chosen-ciphertext) attacks against reduced…
Expand
2004
2004
Weak keys of graph cryptography
C. Prissette
Proceedings. International Conference on…
2004
Corpus ID: 24298596
This paper presents two families of weak keys, which can be combined to build a family of very weak keys. The detection algorithm…
Expand
Highly Cited
2002
Highly Cited
2002
New Weak-Key Classes of IDEA
A. Biryukov
,
Jorge Nakahara
,
B. Preneel
,
J. Vandewalle
International Conference on Information…
2002
Corpus ID: 2175249
This paper presents a large collection of new weak-key classes for the IDEA cipher. The classes presented in this paper contain…
Expand
1999
1999
Improved Analysis of Some Simplified Variants of RC6
S. Contini
,
R. Rivest
,
M. Robshaw
,
Y. Yin
Fast Software Encryption Workshop
1999
Corpus ID: 1414147
RC6 has been submitted as a candidate for the Advanced Encryption Standard (AES). Two important features of RC6 that were absent…
Expand
1993
1993
Block Ciphers Based on Modular Arithmetic
J. Daemen
,
R. Govaerts
,
J. Vandewalle
1993
Corpus ID: 3713254
The block ciphers PES and IPES were originally designed with the ambition to become the successor of DES as a standard. In this…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required