Semantic Scholar uses AI to extract papers important to this topic.
The demand for more efficient ciphers is a likely to sharpen with new generation of products and applications. Previous cipher… Expand The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. However, for all… Expand In this paper we present two related-key attacks on the full AES. For AES-256 we show the first key recovery attack that works… Expand The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed… Expand This paper presents a large collection of new weak-key classes for the IDEA cipher. The classes presented in this paper contain… Expand In this paper we present several weaknesses in the key scheduling algorithm of RC4, and describe their cryptanalytic significance… Expand We show that it is possible to know whether the secret Goppa code of an instance of the McEliece public-key cryptosystem was… Expand One of the basic problems in cryptography is the generation of a common secret key between two parties, for instance in order to… Expand Blowfish, a new secret-key block cipher, is proposed. It is a Feistel network, iterating a simple encryption function 16 times… Expand Large classes of weak keys have been found for the block cipher algorithm IDEA, previously known as IPES . IDEA has a 128- bit… Expand