Breaking block and product ciphers applied across byte boundaries | IEEE Conference Publication | IEEE Xplore