Login / Signup

Secure Implementation of Stream Cipher: Trivium.

Dillibabu ShanmugamSuganya Annadurai
Published in: SECITC (2015)
Keyphrases
  • stream cipher
  • secret key
  • scheme for wireless sensor networks
  • security analysis
  • hash functions
  • pseudorandom
  • security protocols
  • high security
  • mobile phone
  • lightweight