Login / Signup
Secure Implementation of Stream Cipher: Trivium.
Dillibabu Shanmugam
Suganya Annadurai
Published in:
SECITC (2015)
Keyphrases
</>
stream cipher
secret key
scheme for wireless sensor networks
security analysis
hash functions
pseudorandom
security protocols
high security
mobile phone
lightweight