Login / Signup
A Comparison of Time-Memory Trade-Off Attacks on Stream Ciphers.
Fabian van den Broek
Erik Poll
Published in:
AFRICACRYPT (2013)
Keyphrases
</>
trade off
chosen plaintext
stream cipher
data streams
sliding window
real time
memory usage
security protocols
watermarking algorithm
memory requirements
memory space
incoming data
malicious attacks
data mining
bias variance
data corruption
data sets