Exploiting Silence for Ciphertext Only Cryptanalysis of Stream Ciphered Digitized Voice.
Liaqat Ali KhanMuhammad Shamim BaigM. Ashraf AshrafPublished in: Security and Management (2007)
Keyphrases
- ciphertext
- secret key
- standard model
- s box
- public key
- encryption scheme
- signature scheme
- smart card
- access structure
- data streams
- proxy re encryption
- authentication scheme
- key management
- cca secure
- diffie hellman
- hash functions
- relational databases
- real time
- structured data
- identity based encryption
- public key encryption