Login / Signup

On the structural weakness of the GGHN stream cipher.

Aleksandar KircanskiAmr M. Youssef
Published in: Cryptogr. Commun. (2010)
Keyphrases
  • stream cipher
  • secret key
  • scheme for wireless sensor networks
  • pseudorandom
  • security analysis
  • high security
  • data sets
  • ciphertext