Login / Signup

Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher.

Yukiyasu TsunooTeruo SaitoHiroyasu KuboTomoyasu Suzaki
Published in: IEEE Trans. Inf. Theory (2007)
Keyphrases
  • stream cipher
  • secret key
  • hash functions
  • pseudorandom
  • scheme for wireless sensor networks
  • database systems
  • real time
  • data structure
  • smart card
  • security analysis
  • key management
  • authentication scheme