Login / Signup
Distinguishing Attacks on Stream Ciphers Based on Arrays of Pseudo-random Words.
Nathan Keller
Stephen D. Miller
Published in:
IACR Cryptol. ePrint Arch. (2009)
Keyphrases
</>
stream cipher
pseudorandom
secret key
uniformly distributed
random number
chosen plaintext
random numbers
data streams
n gram
real time
authentication scheme
text documents
sliding window
keywords
hash functions
data structure
public key
user specific
stream processing
web pages
search engine
data sets