Login / Signup
Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box.
Yukiyasu Tsunoo
Teruo Saito
Hiroyasu Kubo
Tomoyasu Suzaki
Published in:
ICICS (2008)
Keyphrases
</>
block cipher
wireless sensor networks
s box
high security