Login / Signup

Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box.

Yukiyasu TsunooTeruo SaitoHiroyasu KuboTomoyasu Suzaki
Published in: ICICS (2008)
Keyphrases
  • block cipher
  • wireless sensor networks
  • s box
  • high security