How to Construct Cryptographic Primitives from Stream Ciphers.
Jovan Dj. GolicPublished in: Comput. Secur. (2001)
Keyphrases
- stream cipher
- data streams
- high level
- security protocols
- smart card
- building blocks
- real time
- block cipher
- advanced encryption standard
- hash functions
- low level
- case study
- real world
- privacy preserving
- data structure
- streaming data
- stream processing
- decision trees
- information systems
- artificial intelligence
- encryption key