Login / Signup

Side-Channel Analysis of the K2 Stream Cipher.

Matthew HenricksenWun-She YapChee Hoo YianShinsaku KiyomotoToshiaki Tanaka
Published in: ACISP (2010)
Keyphrases
  • stream cipher
  • scheme for wireless sensor networks
  • secret key
  • security analysis
  • pseudorandom
  • high security
  • hash functions
  • feature selection
  • ciphertext
  • authentication scheme