Sign in

Key-Dependent Feedback Configuration Matrix of Primitive σ-LFSR and Resistance to Some Known Plaintext Attacks.

Subrata NandiSrinivasan KrishnaswamyBehrouz ZolfaghariPinaki Mitra
Published in: IEEE Access (2022)
Keyphrases
  • block cipher
  • stream cipher
  • chosen plaintext
  • security analysis
  • countermeasures
  • high security
  • high level
  • data mining
  • email
  • signal processing
  • privacy preserving
  • smart card
  • low rank
  • secret key