Login / Signup
Distinguishing attacks on stream ciphers based on arrays of pseudo-random words.
Nathan Keller
Stephen D. Miller
Published in:
Inf. Process. Lett. (2010)
Keyphrases
</>
stream cipher
pseudorandom
secret key
uniformly distributed
random number
random numbers
data streams
chosen plaintext
n gram
real time
related words
sliding window
public key
countermeasures
text documents
word segmentation
user specific
authentication scheme
database systems
search engine