Login / Signup
A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher.
Yonglin Hao
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
stream cipher
secret key
high security
block cipher
data analysis
distributed systems
hash functions
security analysis
private key
image encryption
scheme for wireless sensor networks