Login / Signup

Analytical evaluation of the stream cipher ZUC.

Ghizlane OrhanouSaid El HajjiAbdelmajid LakbabiYoussef Bentaleb
Published in: ICMCS (2012)
Keyphrases
  • stream cipher
  • secret key
  • life cycle
  • hash functions
  • real time
  • database systems
  • data streams
  • query processing
  • nearest neighbor
  • intrusion detection
  • data access