Sign in

Slide attack on standard stream cipher Enocoro-80 in the related-key chosen IV setting.

Lin DingChenhui JinJie Guan
Published in: Pervasive Mob. Comput. (2015)
Keyphrases
  • stream cipher
  • secret key
  • high security
  • real time
  • database systems
  • high dimensional
  • private key
  • scheme for wireless sensor networks