Login / Signup
Slide attack on standard stream cipher Enocoro-80 in the related-key chosen IV setting.
Lin Ding
Chenhui Jin
Jie Guan
Published in:
Pervasive Mob. Comput. (2015)
Keyphrases
</>
stream cipher
secret key
high security
real time
database systems
high dimensional
private key
scheme for wireless sensor networks