Login / Signup
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN.
Md. Iftekhar Salam
Harry Bartlett
Ed Dawson
Josef Pieprzyk
Leonie Simpson
Kenneth Koon-Ho Wong
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
stream cipher
secret key
authentication scheme
security analysis
key distribution
key exchange
hash functions
ciphertext
smart card
pseudorandom
high security
image encryption
information sharing
multi dimensional
multimedia streaming
public key
key management
authentication protocol
uniformly distributed