Login / Signup
Further improving security of Vector Stream Cipher.
Atsushi Iwasaki
Ken Umeno
Published in:
CoRR (2016)
Keyphrases
</>
stream cipher
secret key
scheme for wireless sensor networks
high security
hash functions
security analysis
pseudorandom
ciphertext
database systems
access control
similarity search
public key