Login / Signup
Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations.
Guang Gong
Mark D. Aagaard
Xinxin Fan
Published in:
IACR Cryptol. ePrint Arch. (2012)
Keyphrases
</>
stream cipher
block cipher
advanced encryption standard
countermeasures
hash functions
secret key
security threats
traffic analysis
watermarking scheme
attack detection
java card
ciphertext
chosen plaintext
data sets
iso iec
security protocols
missing data