Login / Signup
Update on Enocoro stream cipher.
Dai Watanabe
Toru Owada
Kazuto Okamoto
Yasutaka Igarashi
Toshinobu Kaneko
Published in:
ISITA (2010)
Keyphrases
</>
stream cipher
secret key
scheme for wireless sensor networks
security analysis
pseudorandom
authentication scheme
data sets
low cost
data management
hash functions
data aggregation
high security