Login / Signup
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS.
Md. Iftekhar Salam
Leonie Simpson
Harry Bartlett
Ed Dawson
Josef Pieprzyk
Kenneth Koon-Ho Wong
Published in:
TrustCom/BigDataSE/ICESS (2017)
Keyphrases
</>
stream cipher
secret key
authentication scheme
hash functions
security analysis
key exchange
key distribution
ciphertext
high security
encryption scheme
multi dimensional
smart card
pseudorandom
public key
image encryption
multimedia streaming
private key
encryption algorithm
key management