Login / Signup
Security Weaknesses in a Randomized Stream Cipher.
Niels Ferguson
Bruce Schneier
David A. Wagner
Published in:
ACISP (2000)
Keyphrases
</>
secret sharing
stream cipher
high security
image encryption
secret key
scheme for wireless sensor networks
security analysis
pseudorandom
database systems
hash functions
smart card
information systems
mobile robot
ciphertext
key distribution
private key