Two New Attacks on the Self-Shrinking Generator.
Martin HellThomas JohanssonPublished in: IEEE Trans. Inf. Theory (2006)
Keyphrases
- countermeasures
- malicious users
- chosen plaintext
- data mining
- security flaws
- security vulnerabilities
- computer security
- malicious attacks
- security problems
- attack detection
- traffic analysis
- watermarking scheme
- information security
- database
- security threats
- cyber attacks
- digital watermarking
- security mechanisms
- stream cipher
- secure routing
- database systems
- data sets