On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks.
Sultan Al-HinaiEd DawsonMatthew HenricksenLeonie Ruth SimpsonPublished in: ACISP (2007)
Keyphrases
- stream cipher
- chosen plaintext
- security protocols
- security threats
- block cipher
- security mechanisms
- advanced encryption standard
- security problems
- computer security
- secret key
- cyber attacks
- high security
- security analysis
- security vulnerabilities
- java card
- information security
- security measures
- denial of service attacks
- data streams
- security breaches
- security risks
- countermeasures
- key management
- security flaws
- security issues
- cryptographic protocols
- pseudorandom
- security requirements
- malicious attacks
- hash functions
- malicious users
- insider attacks
- cyber security
- cryptographic algorithms
- security management
- data security
- fault injection
- information leakage
- authentication protocol
- secure routing
- resource constrained
- wireless sensor networks