Login / Signup

Tight Security Bounds for Generic Stream Cipher Constructions.

Matthias HamannMatthias KrauseAlexander Moch
Published in: SAC (2019)
Keyphrases
  • stream cipher
  • lower bound
  • upper bound
  • worst case
  • secret key
  • hash functions
  • high security
  • security analysis
  • pseudorandom
  • ciphertext
  • information systems
  • smart card
  • information security
  • public key