Login / Signup
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B.
Gautham Sekar
Souradyuti Paul
Bart Preneel
Published in:
WEWoRC (2007)
Keyphrases
</>
stream cipher
secret key
security analysis
hash functions
pseudorandom
high security
design process
software architecture
high dimensional
query processing
security requirements
single chip
mobile platforms