Login / Signup

New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B.

Gautham SekarSouradyuti PaulBart Preneel
Published in: WEWoRC (2007)
Keyphrases
  • stream cipher
  • secret key
  • security analysis
  • hash functions
  • pseudorandom
  • high security
  • design process
  • software architecture
  • high dimensional
  • query processing
  • security requirements
  • single chip
  • mobile platforms