Login / Signup
A Security evaluation of certain stream ciphers which involve randomness and coding.
Miodrag J. Mihaljevic
Hideki Imai
Published in:
ISITA (2010)
Keyphrases
</>
access control
stream cipher
network security
evaluation method
computer security
security threats
chosen plaintext
real time
database systems
sliding window
coding scheme
security policies
evaluation model
coding method
security protocols
high security