Login / Signup
Security Evaluation of Rakaposhi Stream Cipher.
Mohammad Ali Orumiehchiha
Josef Pieprzyk
Elham Shakour
Ron Steinfeld
Published in:
IACR Cryptol. ePrint Arch. (2012)
Keyphrases
</>
stream cipher
high security
scheme for wireless sensor networks
secret key
security analysis
pseudorandom
data sets
access control
hash functions
security protocols
mobile devices
low cost
intrusion detection
network security