Login / Signup
Distinguishing Attacks on the Stream Cipher Py.
Souradyuti Paul
Bart Preneel
Gautham Sekar
Published in:
FSE (2006)
Keyphrases
</>
stream cipher
secret key
scheme for wireless sensor networks
security analysis
pseudorandom
hash functions
high security
data points
ciphertext
authentication scheme