Login / Signup

Distinguishing Attacks on the Stream Cipher Py.

Souradyuti PaulBart PreneelGautham Sekar
Published in: FSE (2006)
Keyphrases
  • stream cipher
  • secret key
  • scheme for wireless sensor networks
  • security analysis
  • pseudorandom
  • hash functions
  • high security
  • data points
  • ciphertext
  • authentication scheme