Login / Signup
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN.
Md. Iftekhar Salam
Harry Bartlett
Ed Dawson
Josef Pieprzyk
Leonie Simpson
Kenneth Koon-Ho Wong
Published in:
ATIS (2016)
Keyphrases
</>
stream cipher
secret key
authentication scheme
hash functions
security analysis
key exchange
key distribution
ciphertext
pseudorandom
smart card
public key
encryption scheme
high security
multi dimensional
image encryption
signature scheme
information sharing
key management
diffie hellman