Login / Signup
Fast Correlation Attacks on K2 Stream Cipher.
Sudong Ma
Chenhui Jin
Jie Guan
Published in:
IEEE Trans. Inf. Theory (2023)
Keyphrases
</>
stream cipher
secret key
scheme for wireless sensor networks
hash functions
security analysis
pseudorandom
high security
smart card
wireless networks