Algebraic Attacks on Grain-Like Keystream Generators.
Matthew BeightonHarry BartlettLeonie SimpsonKenneth Koon-Ho WongPublished in: ICISC (2021)
Keyphrases
- cellular automata
- stream cipher
- countermeasures
- pseudorandom
- random numbers
- watermarking scheme
- security threats
- denial of service attacks
- malicious attacks
- watermarking algorithm
- image encryption algorithm
- image watermarking
- chosen plaintext
- higher order
- malicious users
- attack detection
- random number
- algebraic structure
- watermarking method
- traffic analysis
- security mechanisms
- network traffic