Login / Signup

Weaknesses of COSvd (2, 128) Stream Cipher.

Bin ZhangHongjun WuDengguo FengHong Wang
Published in: ICISC (2005)
Keyphrases
  • stream cipher
  • secret key
  • scheme for wireless sensor networks
  • security analysis
  • pseudorandom
  • hash functions
  • high security
  • smart card