Login / Signup
Weaknesses in HENKOS Stream Cipher.
Prasanth Kumar Thandra
S. A. V. Satya Murty
R. Balasubramanian
Published in:
IACR Cryptol. ePrint Arch. (2008)
Keyphrases
</>
stream cipher
secret key
scheme for wireless sensor networks
hash functions
security analysis
pseudorandom
high security
information systems
high dimensional
wireless networks
ciphertext
image encryption