Login / Signup
Secure and Fast Implementations of Two Involution Ciphers.
Billy Bob Brumley
Published in:
NordSec (2010)
Keyphrases
</>
stream cipher
chosen plaintext
block cipher
secret key
security analysis
security protocols
security level
advanced encryption standard
lightweight
efficient implementation
hash functions
user authentication
high security
key exchange