Login / Signup

Three ways to mount distinguishing attacks on irregularly clocked stream ciphers.

Håkan EnglundThomas Johansson
Published in: Int. J. Secur. Networks (2006)
Keyphrases