Login / Signup
Three ways to mount distinguishing attacks on irregularly clocked stream ciphers.
Håkan Englund
Thomas Johansson
Published in:
Int. J. Secur. Networks (2006)
Keyphrases
</>
chosen plaintext
stream cipher
data streams
countermeasures
low power
block cipher
real time
traffic analysis
sliding window
streaming data
security protocols
malicious attacks
terrorist attacks
high speed
low cost
computer security
attack detection
hidden markov models
neural network