Three ways to mount distinguishing attacks on irregularly clocked stream ciphers

Author: Englund Hakan   Johansson Thomas  

Publisher: Inderscience Publishers

ISSN: 1747-8405

Source: International Journal of Security and Networks, Vol.1, Iss.1-2, 2006-09, pp. : 95-102

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Previous Menu Next

Abstract