Applying cube attacks to stream ciphers in realistic...

Applying cube attacks to stream ciphers in realistic scenarios

Dinur, Itai, Shamir, Adi
How much do you like this book?
What’s the quality of the file?
Download the book for quality assessment
What’s the quality of the downloaded files?
Volume:
4
Language:
english
Journal:
Cryptography and Communications
DOI:
10.1007/s12095-012-0068-4
Date:
December, 2012
File:
PDF, 366 KB
english, 2012
Conversion to is in progress
Conversion to is failed