Abstract: In order to evaluate more accurately the security bounds of stream ciphers, we analyze the suitability characteristics of cube attacks against stream ciphers. We use numeric mapping ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results