Back to Results
First PageMeta Content
Key management / Correlation attack / Key size / Advantage / ICE / MOSQUITO / Cipher / Pseudorandom number generators / Block ciphers / Cryptography / Stream ciphers / Keystream


Correlated Keystreams in Moustique Emilia K¨ asper1 , Vincent Rijmen1,3 , Tor E. Bjørstad2 , Christian Rechberger3 ,
Add to Reading List

Document Date: 2008-03-07 13:01:06


Open Document

File Size: 156,33 KB

Share Result on Facebook

Facility

University of Bergen / Graz University of Technology France T´el´ecom Research and Development / /

IndustryTerm

accelerated exhaustive key search / exhaustive search / exhaustive key search / /

Organization

Graz University of Technology France T´el´ecom Research and Development / University of Bergen / Selmer Center / /

Technology

stream cipher / /

SocialTag