![Keystream / Correlation attack / VEST / Weak key / Differential cryptanalysis / Linear feedback shift register / Blowfish / RC4 / Grain / Cryptography / Stream ciphers / HC-256 Keystream / Correlation attack / VEST / Weak key / Differential cryptanalysis / Linear feedback shift register / Blowfish / RC4 / Grain / Cryptography / Stream ciphers / HC-256](https://www.pdfsearch.io/img/c8d8ccc10b846c517bb69792a954dc2e.jpg)
| Document Date: 2005-06-03 08:04:08 Open Document File Size: 212,75 KBShare Result on Facebook
Country Singapore / / / Facility Hongjun Wu Institute / / IndustryTerm software efficient stream cipher / software-efficient cipher / exhaustive key search / software-efficient stream cipher / keystream generation algorithm / exhaustive search / / NaturalFeature Introduction Stream / / Organization Cipher HC-256 Hongjun Wu Institute for Infocomm Research / / Position resulting WB / / Technology encryption / 2.3 The keystream generation algorithm / keystream generation algorithm / secret key / 4 processor / Stream Cipher / /
SocialTag |