Inproceedings,

Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box.

, , , and .
ICICS, volume 5308 of Lecture Notes in Computer Science, page 128-140. Springer, (2008)

Meta data

Tags

Users

  • @dblp

Comments and Reviews