Inproceedings,

Security Weaknesses in a Randomized Stream Cipher.

, , and .
ACISP, volume 1841 of Lecture Notes in Computer Science, page 234-241. Springer, (2000)

Meta data

Tags

Users

  • @dblp

Comments and Reviews