Return to Article Details
Algorithms for evaluation of the SNOW 2.0-like stream ciphers security over residue rings against correlation attacks
Download
Download PDF