Return to Article Details Algorithms for evaluation of the SNOW 2.0-like stream ciphers security over residue rings against correlation attacks Download Download PDF