Author:
Peinado Alberto,Munilla Jorge,Fúster-Sabater Amparo
Publisher
Springer International Publishing
Reference15 articles.
1. Lecture Notes in Computer Science;S. Babbage,2008
2. Bogdanov, A., Preneel, B., Rijmen, V.: Security Evaluation of the K2 Stream Cipher. Internal report, Katholieke Universiteit Leuven, ESAT/SCD-COSIC (March 2011)
3. Che, W., Deng, H., Tan, X., Wang, J.: Networked RFID Systems and Lightweight Cryptography. In: Random Number Generator for Application in RFID Tags, ch. 16, pp. 279–287. Springer, Heidelberg (2008)
4. Lecture Notes in Computer Science;C. Cid,2009
5. Ding, L., Guan, J.: Cryptanalysis of Mickey family of stream ciphers. Security and Communication Networks (6), 396–941 (2013)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献