DagSemProc.07021.11.pdf
- Filesize: 217 kB
- 14 pages
In recent years, the initialization vector (IV) setup has proven to be the most vulnerable point when designing secure stream ciphers. In this paper, we take a look at possible reasons why this is the case, identifying numerous open research problems in cryptography.
Feedback for Dagstuhl Publishing