Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
Hakan Englund, Thomas Johansson
International Journal of Security and Networks (IJSN), 2006 Vol.1 No.1/2, pp.95 - 102
16 - 14 =

Thank you for your feedback.