Cryptography Reference
In-Depth Information
4. Probably, one should mask the output as in RC4
+
to avoid state recovery
attacks.
Previous Page
Next Page
RC4: Stream Cipher and Its Variants
Search WWH ::
Custom Search
Home