Home | History | Annotate | Download | only in doc

Lines Matching full:additive

144    transforms are described, based on an additive stream cipher for
1718 introduced to protect against some attacks on additive stream
2120 additive stream cipher is vulnerable to attacks that use statistical
2378 additive stream cipher, an attacker will always be able to change