Lines Matching full:additive
144 transforms are described, based on an additive stream cipher for1718 introduced to protect against some attacks on additive stream2120 additive stream cipher is vulnerable to attacks that use statistical2378 additive stream cipher, an attacker will always be able to change