U Kumar, VC Venkaiah - International Journal of Information …, 2023 - inderscienceonline.com
Stream ciphers that use the XOR-function are vulnerable to known-plaintext and reused-key
attacks. To overcome such shortcomings of the existing ciphers, we hereby propose a novel …