How to Construct Cryptographic Primitives from Stream Ciphers
Stream ciphers
Stream Ciphers
Correlation Power Analysis Attack against Synchronous Stream Ciphers