Skip to main content
. 2010 Sep 5;20(5):413–419. doi: 10.2188/jea.JE20090066

Figure 3. Combined use of a stream cipher and a hash function.

Figure 3.