[1] WAKE is noted for its speed, making it suitable for applications requiring fast encryption.
These vulnerabilities arise from the cipher's reliance on previous ciphertext blocks for keystream generation, which can be exploited in certain attack scenarios.
[2] While WAKE has been overshadowed by more modern stream ciphers, its study remains relevant in cryptographic research.
Ongoing analyses focus on its security properties and potential improvements to mitigate identified vulnerabilities.
For instance, some studies have proposed modifications to the S-box structure or alternative feedback mechanisms to enhance resistance against chosen plaintext and ciphertext attacks.