A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony (Q484333): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
Import241208061232 (talk | contribs)
Normalize DOI.
 
(6 intermediate revisions by 5 users not shown)
Property / DOI
 
Property / DOI: 10.1007/s00145-013-9154-9 / rank
Normal rank
 
Property / describes a project that uses
 
Property / describes a project that uses: SAFER / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: MISTY / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s00145-013-9154-9 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1965570021 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Conditional Estimators: An Effective Attack on A5/1 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New types of cryptanalytic attacks using related keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3046332 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related-Key Boomerang and Rectangle Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Related-Key Rectangle Attack on the Full KASUMI / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related-Key Cryptanalysis of the Full AES-192 and AES-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4537979 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3046614 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Another attack on A5/1 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Attack on the Full MMB Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Privacy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: New block encryption algorithm MISTY / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Return of the Cryptographic Boomerang / rank
 
Normal rank
Property / cites work
 
Property / cites work: Perfect nonlinear S-boxes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4318725 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941810 / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1007/S00145-013-9154-9 / rank
 
Normal rank

Latest revision as of 18:56, 9 December 2024

scientific article
Language Label Description Also known as
English
A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
scientific article

    Statements

    A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony (English)
    0 references
    0 references
    0 references
    0 references
    7 January 2015
    0 references
    KASUMI
    0 references
    sandwich attack
    0 references
    GSM/3G security
    0 references
    related-key
    0 references
    boomerang attack
    0 references
    0 references
    0 references

    Identifiers