A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony (Q484333): Difference between revisions
From MaRDI portal
Created a new Item |
Normalize DOI. |
||
(8 intermediate revisions by 7 users not shown) | |||
Property / DOI | |||
Property / DOI: 10.1007/s00145-013-9154-9 / rank | |||
Property / Mathematics Subject Classification ID | |||
Property / Mathematics Subject Classification ID: 94A60 / rank | |||
Normal rank | |||
Property / zbMATH DE Number | |||
Property / zbMATH DE Number: 6383990 / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
KASUMI | |||
Property / zbMATH Keywords: KASUMI / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
sandwich attack | |||
Property / zbMATH Keywords: sandwich attack / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
GSM/3G security | |||
Property / zbMATH Keywords: GSM/3G security / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
related-key | |||
Property / zbMATH Keywords: related-key / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
boomerang attack | |||
Property / zbMATH Keywords: boomerang attack / rank | |||
Normal rank | |||
Property / describes a project that uses | |||
Property / describes a project that uses: SAFER / rank | |||
Normal rank | |||
Property / describes a project that uses | |||
Property / describes a project that uses: MISTY / rank | |||
Normal rank | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: Publication / rank | |||
Normal rank | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1007/s00145-013-9154-9 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W1965570021 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Conditional Estimators: An Effective Attack on A5/1 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: New types of cryptanalytic attacks using related keys / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q3046332 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Related-Key Boomerang and Rectangle Attacks / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: A Related-Key Rectangle Attack on the Full KASUMI / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Related-Key Cryptanalysis of the Full AES-192 and AES-256 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4537979 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q3046614 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Another attack on A5/1 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Fast Software Encryption / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Practical Attack on the Full MMB Block Cipher / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Information Security and Privacy / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: New block encryption algorithm MISTY / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: The Return of the Cryptographic Boomerang / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Perfect nonlinear S-boxes / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4318725 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4941810 / rank | |||
Normal rank | |||
Property / DOI | |||
Property / DOI: 10.1007/S00145-013-9154-9 / rank | |||
Normal rank | |||
links / mardi / name | links / mardi / name | ||
Latest revision as of 19:56, 9 December 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony |
scientific article |
Statements
A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony (English)
0 references
7 January 2015
0 references
KASUMI
0 references
sandwich attack
0 references
GSM/3G security
0 references
related-key
0 references
boomerang attack
0 references