Instant ciphertext-only cryptanalysis of GSM encrypted communication
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1583765 (Why is no real title available?)
- scientific article; zbMATH DE number 1583933 (Why is no real title available?)
- scientific article; zbMATH DE number 1759258 (Why is no real title available?)
- Advances in Cryptology - CRYPTO 2003
- Another attack on A5/1
- Conditional Estimators: An Effective Attack on A5/1
- Efficient algorithms for solving overdefined systems of multivariate polynomial equations
- Selected Areas in Cryptography
Cited in
(16)- Another look at privacy threats in 3G mobile telephony
- Route 66: passively breaking all GSM channels
- Attacks on the DECT Authentication Mechanisms
- scientific article; zbMATH DE number 2202215 (Why is no real title available?)
- Practical cryptanalysis of the open smart grid protocol
- Periods on two kinds of nonlinear feedback shift registers with time varying feedback functions
- A low data complexity attack on the GMR-2 cipher used in the satellite phones
- Time-memory trade-off attack on the GSM A5/1 stream cipher using commodity GPGPU (extended abstract)
- Security enhancements against UMTS-GSM interworking attacks
- Cryptanalysis of GSM encryption in 2G/3G networks without rainbow tables
- Another attack on A5/1
- Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2
- scientific article; zbMATH DE number 2102397 (Why is no real title available?)
- Advances in Cryptology - CRYPTO 2003
- Time-memory trade-offs sound the death knell for GPRS and GSM
- On Modeling Post Decryption Error Processes in UMTS Air Interface
This page was built for publication: Instant ciphertext-only cryptanalysis of GSM encrypted communication
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1021231)