Practical cryptanalysis of Bluetooth encryption with condition masking
From MaRDI portal
Recommendations
- Real time cryptanalysis of Bluetooth encryption with condition masking. (Extended abstract)
- The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
- Advances in Cryptology – CRYPTO 2004
- scientific article; zbMATH DE number 2085193
Cites work
- scientific article; zbMATH DE number 1304082 (Why is no real title available?)
- scientific article; zbMATH DE number 2048526 (Why is no real title available?)
- scientific article; zbMATH DE number 1759340 (Why is no real title available?)
- scientific article; zbMATH DE number 1759786 (Why is no real title available?)
- scientific article; zbMATH DE number 2085193 (Why is no real title available?)
- scientific article; zbMATH DE number 2086708 (Why is no real title available?)
- scientific article; zbMATH DE number 2086709 (Why is no real title available?)
- scientific article; zbMATH DE number 2086710 (Why is no real title available?)
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology – CRYPTO 2004
- Correlation properties of a general binary combiner with memory
- Correlation properties of combiners with memory in stream ciphers
- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
- Cryptanalysis of an E0-like combiner with memory
- Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s
- Fast correlation attacks on certain stream ciphers
- How Far Can We Go Beyond Linear Cryptanalysis?
- Improved fast correlation attacts using parity-check equations of weight 4 and 5
- Multi-pass Fast Correlation Attack on Stream Ciphers
- Real time cryptanalysis of Bluetooth encryption with condition masking. (Extended abstract)
- The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
- Walsh transforms and cryptographic applications in bias computing
Cited in
(4)- The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
- Real time cryptanalysis of Bluetooth encryption with condition masking. (Extended abstract)
- scientific article; zbMATH DE number 2085193 (Why is no real title available?)
This page was built for publication: Practical cryptanalysis of Bluetooth encryption with condition masking
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1753167)