Real time cryptanalysis of Bluetooth encryption with condition masking. (Extended abstract)
From MaRDI portal
Publication:2845671
Recommendations
- Practical cryptanalysis of Bluetooth encryption with condition masking
- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
- The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
- scientific article; zbMATH DE number 2085193
- Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s
Cited in
(7)- Breaking the Bluetooth pairing -- the fixed coordinate invalid curve attack
- The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
- Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s
- scientific article; zbMATH DE number 2085193 (Why is no real title available?)
- scientific article; zbMATH DE number 2086710 (Why is no real title available?)
- Practical cryptanalysis of Bluetooth encryption with condition masking
This page was built for publication: Real time cryptanalysis of Bluetooth encryption with condition masking. (Extended abstract)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2845671)