A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones
From MaRDI portal
Publication:2946892
DOI10.1007/978-3-662-43933-3_25zbMath1321.94076OpenAlexW1414497871MaRDI QIDQ2946892
Bing Sun, Ruilin Li, Chao Li, Heng Li
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-43933-3_25
Cites Work
- Instant ciphertext-only cryptanalysis of GSM encrypted communication
- Factoring polynomials with rational coefficients
- Lattice basis reduction: Improved practical algorithms and solving subset sum problems
- The insecurity of the elliptic curve digital signature algorithm with partially known nonces
- The insecurity of the digital signature algorithm with partially known nonces
- A Byte-Based Guess and Determine Attack on SOSEMANUK
- Cryptanalysis of the Light-Weight Cipher A2U2
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator
- Solving BDD by Enumeration: An Update
- New Guess-and-Determine Attack on the Self-Shrinking Generator
- Public Key Cryptography - PKC 2005
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones