Cryptanalysis of the DECT standard cipher
From MaRDI portal
Publication:3577950
DOI10.1007/978-3-642-13858-4_1zbMATH Open1279.94109OpenAlexW1569821321MaRDI QIDQ3577950FDOQ3577950
Authors: Karsten Nohl, Erik Tews, Ralf-Philipp Weinmann
Publication date: 13 July 2010
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13858-4_1
Recommendations
Cryptography (94A60) Shift register sequences and sequences over finite alphabets in information and communication theory (94A55)
Cited In (7)
- Attacks on the DECT Authentication Mechanisms
- Breaking DVB-CSA
- Title not available (Why is that?)
- Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
- The stream cipher core of the 3GPP encryption standard 128-EEA3: timing attacks and countermeasures
- FPGA implementation of an improved attack against the DECT standard cipher
- Cryptanalysis of SBLH
This page was built for publication: Cryptanalysis of the DECT standard cipher
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3577950)