scientific article; zbMATH DE number 1759258
From MaRDI portal
Publication:4537979
zbMATH Open0994.68640MaRDI QIDQ4537979FDOQ4537979
Authors: Alex Biryukov, Adi Shamir, David Wagner
Publication date: 13 October 2002
Title of this publication is not available (Why is that?)
Recommendations
- scientific article; zbMATH DE number 5125147
- scientific article; zbMATH DE number 1759303
- Experimental and Efficient Algorithms
- Breaking the F-FCSR-H Stream Cipher in Real Time
- scientific article; zbMATH DE number 1030990
- Cryptanalysis of Achterbahn-128/80
- Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
- scientific article; zbMATH DE number 1583933
Computing methodologies and applications (68U99) Data encryption (aspects in computer science) (68P25) Cryptography (94A60)
Cited In (48)
- An analysis of chain characteristics in the cryptanalytic TMTO method
- Route 66: passively breaking all GSM channels
- On related-key attacks and KASUMI: the case of A5/3
- Reduced Complexity Attacks on the Alternating Step Generator
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
- Computation of edit probabilities and edit distances for the A5-type keystream generator
- Comparison of perfect table cryptanalytic tradeoff algorithms
- On reduction of the key space of the cipher A5/1 and on reversibility of the next-state function for a stream generator
- Selected Areas in Cryptography
- Weaknesses in the initialisation process of the common scrambling algorithm stream cipher
- A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a
- Analysis of the perfect table fuzzy rainbow tradeoff
- On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks
- Practical cryptanalysis of full Sprout with TMD tradeoff attacks
- Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128
- Finding Effective SAT Partitionings Via Black-Box Optimization
- Experimental and Efficient Algorithms
- Internal state recovery of Espresso stream cipher using conditional sampling resistance and TMDTO attack
- Analysis of the Parallel Distinguished Point Tradeoff
- On a probabilistic approach to the estimation of reliability of the Hellman method
- Title not available (Why is that?)
- On the mean value of the total length of chains computed during the additional checkings in the tradeoff method with distinguished points
- Time-memory trade-off attack on the GSM A5/1 stream cipher using commodity GPGPU (extended abstract)
- Optimization of rainbow tables for practically cracking GSM A5/1 based on validated success rate modeling
- Revisit two memoryless state-recovery cryptanalysis methods on A5/1
- Instant ciphertext-only cryptanalysis of GSM encrypted communication
- Cryptanalysis of GSM encryption in 2G/3G networks without rainbow tables
- Another attack on A5/1
- Analysis of rainbow tables with fingerprints
- Provable security against generic attacks on stream ciphers
- Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2
- Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2
- Advances in Cryptology - CRYPTO 2003
- Conditional Estimators: An Effective Attack on A5/1
- The function-inversion problem: barriers and opportunities
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
- Cryptanalysis of three mutually clock-controlled stop/go shift registers
- Title not available (Why is that?)
- Time-memory trade-offs sound the death knell for GPRS and GSM
- Certain Observations on ACORN v3 and the Implications to TMDTO Attacks
- Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem
- Two Trivial Attacks on Trivium
- A comparison of cryptanalytic tradeoff algorithms
- Исследование сложности метода радужных таблиц с маркерами цепочек
- On Modeling Post Decryption Error Processes in UMTS Air Interface
- New Distinguishers Based on Random Mappings against Stream Ciphers
- A fast correlation attack on LILI-128
- Parallel logical cryptanalysis of the generator A5/1 in BNB-grid system
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4537979)