Another attack on A5/1
From MaRDI portal
Publication:4679901
DOI10.1109/TIT.2002.806129zbMATH Open1063.94072MaRDI QIDQ4679901FDOQ4679901
Authors: Patrik Ekdahl, Thomas Johansson
Publication date: 31 May 2005
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Recommendations
Cryptography (94A60) Shift register sequences and sequences over finite alphabets in information and communication theory (94A55)
Cited In (11)
- On the stability of \(m\)-sequences
- Selected Areas in Cryptography
- New attacks on IDEA with at least 6 rounds
- Title not available (Why is that?)
- Time-memory trade-off attack on the GSM A5/1 stream cipher using commodity GPGPU (extended abstract)
- Revisit two memoryless state-recovery cryptanalysis methods on A5/1
- Instant ciphertext-only cryptanalysis of GSM encrypted communication
- Advances in Cryptology - CRYPTO 2003
- Conditional Estimators: An Effective Attack on A5/1
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
- Title not available (Why is that?)
This page was built for publication: Another attack on A5/1
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4679901)