Another attack on A5/1
From MaRDI portal
Publication:4679901
Recommendations
Cited in
(11)- On the stability of \(m\)-sequences
- Selected Areas in Cryptography
- New attacks on IDEA with at least 6 rounds
- scientific article; zbMATH DE number 1759303 (Why is no real title available?)
- Time-memory trade-off attack on the GSM A5/1 stream cipher using commodity GPGPU (extended abstract)
- Instant ciphertext-only cryptanalysis of GSM encrypted communication
- Revisit two memoryless state-recovery cryptanalysis methods on A5/1
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
- Advances in Cryptology - CRYPTO 2003
- Conditional Estimators: An Effective Attack on A5/1
- scientific article; zbMATH DE number 1583933 (Why is no real title available?)
This page was built for publication: Another attack on A5/1
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4679901)